Protect your infrastructure with Secured-core server

Published 03-02-2021 06:00 AM 4,908 Views
Microsoft

Enhanced foundational security for Windows Server 2022 and Azure Stack HCI

 

Looking to the future, two clear trends are emerging. First, organizations around the world are building technologies, deploying applications and deploying services across the cloud and the edge. Many customers have similar goals: to thrive through improved information collection, more accurate decision making and more responsive services.  Associated with this, we see a tremendous investment in the infrastructure that ensures that these services are scalable and available.  Unfortunately, attackers are evolving to target this high value infrastructure with advanced technical capabilities. One example are marketplaces such as the MagBo portal.  This website provides access for a price to over 43,000 hacked servers, lowering the bar for entry to attack servers while providing attackers additional monetary incentives. Compromised servers are being used to mine cryptocurrency and also targeted for phishing and/or ransomware attacks.

    

Given the many incentives motivating these attacks, raising the bar for attackers is a clear and urgent need for Windows Server and Azure Stack HCI. Using our learnings from the Secured-core PC initiative, we are now bringing these innovations to Windows Server and Azure Stack HCI. In collaboration with our OEM partners and hardware ecosystem, we expect this effort to bring your devices advanced hardware-based protection, while maintaining ease of management.

 

Secured-core server

Like PCs, Secured-core server is built on three key pillars:

  • Simplified security
  • Advanced protection
  • Preventative defense

Simplified security

When customers acquire a Secured-core server, there is an assurance that the OEM has provided a set of hardware, firmware and drivers that satisfy the Secured-core promise.  Windows Server and Azure Stack HCI systems will have easy configuration experiences in the Windows Admin Center to enable the security features of Secured-core. With Integrated Azure Stack HCI systems, OEMs will also enable the operating system features by default, further simplifying the configuration for end customers.

 

Advanced protection

Secured-core servers use hardware, firmware and operating system capabilities to the fullest extent to provide protection against current and future threats. The protections enabled by a Secured-core server are targeted to create a secure platform for critical applications and data used on that server. The Secured-core functionality spans the following areas:

  • Hardware root-of-trust: Trusted Platform Module 2.0s (TPM 2.0) come standard with Secured-core servers. TPM 2.0 provides a secure store for sensitive keys and data, such as measurements of the components loaded during boot. This hardware root-of-trust raises the protection provided by capabilities like BitLocker which uses the TPM 2.0 and facilitates creating attestation-based workflows that can be incorporated into zero-trust security strategies.
  • Firmware protection: There is a clear rise in security vulnerabilities being reported in the firmware space given the high privileges that firmware runs with and the relative opacity of what happens in firmware to traditional anti-virus solutions. Recent reports show that malware and ransomware platforms like Trickbot are adding firmware capabilities raising the risk of firmware attacks. Trickbot has already been seen targeting enterprise resources like Active Directory domain controllers. Using processor support for Dynamic Root of Trust of Measurement (DRTM) technology, along with DMA protection, Secured-core systems isolate the security critical hypervisor from attacks such as this.
  • Virtualization-based security (VBS): Secured-core servers support VBS and hypervisor-based code integrity (HVCI). The cryptocurrency mining attack mentioned above leverages the EternalBlue exploit. VBS and HVCI protects against this entire class of vulnerabilities given the isolation VBS provides between the privileged parts of the operating system such as the kernel and the rest of the system. VBS also provides additional capabilities that customers can enable like Credential Guard which better protects domain credentials.

Preventative defense

Enabling Secured-core functionality helps proactively defend against and disrupt many of the paths attackers may use to exploit a system.  This set of defenses also enables IT and SecOps teams better leverage their time across the many areas that need their attention.    

 

Management made easy with the Windows Admin Center

Windows Admin Center now has capabilities to both report on the current state of Secured-core features and where applicable, allow customers to enable the features.

 

The Windows Admin Center security tool is currently available as a preview and can be accessed by the insider extensions feed. Navigate to aka.ms/WindowsAdminCenter to download the latest version of Windows Admin Center, and add aka.ms/wac-insiders-feed to your extension feed. Feedback can be shared through the Windows Admin Center User Voice: http://aka.ms/wacfeedback.

