Introduction

Completed

Accelerated changes in technology and rapid expansion in remote and hybrid work have brought new opportunities for organizations and people alike. This expansion in our ability to work from anywhere has naturally introduced new threats and risks. According to data from the Microsoft commissioned Security Signals report, 75% of security decision-makers at the vice-president level and above feel the move to hybrid work leaves their organization more vulnerable to security threats. This means that now more than ever, there’s a greater need for intuitive, secure and simple experiences.

Part of that equation involves building and maintaining a strong security posture through regular servicing of Windows. For example, suppose you’re an IT administrator responsible for deploying and maintaining Windows 10 and 11 devices across the business. Further, your organization must meet and continually improve its approach to compliance to adhere to regulations. Our servicing updates of Windows 10 and 11 help ensure that there’s a solid security posture, contribute to your up-to-date security, and ultimately make your continuous update experience easier.

Proactive Windows servicing is just one component to help get you there. The module units here will walk through the various features for keeping your Windows devices up to date not only to ensure a successful update experience, but also to provide you, the IT professional, with more informed control over the security of Windows devices in your ecosystem. These decisions will help inform a level of security that your CIOs need in evaluating how your organization ranks against internal and external security threats, standards, and milestones.

In this module, you’ll learn how to improve your organization’s overall level of security, from the device chip level, all the way up to the cloud, through a proactive approach to Windows servicing. We’ll share how you can use Microsoft Intune, to apply Zero Trust standards to a selection of features representing the latest chip-to-cloud layered security model. These features cover hardware security, operating system and application security, identity and privacy controls, and more. At the end of the module, we’ll review how your security posture has improved with modern device management options and controls.

Workflow diagram showing the different steps in the security workflow we'll go through in this module.