Five security features of Windows 8.1

Source: Internet
Author: User

Later this summer, Microsoft plans to release Windows 8.1 for manufacturers. Windows 8.1 security is particularly important in the era when employees no longer only use corporate desktops and laptops. The top five security features of Windows 8.1
Remote business data deletion

This Windows 8.1 feature allows administrators to delete a PC that participates in a BYOD project.

Some Windows 8.1 devices may not be owned by the company and carry private data that does not require enterprise protection. Data can be divided into two parts: "enterprise" and "user". The former should participate in the erasure request, and the latter will not participate in the erasure request. Administrators can also classify and encrypt data to determine whether data should be deleted from the device at the end of a user's employment or contractual relationship. IT can also use the Exchange ActiveSync protocol command Windows to erase enterprise data or rewrite or simply mark the data as "inaccessible" without deleting IT.

Workplace Join

In essence, you can regard this Windows 8.1 feature as a domain that is added to "lite. In Workplace Join, the device owner can subscribe to a set of security policies for his computer, allowing certain data to be retained Based on the Windows Server 2012 R2 domain. Or, most importantly, execute the above finite erasure.

Users who join a workplace can use their own domain accounts to access public resources on the network, such as file sharing and applications. Domain administrators do not need to have full control over their devices. Domain administrators can now apply for the minimum standard for access to sensitive resources to control anonymous access. Workplace Join tries to balance the relationship between information integrity and independent personal devices.

Assigned Access

This new Windows 8.1 feature is truly designed for public phone booths, call centers, or academic environments (and consumer-end home users. It locks workstation to a Windows Store application to prevent users from accessing any other application or system.

This does not work for desktop applications, so it is currently very limited in enterprise use. If your organization develops Windows Store applications for domestic users, you will find that Assigned Access is a great security solution.

Biometric folder and authentication security

With this feature, you can set fingerprint verification access for your devices. Users access special folders through fingerprints rather than passwords or smart cards, which significantly enhances the security of the entire system.

Windows 8.1 recognizes various fingerprints to prevent simulated printing. However, for enterprises, administrators can control Windows 8 Pro and Enterprise versions. Therefore, fingerprint verification is required before transactions are made using a personal certificate. They can also control access to Windows Store applications.

Windows 8.1 device Encryption

We have made many articles on BitLocker technology. BitLocker was introduced in Windows Vista for the first time, but has been improved in every subsequent version.

In the Windows 8.1 era, when a Microsoft account is logged on, the WindowsRT tablet is automatically encrypted. BitLocker can be used for Windows RT, Windows 8.1, Windows 8.1, or Enterprise Edition.

On Windows 8.1 Pro and Enterprise devices, you can use the Group Policy Option to obtain additional configurations. In addition, devices that use Microsoft's Standby function can connect to the Internet persistently-encrypt data when not needed to prevent unauthorized access to unattended devices.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.