Cyber threats are the new normal. Help protect your identity and data with Windows 10. We take your security seriously.
The last few years have seen a revolution in enterprise security threats. Windows 10 goes beyond just building bigger walls and delivers entirely new ways to help protect identities, data, and devices.
With Microsoft Passport and Windows Hello* computing can become more personal and more secure – without the hassles and compromises of passwords. Deploy two-factor password alternatives, breach, theft, and phish resistant credentials – without many of the complexities and cost of the past.
No matter how or where your data is being accessed, with Windows 10 your employees are secured from power-on to power-off.
In this webcast, viewers will learn more about:
•How Windows 10 delivers on protecting identities, data and devices
•What are Microsoft Passport, Windows Hello, Enterprise Data Protection and Device Guard, and how they protect employee devices and company data
•Additional resources to learn more about security on Windows 10
Randy Franklin Smith of Ultimate Windows Security has been busy researching the changes to audit policy and the security log in Windows 10. He’ll be updating the Security Log Encyclopedia to reflect these changes and I’m going to show you these changes live in this upcoming real training for free ™ webinar. Here’s what to expect:
• Microsoft has added a new “Audit Group Membership” subcategory to audit policy that documents all the groups a user belongs to at the moment of logon – whether an interactive logon to a workstation or a remote logon as to a file server. Smith will discuss the interesting ways you can use this information to enhance your monitoring of different types of users.
• The other new audit policy, “Audit PNP Activity” allows you to audit connection of external devices by the Windows plug and play system.
• Microsoft has new events and more fields to some existing events so that get additional useful information on activity like: Logons, process creation, enumeration of the local SAM account database and changes to Boot Configuration Database (BCD).
A lot of these changes are valuable enhancements that will help you catch endpoint security threats more effectively. Furthermore, Smith will show specific examples of these new events and point out the new fields in existing events.
LogRhythm, has sponsored this real training for free ™ session. LogRhythm has a new version of their cool SIEM out and Erick Ingleby will demo the new version 7.1. This includes the introduction of a new back-end technology for storing all log data that provides greater scalability, search performance, faster indexing rates, and enables new capabilities such as unstructured search against the full log message text.
The new Microsoft Windows 10 platform is an exciting step forward from both a functionality and a security perspective. Senior Product Marketing Manager, Stephen Rose covers the new features of this operating system and what they mean to you as a way of adding additional security to your organization.Read more >
To fix a configuration that drifted from the desired state. This is the description of Windows PowerShell PowerShell Desired State Configuration.
Who doesn’t know the long search for the cause when something stopped working? Two identical servers, where one works and one does not.
You can solve this by standardization and compliancy enforcement of that standard. DSC is all about that.
You define a state you want the configuration to be in and hold this against a server or client. If it isn’t compliant with the desired state, it will get fixed.
This is the future of management in Windows environments.
During this webinar, Jeff will show both how DSC can be used for compliancy enforcement, but also as a deployment solution.
Bio: Jeff Wouters, MVP Windows PowerShell, is a freelance consultant and trainer from The Netherlands with a main focus on automation and virtualization.
He has a passion for Windows PowerShell, is the founder of the Dutch PowerShell User Group (DuPSUG) and frequent speaker at national and international IT events such as BriForum, E2E Virtualization Conference, Microsoft TechDays and multiple User Groups.
He blogs on http://www.jeffwouters.nl and the Hey!ScriptingGuy blog. Jeff is one of the contributing authors to the PowerShell Deep Dives book and an active social media user where you can find him under 'JeffWouters'.
AppLocker is Window’s built-in application whitelisting technology. Despite AppLocker requiring a lot of planning, research and commitment to ongoing care and feeding, in audit mode the application has unlocked potential. Audit mode, provides a really cool way to know immediately when anything new runs on your network without collecting a tremendous amount of events from every endpoint.
In this webinar we’re going on a deep dive of how to implement AppLocker in audit mode and then monitor those events so that you know as soon as something new shows up on your endpoint. Also, Erick Ingleby will briefly show you how LogRhythm can even take automatic remediation measures on endpoints when unauthorized software is detected – including the immediate collection of additional evidence so that it will be ready for the security analyst to investigate.
Windows 10 is designed to have natural interactions, provide mobility of experience, ensure trust with your data, delight consumers and IT, and be a universal platform and store. In this session, we will review Windows as a service, newly enabled engaging experiences, and the new possibilities that will take shape with the universal Windows Platform.Read more >