Website under construction



Download 13,37 Mb.
Pdf ko'rish
bet8/131
Sana27.03.2022
Hajmi13,37 Mb.
#512480
1   ...   4   5   6   7   8   9   10   11   ...   131
Bog'liq
9780735697744 Introducing Windows Server 2016 pdf

Figure 1-1:
Categories of feedback for Windows Server 2016 
In response to this, Microsoft focused on these three pillars and provided a mission statement for 
each one, as shown in Figure 1-2. 
Figure 1-2:
Key pillars and Microsoft’s corresponding mission statement for Windows Server 2016 
Microsoft has used these pillars to drive innovative features backed up by what it’s learned from 
building and operating Azure and incorporate them directly into Windows Server 2016. 
These pillars have defined promises built in to ensure that customers are clear about Microsoft’s 
commitment that Windows Server 2016 is the platform of choice when considering security, software-
defined datacenter features that can were born in Microsoft Azure and now exist on-premises, and as 
an application platform that can not only run traditional applications, but also provide the necessary 
frameworks to allow customers to prepare their applications for migration to the cloud. 



CHAPTER 1 | Introduction to Microsoft Windows Server 2016 
The following subsections dive deeper into the pillars and what Microsoft promises to deliver and, 
more important, how it will deliver on these promises. 
Security 
Windows Server 2016 gives you the power to prevent attacks and detect suspicious activity with new 
features to control privileged access, protect virtual machines (VMs), and harden the platform against 
emerging threats. Here’s what Windows Server 2016 can do for you: 

Prevent the risk associated with compromised administrative credentials 
Using the new privileged identity management features, you can limit access to Just Enough and 
Just-in-Time 1. And, using Credential Guard, you can prevent administrative credentials from 
being stolen by Pass-the-Hash attacks. 

Protect your VMs from compromised fabric administrators by using shielded VMs 
A shielded VM is a Generation 2 VM that has a virtual Trusted Platform Module (TPM), is 
encrypted by using BitLocker, and can run only on approved hosts in the fabric. 

Reduce your datacenter footprint and increase availability with just-enough OS. 
The new Nano Server deployment option is 25 times smaller than Windows Server, while still 
offering a desktop experience. This minimizes the attack surface, increases availability, and 
reduces deployment time, resource usage, and startup time. 

Add even more protection to every deployment of Windows Server 2016. 
Whether you’re running in any cloud or on-premises, you can take advantage of additional 
security features such as Code Integrity and Control Flow Guard to ensure that only permitted 
binaries are run and protect against unknown vulnerabilities. 

Detect malicious behavior through enhanced security auditing optimized for threat detection. 
Using new audit categories for group membership and PNP to identify and add additional 
information to audit events, administrators can dive deeper than ever to discover new threats

Defend against malware attacks by using the built-in antimalware 
Windows Defender is now included in Windows Server 2016 and optimized to support the various 
server roles and integrate with Windows PowerShell for malware scanning. 

Limit exposure in case of a security intrusion 
If you were to suffer a security breach, Windows Server 2016 can limit the exposure by 
segmenting your network based on workload or business needs using a distributed firewall and 
network security groups. You can apply rich policies within and across segments. 

Use Hyper-V Containers for a unique additional level of isolation for containerized applications 
without any changes to the container image. 
Hyper-V containers provide isolation at the hardware level, giving administrators the peace of 
mind that they have come to appreciate with hardware-based virtualization protection as it 
incorporates the same isolation methods. 

Download 13,37 Mb.

Do'stlaringiz bilan baham:
1   ...   4   5   6   7   8   9   10   11   ...   131




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©www.hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish