Endpoint

10/25/2017
04:45 PM
Kelly Sheridan
Kelly Sheridan
Slideshows
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
0%
100%

Windows 10 Update: 10 Key New Security Features

Microsoft is tightening its focus on Windows 10 security with several new security tools in its latest major OS update.
Previous
1 of 11
Next

(Image: MyImages - Micha via Shutterstock)

(Image: MyImages - Micha via Shutterstock)

Windows 10 security is getting a face-lift in the Fall Creators Update, which Microsoft started rolling out last week. The update is packed with several new tools intended to give administrators and users more granular control over security.

Updates pertaining to Windows 10 security are increasingly relevant to businesses as more swap older versions of Windows for the latest. Microsoft reports 90% growth in commercial devices year over year as enterprise, small business, and education users make the switch.

The most recent batch of security and management features addresses common business security concerns like ransomware, application security, credential theft, and polymorphic malware. Overall, they indicate a broader transition from reactive to proactive security.

"With continuous updates, and focus on security, they're responding quickly to changing attack patterns on the OS in a way they weren't before," says Gartner Vice President Peter Firstbrook of Microsoft's approach to security management in Windows 10.

Here, we take a closer look at the newest security tools in Windows 10 and dig a little further into how each works. Which of these features do you think will be most helpful for managing your security operations? Where do you think Microsoft could further improve security? Feel free to share your thoughts in the comments.

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

 

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Previous
1 of 11
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
gudguy1
100%
0%
gudguy1,
User Rank: Strategist
11/18/2017 | 4:31:34 PM
Not a White Paper - pages of ads...
Okay, I also stopped after the 2nd page - I despise scrolling through multiple pages.

Many sites allow you to click on the 'print' pages link to see all pages on 1 page, even if you do not print them out.

This, I agree, is too much trouble...
gudguy1
100%
0%
gudguy1,
User Rank: Strategist
11/18/2017 | 4:19:28 PM
Re: terrible way to show white paper?
Yep, I'm with you. Have had multiple headaches over the years with this site. Got worse after BUM, errr, I mean UBM stepped in... Pain!!!!

I already replied to another comment but this is how much of a pain it is to me as well....
gudguy1
100%
0%
gudguy1,
User Rank: Strategist
11/18/2017 | 4:18:46 PM
Re: I'm done with you.
To jedj,

Yep, I'm with you. Have had multiple headaches over the years with this site. Got worse after BUM, errr, I mean UBM stepped in... Pain!!!!

Tried to log in on my smart phone (android 7, samsung s6, with all the latest software updates) - logged in but would not fully register to pull the 'papers' down.... not the first time.

The problem with this site, 'some' of the 'white papers' are actually white paper pdfs but some, which we do not know in advance - are not.  And if you try to click on print, to see all of the pages on one screen - you may not see those total pages.

What they want, is to show you ads, as much as possible.
jedj
100%
0%
jedj,
User Rank: Apprentice
11/17/2017 | 12:11:29 PM
I'm done with you.
I login looking for a white paper that can be downloaded and read when time allowed, but it's an article split into eleven pages.  The additional time and effort is not worth going through your format.  I will not be coming back to your website again.
srm16475
100%
0%
srm16475,
User Rank: Apprentice
11/14/2017 | 8:53:33 AM
terrible way to show white paper?
So the email I get says it is a 'white paper'.  After loggin in it isn't - and I have to go through way too many pages in order to view the so called white paper.  I don't know how much time you have on your hands, but I do not.  Do not call it a white paper if it isn't in a pdf form.  Don't waste my time.
DEisenlohr945
100%
0%
DEisenlohr945,
User Rank: Apprentice
11/6/2017 | 1:26:45 PM
posting of Windows 10 Update: 10 Key...
When I look at a posting, I expect the document to be a PDF so I can save the entire document, not 11 separate pages.
RyanSepe
100%
0%
RyanSepe,
User Rank: Ninja
10/27/2017 | 7:43:12 AM
Windows Defender Exploit Guard
This is a fantastic start! Analyzing consistent behaviors will provide a good basis for prevention for consumers. However, I wonder how many non-malicious false positives will occur.
Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Intel Reveals New Spectre-Like Vulnerability
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/15/2018
Data Privacy Careers Are Helping to Close the IT Gender Gap
Dana Simberkoff, Chief Compliance and Risk Management Officer, AvePoint, Inc,  8/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-15601
PUBLISHED: 2018-08-21
apps/filemanager/handlers/upload/drop.php in Elefant CMS 2.0.3 performs a urldecode step too late in the "Cannot upload executable files" protection mechanism.
CVE-2018-15603
PUBLISHED: 2018-08-21
An issue was discovered in Victor CMS through 2018-05-10. There is XSS via the Author field of the "Leave a Comment" screen.
CVE-2018-15598
PUBLISHED: 2018-08-21
Containous Traefik 1.6.x before 1.6.6, when --api is used, exposes the configuration and secret if authentication is missing and the API's port is publicly reachable.
CVE-2018-15599
PUBLISHED: 2018-08-21
The recv_msg_userauth_request function in svr-auth.c in Dropbear through 2018.76 is prone to a user enumeration vulnerability because username validity affects how fields in SSH_MSG_USERAUTH messages are handled, a similar issue to CVE-2018-15473 in an unrelated codebase.
CVE-2018-0501
PUBLISHED: 2018-08-21
The mirror:// method implementation in Advanced Package Tool (APT) 1.6.x before 1.6.4 and 1.7.x before 1.7.0~alpha3 mishandles gpg signature verification for the InRelease file of a fallback mirror, aka mirrorfail.