Endpoint

10/25/2017
04:45 PM
Kelly Sheridan
Kelly Sheridan
Slideshows
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
0%
100%

Windows 10 Update: 10 Key New Security Features

Microsoft is tightening its focus on Windows 10 security with several new security tools in its latest major OS update.
Previous
1 of 11
Next

(Image: MyImages - Micha via Shutterstock)

(Image: MyImages - Micha via Shutterstock)

Windows 10 security is getting a face-lift in the Fall Creators Update, which Microsoft started rolling out last week. The update is packed with several new tools intended to give administrators and users more granular control over security.

Updates pertaining to Windows 10 security are increasingly relevant to businesses as more swap older versions of Windows for the latest. Microsoft reports 90% growth in commercial devices year over year as enterprise, small business, and education users make the switch.

The most recent batch of security and management features addresses common business security concerns like ransomware, application security, credential theft, and polymorphic malware. Overall, they indicate a broader transition from reactive to proactive security.

"With continuous updates, and focus on security, they're responding quickly to changing attack patterns on the OS in a way they weren't before," says Gartner Vice President Peter Firstbrook of Microsoft's approach to security management in Windows 10.

Here, we take a closer look at the newest security tools in Windows 10 and dig a little further into how each works. Which of these features do you think will be most helpful for managing your security operations? Where do you think Microsoft could further improve security? Feel free to share your thoughts in the comments.

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

 

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Previous
1 of 11
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
gudguy1
100%
0%
gudguy1,
User Rank: Strategist
11/18/2017 | 4:31:34 PM
Not a White Paper - pages of ads...
Okay, I also stopped after the 2nd page - I despise scrolling through multiple pages.

Many sites allow you to click on the 'print' pages link to see all pages on 1 page, even if you do not print them out.

This, I agree, is too much trouble...
gudguy1
100%
0%
gudguy1,
User Rank: Strategist
11/18/2017 | 4:19:28 PM
Re: terrible way to show white paper?
Yep, I'm with you. Have had multiple headaches over the years with this site. Got worse after BUM, errr, I mean UBM stepped in... Pain!!!!

I already replied to another comment but this is how much of a pain it is to me as well....
gudguy1
100%
0%
gudguy1,
User Rank: Strategist
11/18/2017 | 4:18:46 PM
Re: I'm done with you.
To jedj,

Yep, I'm with you. Have had multiple headaches over the years with this site. Got worse after BUM, errr, I mean UBM stepped in... Pain!!!!

Tried to log in on my smart phone (android 7, samsung s6, with all the latest software updates) - logged in but would not fully register to pull the 'papers' down.... not the first time.

The problem with this site, 'some' of the 'white papers' are actually white paper pdfs but some, which we do not know in advance - are not.  And if you try to click on print, to see all of the pages on one screen - you may not see those total pages.

What they want, is to show you ads, as much as possible.
jedj
100%
0%
jedj,
User Rank: Apprentice
11/17/2017 | 12:11:29 PM
I'm done with you.
I login looking for a white paper that can be downloaded and read when time allowed, but it's an article split into eleven pages.  The additional time and effort is not worth going through your format.  I will not be coming back to your website again.
srm16475
100%
0%
srm16475,
User Rank: Apprentice
11/14/2017 | 8:53:33 AM
terrible way to show white paper?
So the email I get says it is a 'white paper'.  After loggin in it isn't - and I have to go through way too many pages in order to view the so called white paper.  I don't know how much time you have on your hands, but I do not.  Do not call it a white paper if it isn't in a pdf form.  Don't waste my time.
DEisenlohr945
100%
0%
DEisenlohr945,
User Rank: Apprentice
11/6/2017 | 1:26:45 PM
posting of Windows 10 Update: 10 Key...
When I look at a posting, I expect the document to be a PDF so I can save the entire document, not 11 separate pages.
RyanSepe
100%
0%
RyanSepe,
User Rank: Ninja
10/27/2017 | 7:43:12 AM
Windows Defender Exploit Guard
This is a fantastic start! Analyzing consistent behaviors will provide a good basis for prevention for consumers. However, I wonder how many non-malicious false positives will occur.
How the US Chooses Which Zero-Day Vulnerabilities to Stockpile
Ricardo Arroyo, Senior Technical Product Manager, Watchguard Technologies,  1/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "He just showed up at my doorstep one day without a geotag."
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3906
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 contains hardcoded credentials in the WCF service on port 9003. An authenticated remote attacker can use these credentials to access the badge system database and modify its contents.
CVE-2019-3907
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores user credentials and other sensitive information with a known weak encryption method (MD5 hash of a salt and password).
CVE-2019-3908
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores backup files as encrypted zip files. The password to the zip is hard-coded and unchangeable. An attacker with access to these backups can decrypt them and obtain sensitive data.
CVE-2019-3909
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 database uses default credentials. Users are unable to change the credentials without vendor intervention.
CVE-2019-3910
PUBLISHED: 2019-01-18
Crestron AM-100 before firmware version 1.6.0.2 contains an authentication bypass in the web interface's return.cgi script. Unauthenticated remote users can use the bypass to access some administrator functionality such as configuring update sources and rebooting the device.