Datacenter and Private Cloud Security Blog

News and technical content around Windows Server Security and other Datacenter and Private Cloud Security technologies

In this blog post, I’ll walk you through the new features which are relevant to the PAW solution in...

Date: 06/08/2018

There is a new Code Integrity policy option introduced in Windows 10, and it is available in Windows...

Date: 04/27/2018

Continuing the PAW series, this blog post discusses the options to connect to the VMs running on the...

Date: 04/12/2018

After Windows Defender Application Control (WDAC, formerly known as Code Integrity) was released in...

Date: 03/10/2018

With the new capability in Windows 10, version 1709, Windows Client can host shielded VMs while...

Date: 01/05/2018

Since it took me a couple of attempts to create VM templates for Azure portal management and Remote...

Date: 11/30/2017

It’s great to see customers trying out PAWs and it’s generating a lot of great questions. Many...

Date: 11/29/2017

Companies with large branch offices often must make a tradeoff between user experience and security....

Date: 11/15/2017

Continuing with the PAW series, after you followed the previous blog to build the PAW device, you...

Date: 11/01/2017

At Ignite conference last month, Dean and I presented a session on PAW. Originally we were planning...

Date: 10/13/2017

The Host Guardian Service uses public key cryptography extensively to protect shielded VMs from...

Date: 10/09/2017

If you have heard about Credential Guard in Windows Server 2016 (and in Windows 10), but do not have...

Date: 05/15/2017

[Today's guest post was authored by Dan Cuomo based on a real-world application of JEA] Hi Folks --...

Date: 04/24/2017

[This blog post was originally published at:...

Date: 04/24/2017

So you’ve deployed a guarded fabric and your VMs are running happily.  Having now reached that...

Date: 04/21/2017

[This post was authored by Dean Wells, Principal Program Manager on the Windows Server team] If...

Date: 03/14/2017

Just Enough Administration (JEA) provides a way for administrators to delegate certain admin tasks...

Date: 03/07/2017

Shielded VM prevents unauthorized access from the host. To achieve this security assurance, there...

Date: 03/07/2017

Credential guard protects the credential derivatives like NTLM hash and Kerberos tickets; this...

Date: 02/21/2017

When talking to customers about the security features in Windows Server 2016, a common question...

Date: 02/02/2017

Windows Server 2016 includes new audit events to help with early detection of malicious activity in...

Date: 01/30/2017

If you're going to Ignite next week, you don't want to miss the Windows Server 2016 security...

Date: 09/22/2016

With thousands of new malware released every day, it may not be sufficient to only use...

Date: 09/20/2016

Continuing on the topic of Shielded VMs from my last blog on creating shielded VMs, this blogpost...

Date: 09/01/2016

Least Privilege As part of your information security strategy, you are probably familiar with the...

Date: 08/29/2016

[This post is authored by Dean Wells, Principal Program Manager for the Windows Server Security...

Date: 08/16/2016

My original blog post on the topic of deploying Shielded VMs without VMM included the instructions...

Date: 06/08/2016

Shielded VMs protect the data and state of a Virtual Machine against inspection, theft and tampering...

Date: 06/07/2016

[This blog post was originally published in the Windows Server Blog] This post was authored by Jeff...

Date: 05/10/2016

[This post is authored by Jim Hughes, Software Engineer for the Windows Server Team] The Host...

Date: 05/04/2016

[This post is authored by Sumesh Kumar, Program Manager for the Enterprise and Security Product...

Date: 03/28/2016

[This post is authored by Dean Wells, Principal Program Manager for the Windows Server Security...

Date: 03/23/2016

[This post is authored by John Patterson, Program Manager for the System Center Product Team] In...

Date: 03/21/2016

For the most up-to-date installation instructions, check out our official documentation at...

Date: 03/16/2016

As Information Technology became the norm, companies have been forced to invest tremendous amounts...

Date: 03/14/2016

In addition to the newly created Datacenter and Private Cloud Security Blog, the team is publishing...

Date: 02/24/2016

Securing privileged access is a critical first step to establishing security assurances for business...

Date: 02/23/2016

The RSA Conference takes place next week from Feb-29th to Mar-04th in San Francisco and Microsoft...

Date: 02/22/2016