 

Windows Admin Center Security extension makes management easyWindows Admin Center Security extension makes management easy

End-to-end security

Secured-core servers complement other security capabilities in Windows Server 2022 across multiple areas. Taken together, Secured-core and Windows Server 2022 provide the comprehensive protection that servers need today.

 

  • Enhanced exploit protection: Hardware innovations allow for robust and performant implementations of exploit mitigations. Hardware-enforced Stack Protection will take advantage of the latest chipset security extension, Control flow Enforcement Technology. Windows Server 2022 and protected applications will be secured from a common exploit technique, return oriented programming (ROP), often used to hijack intended control flow of a program.
  • Connection security: Secure connections are at the heart of today’s interconnected systems. Transport Layer Security (TLS) 1.3 is the latest version of the internet’s most deployed security protocol, which encrypts data to provide a secure communication channel between two endpoints. TLS 1.3 eliminates obsolete cryptographic algorithms, enhances security over older versions, and aims to encrypt as much of the handshake as possible. Windows Server 2022 includes TLS 1.3 enabled by default, protecting the data of clients connecting to the server.
  • Improved account support for containers: Containers are being embraced by many customers as a preferred building block for their applications and services. Customers use group Managed Service Accounts (gMSA) as the recommended Active Directory identity solution for running a service across a server farm. Today, anyone trying to containerize their Windows services and applications that use gMSA is required to domain join their container host to enable gMSA functionality. This can cause scalability and management issues. Windows Server 2022 supports improvements to gMSA for Windows Containers that allow you to enable support for gMSA without domain joining the host.

For customers deploying Windows Server 2022 in Azure, the Azure Marketplace will have Windows Server 2022 virtual machine images available that have the Azure Security baselines configured by default, making it easier for customers to use Windows Server 2022 securely in Azure. More information on image configuration will be available through the Azure Security blog. 

 

Coming soon, with the support of the ecosystem

Secured-core servers across Windows Server 2022 and Azure Stack HCI will help customers stay ahead of attackers and protect their infrastructure across hardware, firmware, drivers and the operating system. Supported hardware will be available in future product generations from Intel, AMD and our vibrant OEM ecosystem.

 

