Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Windows 11 for Enterprise Administrators
  • Table Of Contents Toc
  • Feedback & Rating feedback
Windows 11 for Enterprise Administrators

Windows 11 for Enterprise Administrators

By : Manuel Singer, Jeff Stokes, Steve Miles, Thomas Lee, Richard Diver
5 (2)
close
close
Windows 11 for Enterprise Administrators

Windows 11 for Enterprise Administrators

5 (2)
By: Manuel Singer, Jeff Stokes, Steve Miles, Thomas Lee, Richard Diver

Overview of this book

Windows 11 comes with a plethora of new security measures, customizability, and accessibility features that can help your organization run more smoothly. But, without a proper introduction to this new version of Windows, it’s easy to miss the most important improvements, along with configuration options that will make migrating to Windows 11 frictionless. Windows 11 for Enterprise Administrators helps you understand the installation process, configuration methods, deployment scenarios, and management strategies. You’ll delve into configuring Remote Server Administration Tools for remote Windows Server and Azure Active Directory management. This edition emphasizes PowerShell's role in automating administrative tasks, and its importance in Windows 11 and Windows Server management. It also provides comprehensive insights into Windows 11 updates, including Version 21H2 and 22H2, contrasting them with Windows 10, ensuring your knowledge stays current with the latest enhancements in the Windows ecosystem. By the end of this book, you'll be well-equipped with Windows 11's vital technologies and potentials, enabling you to adeptly oversee and implement these attributes within your company.
Table of Contents (13 chapters)
close
close
9
Chapter 9: Advanced Configurations

Ensuring hardware security

We need to secure our hardware through device protection. Hackers have historically easily compromised a device before it is booted by dropping in rootkit malware without it even being noticed. It remains undetected after the device starts.

Trusted Platform Module (TPM), the Microsoft Pluton security processor, Hypervisor-Protected Code Integrity, and Windows Defender System Guard are all measures that can be used to provide the integrity of the device and OS before it even starts up. We will look at these measures in detail in the following sections.

TPM

TPM is a hardware-based security measure that provides tampering protection and can provide device health attestation. At the heart of TPM is a secure crypto-processor chip used for actions such as cryptographic key generation, storing, and use limitation.

Device health attestation enables trust to be established for a managed device based on the hardware and software components under the control...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY