diff --git a/windows/whats-new/credential-guard.md b/windows/whats-new/credential-guard.md index 5bd63a42af..48f7a4f853 100644 --- a/windows/whats-new/credential-guard.md +++ b/windows/whats-new/credential-guard.md @@ -13,6 +13,7 @@ author: brianlic-msft **Applies to** - Windows 10 +- Windows Server 2016 Credential Guard uses virtualization-based security to isolate secrets so that only privileged system software can access them. diff --git a/windows/whats-new/device-guard-overview.md b/windows/whats-new/device-guard-overview.md index ed8847ee60..c96f390c98 100644 --- a/windows/whats-new/device-guard-overview.md +++ b/windows/whats-new/device-guard-overview.md @@ -15,6 +15,7 @@ author: brianlic-msft **Applies to** - Windows 10 - Windows 10 Mobile +- Windows Server 2016 Device Guard is a combination of enterprise-related hardware and software security features that, when configured together, will lock a device down so that it can only run trusted applications. If the app isn’t trusted it can’t run, period. It also means that even if an attacker manages to get control of the Windows kernel, he or she will be much less likely to be able to run malicious executable code after the computer restarts because of how decisions are made about what can run and when. Device Guard uses the new virtualization-based security in Windows 10 Enterprise to isolate the Code Integrity service from the Microsoft Windows kernel itself, letting the service use signatures defined by your enterprise-controlled policy to help determine what is trustworthy. In effect, the Code Integrity service runs alongside the kernel in a Windows hypervisor-protected container. diff --git a/windows/whats-new/security-auditing.md b/windows/whats-new/security-auditing.md index 15350dc9c4..13c6a7e5b8 100644 --- a/windows/whats-new/security-auditing.md +++ b/windows/whats-new/security-auditing.md @@ -10,9 +10,11 @@ ms.pagetype: security, mobile --- # What's new in security auditing? + **Applies to** - Windows 10 - Windows 10 Mobile +- Windows Server 2016 Security auditing is one of the most powerful tools that you can use to maintain the integrity of your system. As part of your overall security strategy, you should determine the level of auditing that is appropriate for your environment. Auditing should identify attacks (successful or not) that pose a threat to your network, and attacks against resources that you have determined to be valuable in your risk assessment. diff --git a/windows/whats-new/trusted-platform-module.md b/windows/whats-new/trusted-platform-module.md index 9937fada56..18a325aa7f 100644 --- a/windows/whats-new/trusted-platform-module.md +++ b/windows/whats-new/trusted-platform-module.md @@ -14,6 +14,7 @@ author: brianlic-msft **Applies to** - Windows 10 - Windows 10 Mobile +- Windows Server 2016 This topic for the IT professional describes new features for the Trusted Platform Module (TPM) in Windows 10.