Select Page
clipboard_image_4.png

Hyper-V Powering Windows Features

December 2019 Hyper-V is Microsoft’s hardware virtualization technology that initially released with Windows Server 2008 to support server virtualization and has since become a core component of many Microsoft products and features. These features range from enhancing security to empowering ... continue reading
Microsoft and partners design new device security requirements to protect against targeted firmware attacks

Microsoft and partners design new device security requirements to protect against targeted firmware attacks

Recent developments in security research and real-world attacks demonstrate that as more protections are proactively built into the OS and in connected services, attackers are looking for other avenues of exploitation with firmware emerging as a top target. In the ... continue reading

Preparing your enterprise to eliminate passwords

Anyone who uses the internet knows the hassles of using a user name and password to access their own information, whether it’s their banking, online shopping, social media, medical information, etc. If you’re a CIO, a CISO, or any other ... continue reading

Migrating local VM owner certificates for VMs with vTPM

First published on TECHNET on Dec 14, 2017 Whenever I want to replace or reinstall a system which is used to run virtual machines with a virtual trusted platform module (vTPM), I've been facing a challenge: For hosts that are ... continue reading

Allowing an additional host to run a VM with virtual TPM

First published on TECHNET on Oct 25, 2016 Recently a colleague got a new PC and asked me how he could migrate his existing virtual machines to his new system. Because he had enabled a virtual Trusted Platform Module (TPM) ... continue reading

Shielded VMs – additional considerations when running a guarded fabric

First published on TECHNET on Apr 21, 2017 So you’ve deployed a guarded fabric and your VMs are running happily. Having now reached that perfect steady state, let's have a look at the operational and administrative differences relative to a ... continue reading
Shielded VMs: A conceptual review of the components and steps necessary to deploy a guarded fabric

Shielded VMs: A conceptual review of the components and steps necessary to deploy a guarded fabric

First published on TECHNET on Mar 14, 2017 [This post was authored by Dean Wells, Principal Program Manager on the Windows Server team] If you're anything like me, you probably find it immensely helpful having an end-to-end conceptual view of ... continue reading
Host Guardian Service - AD-based vs. TPM-based attestation

Host Guardian Service – AD-based vs. TPM-based attestation

First published on TECHNET on Aug 16, 2016 [This post is authored by Dean Wells, Principal Program Manager for the Windows Server Security Product Team] Overview The Host Guardian Service (HGS) is a new role in Windows Server 2016 that ... continue reading

Step-by-step: Quick reference guide to deploying guarded hosts

First published on TECHNET on Jun 08, 2016 My original blog post on the topic of deploying Shielded VMs without VMM included the instructions to deploy guarded hosts. Based on feedback around keeping the blog posts short and scenario-focused, I ... continue reading

A closer look at shielded VMs in Windows Server 2016

First published on TECHNET on May 10, 2016 [This blog post was originally published in the Windows Server Blog ] This post was authored by Jeff Woolsey, Principal Program Manager, Windows Server. On this week’s Microsoft Mechanics show, we bring ... continue reading