Share via


Security and Assurance

 

Updated: November 28, 2015

Applies To: Windows Server Technical Preview

This collection contains detailed information about security solutions and features for the IT professional to deploy in your datacenter and cloud environment. The following are security technologies and documentation for Windows Server 2016 Technical Preview.

Addressing emerging threats and landscape shifts

In this 6-minute video, Anders Vinberg provides an overview of Microsoft’s security and assurance strategy. Vinberg discusses industry trends and landscape shifts as they relate to security, and then focuses on Microsoft’s key initiatives to protect workloads from the underlying fabric, protect against direct attacks from privileged accounts, and, should intrusions happen, he explains how new detection and forensic capabilities can help better identify the threat.

Shielded Virtual Machines in Windows Server video walkthrough

This video walkthrough shows how the Host Guardian Service, a new role available in Windows Server 2016 Technical Preview, enables shielded virtual machines so that sensitive data is protected from unauthorized access by Hyper-V host administrators.

Protecting Your Datacenter and Cloud from Emerging Threats blog post

This blog post discusses how you can use Microsoft technologies to protect your datacenter and cloud investments from emerging threats.

Just in Time Administration with Microsoft Identity Manager

This article discusses features and capabilities included in Microsoft Identity Manager, including support for Just In Time (JIT) Privileged Access Management.

Just Enough Administration Privileged Access Management

This blog post discusses the steps required to set up Just Enough Administration (JEA) in your environment.

Just Enough Administration Whitepaper

This document shares the vision and technical details of Just Enough Administration (JEA), a PowerShell toolkit designed to help organizations reduce risk by restricting operators to the only access required to perform specific tasks.

Platform Vision & Strategy (5 of 7): Security and Assurance Overview (Ignite Video)

This Ignite session addresses persistent threats, insider breaches, organized cybercrime, and securing the Microsoft Cloud Platform (on-premises and connected services with Azure). It includes scenarios for securing workloads, large enterprise tenants, and service providers.

Harden the Fabric: Protecting Tenant Secrets in Hyper-V (Ignite Video)

This Ignite presentation discusses enhancements in Hyper-V, Virtual Machine Manager, and a new Guardian Server role to enable shielded VMs.

JEA: A PowerShell Toolkit to Secure a Post-Snowden World

This Ignite presentation discusses how you can use the Just Enough Administration PowerShell Toolkit to control administrator access and reduce breach expansion.

Protecting Windows and Microsoft Azure Active Directory with Privileged Access Management

This Ignite presentation covers Microsoft’s strategy and investments in Windows Server, PowerShell, Active Directory, Identity Manager, and Azure Active Directory for addressing the risks of administrator access through stronger authentication and managing access using Just in Time and Just Enough Administration.

Security Threat Analysis Using Microsoft Azure Operational Insights

This Ignite presentation discusses how you can use Operational Insights to perform security threat analysis.

Microsoft Advanced Threat Analytics

This blog post discusses Microsoft Advanced Threat Analytics, an on-premises product that uses Active Directory network traffic and SIEM data to discover and alert on potential threats.

Microsoft Operations Management Suite (OMS)

The Microsoft Operations Management Suite (OMS) Security and Audit solution processes security logs and firewall events from on-premises and cloud environments to analyze and detect malicious behavior.

Datacenter Firewall Overview

This overview discusses Datacenter Firewall, a network layer, 5-tuple (protocol, source and destination port numbers, source and destination IP addresses), stateful, multitenant firewall.

Shielded VMs and Guarded Fabric Step-by-step deployment guides

These guides provide installation and validation information for Windows Server 2016 Technical Preview and System Center Virtual Machine Manager for Guarded Fabric Hosts and Shielded VMs.

Guide versions:

Administrator-trusted attestation

Hardware-trusted attestation

Shielded VMs and Guarded Fabric Operations Guide

This guide provides best practices and recommendations for how to configure your Shielded VM environment, including information specific to Guarded Hosts and tenants.

Shielded VMs and Guarded Fabric Troubleshooting Guide

This guide provides information about how to resolve issues you may encounter in your Shielded VM environment.