diff --git a/windows/security/book/application-security-root.md b/windows/security/book/application-security-root.md index 3bf35a11f2..f32cc1ee3d 100644 --- a/windows/security/book/application-security-root.md +++ b/windows/security/book/application-security-root.md @@ -7,6 +7,8 @@ ms.date: 04/09/2024 # Application security +:::image type="content" source="images/application-security-cover.png" alt-text="Cover of the application security chapter." border="false"::: + :::image type="content" source="images\application-security-on.png" alt-text="Diagram of containng a list of security features." lightbox="images\application-security.png" border="false"::: Cybercriminals can take advantage of poorly secured applications to access valuable resources. With Windows 11, IT admins can combat common application attacks from the moment a device is provisioned. For example, IT can remove local admin rights from user accounts so that PCs run with the least amount of privileges to prevent malicious applications from accessing sensitive resources. diff --git a/windows/security/book/application-security.md b/windows/security/book/application-security.md index 0185696857..fc5279baa6 100644 --- a/windows/security/book/application-security.md +++ b/windows/security/book/application-security.md @@ -7,7 +7,9 @@ ms.date: 04/09/2024 # Application security -:::image type="content" source="images\application-security-on.png" alt-text="Diagram of containng a list of security features." lightbox="images\application-security.png" border="false"::: +:::image type="content" source="images/application-security-cover.png" alt-text="Cover of the application security chapter." border="false"::: + +:::image type="content" source="images/application-security-on.png" alt-text="Diagram of containng a list of security features." lightbox="images/application-security.png" border="false"::: Cybercriminals can take advantage of poorly secured applications to access valuable resources. With Windows 11, IT admins can combat common application attacks from the moment a device is provisioned. For example, IT can remove local admin rights from user accounts so that PCs run with the least amount of privileges to prevent malicious applications from accessing sensitive resources. diff --git a/windows/security/book/hardware-security-root.md b/windows/security/book/hardware-security-root.md index cd4ed18883..afd4c55827 100644 --- a/windows/security/book/hardware-security-root.md +++ b/windows/security/book/hardware-security-root.md @@ -7,7 +7,7 @@ ms.date: 04/09/2024 # Hardware security -:::image type="content" source="images/hardware-security-cover.png" alt-text="Cover of the hardware security chapter."::: +:::image type="content" source="images/hardware-security-cover.png" alt-text="Cover of the hardware security chapter." border="false"::: :::image type="content" source="images/hardware-on.png" alt-text="Diagram of containng a list of security features." lightbox="images/hardware.png" border="false"::: diff --git a/windows/security/book/hardware-security.md b/windows/security/book/hardware-security.md index 7584eea73b..45aa842ac4 100644 --- a/windows/security/book/hardware-security.md +++ b/windows/security/book/hardware-security.md @@ -7,6 +7,8 @@ ms.date: 04/09/2024 # Hardware security +:::image type="content" source="images/hardware-security-cover.png" alt-text="Cover of the hardware security chapter." border="false"::: + :::image type="content" source="images\hardware-on.png" alt-text="Diagram of containng a list of security features." lightbox="images\hardware.png" border="false"::: Today's ever-evolving threats require strong alignment between hardware and software technologies to keep users, data, and devices protected. The operating system alone cannot defend against the wide range of tools and techniques cybercriminals use to compromise a computer. Once they gain a foothold, intruders can be difficult to detect as they engage in multiple nefarious activities ranging from stealing important data and credentials to implanting malware into low-level device firmware. Once malware is installed in firmware, it becomes difficult to identify and remove. These new threats call for computing hardware that is secure down to the very core, including the hardware chips and processors that store sensitive business information. With hardware-based protection, we can enable strong mitigation against entire classes of vulnerabilities that are difficult to thwart with software alone. Hardware-based protection can also improve the system's overall security without measurably slowing performance, compared to implementing the same capability in software. diff --git a/windows/security/book/images/application-security-cover.png b/windows/security/book/images/application-security-cover.png new file mode 100644 index 0000000000..3d8d9aa3d9 Binary files /dev/null and b/windows/security/book/images/application-security-cover.png differ diff --git a/windows/security/book/images/hardware-security-cover.png