Update hardware security chapter with corrected link to silicon-assisted security

This commit is contained in:
Paolo Matarazzo 2024-04-19 07:48:00 -04:00
parent e87ebe65ab
commit 0db6728163
10 changed files with 59 additions and 3 deletions

View File

@ -7,6 +7,8 @@ ms.date: 04/09/2024
# Application security
:::image type="content" source="images/application-security-cover.png" alt-text="Cover of the application security chapter." border="false":::
:::image type="content" source="images\application-security-on.png" alt-text="Diagram of containng a list of security features." lightbox="images\application-security.png" border="false":::
Cybercriminals can take advantage of poorly secured applications to access valuable resources. With Windows 11, IT admins can combat common application attacks from the moment a device is provisioned. For example, IT can remove local admin rights from user accounts so that PCs run with the least amount of privileges to prevent malicious applications from accessing sensitive resources.

View File

@ -7,7 +7,9 @@ ms.date: 04/09/2024
# Application security
:::image type="content" source="images\application-security-on.png" alt-text="Diagram of containng a list of security features." lightbox="images\application-security.png" border="false":::
:::image type="content" source="images/application-security-cover.png" alt-text="Cover of the application security chapter." border="false":::
:::image type="content" source="images/application-security-on.png" alt-text="Diagram of containng a list of security features." lightbox="images/application-security.png" border="false":::
Cybercriminals can take advantage of poorly secured applications to access valuable resources. With Windows 11, IT admins can combat common application attacks from the moment a device is provisioned. For example, IT can remove local admin rights from user accounts so that PCs run with the least amount of privileges to prevent malicious applications from accessing sensitive resources.

View File

@ -7,7 +7,7 @@ ms.date: 04/09/2024
# Hardware security
:::image type="content" source="images/hardware-security-cover.png" alt-text="Cover of the hardware security chapter.":::
:::image type="content" source="images/hardware-security-cover.png" alt-text="Cover of the hardware security chapter." border="false":::
:::image type="content" source="images/hardware-on.png" alt-text="Diagram of containng a list of security features." lightbox="images/hardware.png" border="false":::

View File

@ -7,6 +7,8 @@ ms.date: 04/09/2024
# Hardware security
:::image type="content" source="images/hardware-security-cover.png" alt-text="Cover of the hardware security chapter." border="false":::
:::image type="content" source="images\hardware-on.png" alt-text="Diagram of containng a list of security features." lightbox="images\hardware.png" border="false":::
Today's ever-evolving threats require strong alignment between hardware and software technologies to keep users, data, and devices protected. The operating system alone cannot defend against the wide range of tools and techniques cybercriminals use to compromise a computer. Once they gain a foothold, intruders can be difficult to detect as they engage in multiple nefarious activities ranging from stealing important data and credentials to implanting malware into low-level device firmware. Once malware is installed in firmware, it becomes difficult to identify and remove. These new threats call for computing hardware that is secure down to the very core, including the hardware chips and processors that store sensitive business information. With hardware-based protection, we can enable strong mitigation against entire classes of vulnerabilities that are difficult to thwart with software alone. Hardware-based protection can also improve the system's overall security without measurably slowing performance, compared to implementing the same capability in software.

Binary file not shown.

After

Width:  |  Height:  |  Size: 257 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 256 KiB

After

Width:  |  Height:  |  Size: 257 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 260 KiB

View File

@ -52,3 +52,49 @@ In Windows 11, hardware and software work together to protect sensitive data fro
:::image type="icon" source="images/learn-more.svg" border="false"::: **Learn more:**
- [Windows security features licensing and edition requirements](https://learn.microsoft.com/en-us/windows/security/licensing-and-edition-requirements?tabs=edition)
:::row:::
:::column span="1":::
**Hardware security**
:::column-end:::
:::column span="1":::
**Operating System security**
:::column-end:::
:::column span="1":::
**Application security**
:::column-end:::
:::column span="1":::
**security**
:::column-end:::
:::column span="1":::
**security**
:::column-end:::
:::column span="1":::
**security**
:::column-end:::
:::column span="1":::
**security**
:::column-end:::
:::row-end::::::row:::
:::column span="1":::
:::image type="content" source="images/hardware-security-cover.png" alt-text="Cover of the application security chapter." border="false":::
:::column-end:::
:::column span="1":::
:::image type="content" source="images/operating-system-security-cover.png" alt-text="Cover of the application security chapter." border="false":::
:::column-end:::
:::column span="1":::
:::image type="content" source="images/application-security-cover.png" alt-text="Cover of the application security chapter." border="false":::
:::column-end:::
:::column span="1":::
:::image type="content" source="images/hardware-security-cover.png" alt-text="Cover of the application security chapter." border="false":::
:::column-end:::
:::column span="1":::
:::image type="content" source="images/hardware-security-cover.png" alt-text="Cover of the application security chapter." border="false":::
:::column-end:::
:::column span="1":::
:::image type="content" source="images/hardware-security-cover.png" alt-text="Cover of the application security chapter." border="false":::
:::column-end:::
:::column span="1":::
:::image type="content" source="images/hardware-security-cover.png" alt-text="Cover of the application security chapter." border="false":::
:::column-end:::
:::row-end:::

View File

@ -7,6 +7,8 @@ ms.date: 04/09/2024
# Operating System security
:::image type="content" source="images\operating-system-on.png" alt-text="Diagram of containng a list of security features." lightbox="images\operating-system.png" border="false":::
:::image type="content" source="images/operating-system-security-cover.png" alt-text="Cover of the operating system security chapter." border="false":::
:::image type="content" source="images/operating-system-on.png" alt-text="Diagram of containng a list of security features." lightbox="images/operating-system.png" border="false":::
Windows 11 is the most secure Windows yet with extensive security measures in the operating system designed to help keep devices, identities, and information safe. These measures include built-in advanced encryption and data protection, robust network system security, and intelligent safeguards against ever-evolving viruses and threats.

View File

@ -7,6 +7,8 @@ ms.date: 04/09/2024
# Operating System security
:::image type="content" source="images/operating-system-security-cover.png" alt-text="Cover of the operating system security chapter." border="false":::
:::image type="content" source="images\operating-system-on.png" alt-text="Diagram of containng a list of security features." lightbox="images\operating-system.png" border="false":::
Windows 11 is the most secure Windows yet with extensive security measures in the operating system designed to help keep devices, identities, and information safe. These measures include built-in advanced encryption and data protection, robust network system security, and intelligent safeguards against ever-evolving viruses and threats.