Windows 11: Should you bypass the hardware block?

Credit to Author: Susan Bradley| Date: Tue, 31 May 2022 12:55:00 -0700

If you’re like most PC users, your current computer can’t run Windows 11. Microsoft has placed a line in the hardware sand to ensure that only modern machines with certain specifications that harden security can run Windows 11. 

Well, sort of. The company provides a workaround, as I’ll discuss in a moment. Whether you should take advantage of this loophole to upgrade PCs (whether yours or your users’) to Windows 11 is the question.

First, if you want to know if a computer can run Windows 11, you can use the PC Health Check app, Microsoft’s diagnostic tool. But if your PC doesn’t support Windows 11, Microsoft’s app doesn’t do a great job of explaining why. Instead, I recommend using either the Windows 11 Requirements Check Tool from ByteJams.com or WhyNotWin11, available on Github. Both tools provide granular detail about why a machine won’t run Windows 11. On my personal laptop at home, for instance, the processor can’t support hardware for hypervisor enforced code integrity, nor does Windows 11 like the graphics display.

To read this article in full, please click here

Read more

New security features for Windows 11 will help protect hybrid work

Credit to Author: Christine Barrett| Date: Tue, 05 Apr 2022 15:00:00 +0000

Attackers haven’t wasted any time capitalizing on the rapid move to hybrid work. Every day cyber criminals and nation states alike have improved their targeting, speed and accuracy as the world adapted to working outside the office.

The post New security features for Windows 11 will help protect hybrid work appeared first on Microsoft Security Blog.

Read more

Guarding against supply chain attacks—Part 3: How software becomes compromised

Credit to Author: Todd VanderArk| Date: Wed, 11 Mar 2020 16:00:32 +0000

Set a high standard of software assurance with internal teams, partners, and suppliers to reduce your risk of a software supply chain attack.

The post Guarding against supply chain attacks—Part 3: How software becomes compromised appeared first on Microsoft Security.

Read more

Go passwordless to strengthen security and reduce costs

Credit to Author: Todd VanderArk| Date: Thu, 12 Dec 2019 00:00:56 +0000

Joy Chik, Microsoft CVP, Identity, explains how passwordless works and provides steps to begin preparing your organization to eliminate passwords.

The post Go passwordless to strengthen security and reduce costs appeared first on Microsoft Security.

Read more

Experts on demand: Your direct line to Microsoft security insight, guidance, and expertise

Credit to Author: Eric Avena| Date: Mon, 28 Oct 2019 15:00:10 +0000

Experts on demand is now generally available and gives customers direct access to real-life Microsoft threat analysts to help with their security investigations.

The post Experts on demand: Your direct line to Microsoft security insight, guidance, and expertise appeared first on Microsoft Security.

Read more

Microsoft and partners design new device security requirements to protect against targeted firmware attacks

Credit to Author: Eric Avena| Date: Mon, 21 Oct 2019 15:00:56 +0000

We’ve been working with partners to design what we call Secured-core PCs, devices that meet a specific set of device requirements that apply the security best practices of isolation and minimal trust to the firmware layer.

The post Microsoft and partners design new device security requirements to protect against targeted firmware attacks appeared first on Microsoft Security.

Read more