b/windows/security/book/images/hardware-security-cover.png index 70edef12d9..5328456231 100644 Binary files a/windows/security/book/images/hardware-security-cover.png and b/windows/security/book/images/hardware-security-cover.png differ diff --git a/windows/security/book/images/operating-system-security-cover.png b/windows/security/book/images/operating-system-security-cover.png new file mode 100644 index 0000000000..955891f34d Binary files /dev/null and b/windows/security/book/images/operating-system-security-cover.png differ diff --git a/windows/security/book/index.md b/windows/security/book/index.md index f9c60d72df..0d416ed4dc 100644 --- a/windows/security/book/index.md +++ b/windows/security/book/index.md @@ -52,3 +52,49 @@ In Windows 11, hardware and software work together to protect sensitive data fro :::image type="icon" source="images/learn-more.svg" border="false"::: **Learn more:** - [Windows security features licensing and edition requirements](https://learn.microsoft.com/en-us/windows/security/licensing-and-edition-requirements?tabs=edition) + +:::row::: + :::column span="1"::: + **Hardware security** + :::column-end::: + :::column span="1"::: + **Operating System security** + :::column-end::: + :::column span="1"::: + **Application security** + :::column-end::: + :::column span="1"::: + **security** + :::column-end::: + :::column span="1"::: + **security** + :::column-end::: + :::column span="1"::: + **security** + :::column-end::: + :::column span="1"::: + **security** + :::column-end::: +:::row-end::::::row::: + :::column span="1"::: + :::image type="content" source="images/hardware-security-cover.png" alt-text="Cover of the application security chapter." border="false"::: + :::column-end::: + :::column span="1"::: + :::image type="content" source="images/operating-system-security-cover.png" alt-text="Cover of the application security chapter." border="false"::: + :::column-end::: + :::column span="1"::: + :::image type="content" source="images/application-security-cover.png" alt-text="Cover of the application security chapter." border="false"::: + :::column-end::: + :::column span="1"::: + :::image type="content" source="images/hardware-security-cover.png" alt-text="Cover of the application security chapter." border="false"::: + :::column-end::: + :::column span="1"::: + :::image type="content" source="images/hardware-security-cover.png" alt-text="Cover of the application security chapter." border="false"::: + :::column-end::: + :::column span="1"::: + :::image type="content" source="images/hardware-security-cover.png" alt-text="Cover of the application security chapter." border="false"::: + :::column-end::: + :::column span="1"::: + :::image type="content" source="images/hardware-security-cover.png" alt-text="Cover of the application security chapter." border="false"::: + :::column-end::: +:::row-end::: diff --git a/windows/security/book/operating-system-security-root.md b/windows/security/book/operating-system-security-root.md index 578c3f5cec..7350d6486b 100644 --- a/windows/security/book/operating-system-security-root.md +++ b/windows/security/book/operating-system-security-root.md @@ -7,6 +7,8 @@ ms.date: 04/09/2024 # Operating System security -:::image type="content" source="images\operating-system-on.png" alt-text="Diagram of containng a list of security features." lightbox="images\operating-system.png" border="false"::: +:::image type="content" source="images/operating-system-security-cover.png" alt-text="Cover of the operating system security chapter." border="false"::: + +:::image type="content" source="images/operating-system-on.png" alt-text="Diagram of containng a list of security features." lightbox="images/operating-system.png" border="false"::: Windows 11 is the most secure Windows yet with extensive security measures in the operating system designed to help keep devices, identities, and information safe. These measures include built-in advanced encryption and data protection, robust network system security, and intelligent safeguards against ever-evolving viruses and threats. diff --git a/windows/security/book/operating-system-security.md b/windows/security/book/operating-system-security.md index b13fb7b49f..e949c86eca 100644 --- a/windows/security/book/operating-system-security.md +++ b/windows/security/book/operating-system-security.md @@ -7,6 +7,8 @@ ms.date: 04/09/2024 # Operating System security +:::image type="content" source="images/operating-system-security-cover.png" alt-text="Cover of the operating system security chapter." border="false"::: + :::image type="content" source="images\operating-system-on.png" alt-text="Diagram of containng a list of security features." lightbox="images\operating-system.png" border="false"::: Windows 11 is the most secure Windows yet with extensive security measures in the operating system designed to help keep devices, identities, and information safe. These measures include built-in advanced encryption and data protection, robust network system security, and intelligent safeguards against ever-evolving viruses and threats.