Datacenter and Private Cloud Security Blog
News and technical content around Windows Server Security and other Datacenter and Private Cloud Security technologies
In this blog post, I’ll walk you through the new features which are relevant to the PAW solution in...
Date: 06/08/2018
There is a new Code Integrity policy option introduced in Windows 10, and it is available in Windows...
Date: 04/27/2018
Continuing the PAW series, this blog post discusses the options to connect to the VMs running on the...
Date: 04/12/2018
After Windows Defender Application Control (WDAC, formerly known as Code Integrity) was released in...
Date: 03/10/2018
With the new capability in Windows 10, version 1709, Windows Client can host shielded VMs while...
Date: 01/05/2018
Since it took me a couple of attempts to create VM templates for Azure portal management and Remote...
Date: 11/30/2017
It’s great to see customers trying out PAWs and it’s generating a lot of great questions. Many...
Date: 11/29/2017
Companies with large branch offices often must make a tradeoff between user experience and security....
Date: 11/15/2017
Continuing with the PAW series, after you followed the previous blog to build the PAW device, you...
Date: 11/01/2017
At Ignite conference last month, Dean and I presented a session on PAW. Originally we were planning...
Date: 10/13/2017
The Host Guardian Service uses public key cryptography extensively to protect shielded VMs from...
Date: 10/09/2017
If you have heard about Credential Guard in Windows Server 2016 (and in Windows 10), but do not have...
Date: 05/15/2017
[Today's guest post was authored by Dan Cuomo based on a real-world application of JEA] Hi Folks --...
Date: 04/24/2017
[This blog post was originally published at:...
Date: 04/24/2017
So you’ve deployed a guarded fabric and your VMs are running happily. Having now reached that...
Date: 04/21/2017
[This post was authored by Dean Wells, Principal Program Manager on the Windows Server team] If...
Date: 03/14/2017
Just Enough Administration (JEA) provides a way for administrators to delegate certain admin tasks...
Date: 03/07/2017
Shielded VM prevents unauthorized access from the host. To achieve this security assurance, there...
Date: 03/07/2017
Credential guard protects the credential derivatives like NTLM hash and Kerberos tickets; this...
Date: 02/21/2017
When talking to customers about the security features in Windows Server 2016, a common question...
Date: 02/02/2017
Windows Server 2016 includes new audit events to help with early detection of malicious activity in...
Date: 01/30/2017
If you're going to Ignite next week, you don't want to miss the Windows Server 2016 security...
Date: 09/22/2016
With thousands of new malware released every day, it may not be sufficient to only use...
Date: 09/20/2016
Continuing on the topic of Shielded VMs from my last blog on creating shielded VMs, this blogpost...
Date: 09/01/2016
Least Privilege As part of your information security strategy, you are probably familiar with the...
Date: 08/29/2016
[This post is authored by Dean Wells, Principal Program Manager for the Windows Server Security...
Date: 08/16/2016
My original blog post on the topic of deploying Shielded VMs without VMM included the instructions...
Date: 06/08/2016
Shielded VMs protect the data and state of a Virtual Machine against inspection, theft and tampering...
Date: 06/07/2016
[This blog post was originally published in the Windows Server Blog] This post was authored by Jeff...
Date: 05/10/2016
[This post is authored by Jim Hughes, Software Engineer for the Windows Server Team] The Host...
Date: 05/04/2016
[This post is authored by Sumesh Kumar, Program Manager for the Enterprise and Security Product...
Date: 03/28/2016
[This post is authored by Dean Wells, Principal Program Manager for the Windows Server Security...
Date: 03/23/2016
[This post is authored by John Patterson, Program Manager for the System Center Product Team] In...
Date: 03/21/2016
For the most up-to-date installation instructions, check out our official documentation at...
Date: 03/16/2016
As Information Technology became the norm, companies have been forced to invest tremendous amounts...
Date: 03/14/2016
In addition to the newly created Datacenter and Private Cloud Security Blog, the team is publishing...
Date: 02/24/2016
Securing privileged access is a critical first step to establishing security assurances for business...
Date: 02/23/2016
The RSA Conference takes place next week from Feb-29th to Mar-04th in San Francisco and Microsoft...
Date: 02/22/2016