From start up to shutdown, Windows
8 are created for the safety system to protect the active program.
For business users, security is
an indispensable element and becomes more important as today, the malware
attack on the company's common data system is becoming increasingly popular and
essential behavior. improved Windows 8 and adds new security features to help
protect the system robust data, from start up to access the data on the general
well being strict censorship and tight . Security system of Windows 8
Enterprise, IT administrators can easily set up rules to help protect your data
safe.
Trusted Boot Process
Some malicious programs often
attack or inserted into the system during boot before Windows or antivirus
software is started. These forms make the malware to enter the system.
With UEFI 2.3.1 (minimal drivers
on hardware replacement for obsolete BIOS) is equipped with UEFI Secure Boot
feature to help protect the system during the boot process. Windows 8 implement
the trusted boot process (trusted boot process) including the protected system
files, drivers, and even anti-virus software. Even if malware successfully
penetrated the boot process, Windows 8 will also automatically detect and
repair the system.
Measured Boot Process
Windows 8 can make a series of
measurements in the boot process to recognize the vagaries of the system during
the boot process. Like Trusted boot process, measured boot process (Measurement
boot process) as well as one of the solutions to prevent malicious software
from entering the boot process. To perform such measurements, Windows 8 using
chip Trusted Platform Module (TPM) to ensure the integrity of your computer.
BitLocker Drive Encryption
BitLocker Drive Encryption is a
data protection feature first introduced in the Ultimate version of the
operating system Windows Vista. It protects your data from unauthorized access
on the drive running Windows. This feature works with hardware Trusted Platform
Module (TPM).
BitLocker Drive Encryption is a
data protection feature in Windows 8 Pro and Windows 8 Enterprise to help prevent
data loss even if the computer is stolen, or stop unexpectedly. The improved
performance in the BitLocker will make the process faster hard drive encryption
to keep data safe and uninterrupted. In addition it, Bitlocker will also help
increase the overall performance, the load on the CPU and save power
consumption.
AppLocker
AppLocker allows users to limit
the use of certain files or applications for a certain group of users. This is
a feature that is simple and flexible mechanism to determine the exact
applications are allowed to run on the computer of a user group.
The traditional access control
technologies such as Active Directory Rights Management Services (AD RMS) or
Access Control Lists (ACLs) can help control access to data but to prevent
users from installing or using standard software.
AppLocker in Windows 8 Enterprise
allows administrators to create security policies through Group Policy to
prevent harmful applications. In addition, the administrator can set up
security mechanisms based on rules of application software packages a
reasonable and effective.
Windows SmartScreen Application
Reputation
Windows SmartScreen app
reputation as a safety feature in Windows 8 is to protect users from malicious
software that may be encountered when accessing the Internet. This feature will
automatically alert users when considering access to a resource that is highly
dangerous, but will turn off the warning for trusted resources derived. This
technology is testing any application that helps users stay in the most secure
state when browsing the Web.
Windows SmartScreen reputation
app is also integrated into the SmartScreen feature of Internet Explorer to
protect the user from the search page with personal information, passwords or
user's billing data.
Claim-Based Access Control
To ensure that needs access to
common data resources of each individual, Windows 8 Enterprise features Claim-based
access control (access control requirements). Accordingly, administrators can
allow users’ access to share data on the role of each individual user in the
company are stored in Active Directory.
Post a Comment