Windows 8: The add business (P3)


From start up to shutdown, Windows 8 are created for the safety system to protect the active program.


For business users, security is an indispensable element and becomes more important as today, the malware attack on the company's common data system is becoming increasingly popular and essential behavior. improved Windows 8 and adds new security features to help protect the system robust data, from start up to access the data on the general well being strict censorship and tight . Security system of Windows 8 Enterprise, IT administrators can easily set up rules to help protect your data safe.

Trusted Boot Process


Some malicious programs often attack or inserted into the system during boot before Windows or antivirus software is started. These forms make the malware to enter the system.

With UEFI 2.3.1 (minimal drivers on hardware replacement for obsolete BIOS) is equipped with UEFI Secure Boot feature to help protect the system during the boot process. Windows 8 implement the trusted boot process (trusted boot process) including the protected system files, drivers, and even anti-virus software. Even if malware successfully penetrated the boot process, Windows 8 will also automatically detect and repair the system.

Measured Boot Process

Windows 8 can make a series of measurements in the boot process to recognize the vagaries of the system during the boot process. Like Trusted boot process, measured boot process (Measurement boot process) as well as one of the solutions to prevent malicious software from entering the boot process. To perform such measurements, Windows 8 using chip Trusted Platform Module (TPM) to ensure the integrity of your computer.

BitLocker Drive Encryption


BitLocker Drive Encryption is a data protection feature first introduced in the Ultimate version of the operating system Windows Vista. It protects your data from unauthorized access on the drive running Windows. This feature works with hardware Trusted Platform Module (TPM).

BitLocker Drive Encryption is a data protection feature in Windows 8 Pro and Windows 8 Enterprise to help prevent data loss even if the computer is stolen, or stop unexpectedly. The improved performance in the BitLocker will make the process faster hard drive encryption to keep data safe and uninterrupted. In addition it, Bitlocker will also help increase the overall performance, the load on the CPU and save power consumption.

AppLocker


AppLocker allows users to limit the use of certain files or applications for a certain group of users. This is a feature that is simple and flexible mechanism to determine the exact applications are allowed to run on the computer of a user group.

The traditional access control technologies such as Active Directory Rights Management Services (AD RMS) or Access Control Lists (ACLs) can help control access to data but to prevent users from installing or using standard software.

AppLocker in Windows 8 Enterprise allows administrators to create security policies through Group Policy to prevent harmful applications. In addition, the administrator can set up security mechanisms based on rules of application software packages a reasonable and effective.

Windows SmartScreen Application Reputation


Windows SmartScreen app reputation as a safety feature in Windows 8 is to protect users from malicious software that may be encountered when accessing the Internet. This feature will automatically alert users when considering access to a resource that is highly dangerous, but will turn off the warning for trusted resources derived. This technology is testing any application that helps users stay in the most secure state when browsing the Web.

Windows SmartScreen reputation app is also integrated into the SmartScreen feature of Internet Explorer to protect the user from the search page with personal information, passwords or user's billing data.

Claim-Based Access Control


To ensure that needs access to common data resources of each individual, Windows 8 Enterprise features Claim-based access control (access control requirements). Accordingly, administrators can allow users’ access to share data on the role of each individual user in the company are stored in Active Directory.





Post a Comment

Previous Post Next Post