%3CLINGO-SUB%20id%3D%22lingo-sub-2176002%22%20slang%3D%22en-US%22%3EProtect%20your%20infrastructure%20with%20Secured-core%20server%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2176002%22%20slang%3D%22en-US%22%3E%3CH1%20id%3D%22toc-hId-1274670679%22%20id%3D%22toc-hId-1274632051%22%3E%3CFONT%20size%3D%225%22%3EEnhanced%20foundational%20security%20for%20Windows%20Server%202022%20and%20Azure%20Stack%20HCI%3C%2FFONT%3E%3C%2FH1%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%3ELooking%3C%2FSPAN%3E%3CSPAN%3E%20to%20the%20future%2C%20%3C%2FSPAN%3Etwo%20clear%20trends%3CSPAN%3E%20are%20emerging%3C%2FSPAN%3E.%20%3CSPAN%3EFirst%2C%20%3C%2FSPAN%3E%3CSPAN%3Eo%3C%2FSPAN%3Erganizations%20around%20the%20world%20are%20%3CSPAN%3Ebuilding%20%3C%2FSPAN%3Etechnologies%3CSPAN%3E%2C%20deploying%20applications%20and%20%3C%2FSPAN%3E%3CSPAN%3Edeploying%20%3C%2FSPAN%3E%3CSPAN%3Eservices%3C%2FSPAN%3E%20across%20the%20cloud%20and%20%3CSPAN%3Ethe%20%3C%2FSPAN%3Eedge%3CSPAN%3E.%3C%2FSPAN%3E%20%3CSPAN%3EMany%20customers%20have%20similar%3C%2FSPAN%3E%3CSPAN%3E%20goals%3C%2FSPAN%3E%3CSPAN%3E%3A%20%3C%2FSPAN%3E%3CSPAN%3Eto%3C%2FSPAN%3E%20%3CSPAN%3Ethrive%3C%2FSPAN%3E%3CSPAN%3E%20through%20improved%20information%20collection%2C%20%3C%2FSPAN%3E%3CSPAN%3Emore%20accurate%20decision%20making%3C%2FSPAN%3E%3CSPAN%3E%20and%20more%20responsive%20services%3C%2FSPAN%3E.%3CSPAN%3E%26nbsp%3B%20Ass%3C%2FSPAN%3E%3CSPAN%3Eociated%20with%20this%2C%20we%20see%20a%20tremendous%20investment%20in%20%3C%2FSPAN%3E%3CSPAN%3Ethe%20%3C%2FSPAN%3E%3CSPAN%3Einfrastructure%20%3C%2FSPAN%3E%3CSPAN%3Ethat%20%3C%2FSPAN%3E%3CSPAN%3Eensure%3C%2FSPAN%3E%3CSPAN%3Es%3C%2FSPAN%3E%3CSPAN%3E%20that%20these%20services%20are%20scalable%20and%20available.%20%3C%2FSPAN%3E%26nbsp%3BUnfortunately%2C%20attackers%20%3CSPAN%3Eare%20evolving%20to%20%3C%2FSPAN%3Etarget%20%3CSPAN%3Ethis%20%3C%2FSPAN%3Ehigh%20value%20infrastructure%20with%20advanced%20technical%20capabilities.%20%3CSPAN%3EOne%20example%20%3C%2FSPAN%3E%3CSPAN%3Eare%20marketplaces%20such%20as%3C%2FSPAN%3E%20%3CSPAN%3Et%3C%2FSPAN%3Ehe%20%3CA%20href%3D%22https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fa-cybercrime-store-is-selling-access-to-more-than-43000-hacked-servers%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EMagBo%20portal%3C%2FA%3E%3CSPAN%3E.%26nbsp%3B%20This%20%3C%2FSPAN%3E%3CSPAN%3Ewebsite%3C%2FSPAN%3E%20provid%3CSPAN%3Ee%3C%2FSPAN%3E%3CSPAN%3Es%3C%2FSPAN%3E%20access%20for%20a%20price%20to%20over%2043%2C000%20hacked%20servers%3CSPAN%3E%2C%3C%2FSPAN%3E%20lowering%20the%20bar%20for%20entry%20to%20attack%20servers%20%3CSPAN%3Ewhile%20providing%20attackers%20additional%20monetary%20incentives%3C%2FSPAN%3E.%20Compromised%20servers%20are%20being%20used%20to%20%3CA%20href%3D%22https%3A%2F%2Fwww.bleepingcomputer.com%2Fnews%2Fsecurity%2Fcoinminer-campaigns-target-redis-apache-solr-and-windows-servers%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3Emine%20cryptocurrency%3C%2FA%3E%20and%20also%20targeted%20%3CSPAN%3Efor%20phishing%20and%2F%3C%2FSPAN%3Eor%20%3CA%20href%3D%22https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fhackers-target-unpatched-citrix-servers-to-deploy-ransomware%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3Eransomware%20attacks%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%26nbsp%3B%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3EGiven%20the%20%3CSPAN%3Emany%20%3C%2FSPAN%3Eincentives%20motivating%20these%20attacks%2C%20raising%20the%20bar%20for%20attackers%20is%20a%20clear%20%3CSPAN%3Eand%20urgent%20%3C%2FSPAN%3Eneed%20%3CSPAN%3Efor%20%3C%2FSPAN%3EWindows%20Server%20and%20Azure%20Stack%20HCI.%20Using%20our%20learnings%20from%20the%20Secured-core%20PC%20initiative%2C%20we%20are%20%3CSPAN%3Enow%20%3C%2FSPAN%3E%3CSPAN%3Ebringing%20these%20innovations%3C%2FSPAN%3E%20to%20Windows%20Server%20and%20Azure%20Stack%20HCI%3CSPAN%3E.%3C%2FSPAN%3E%20%3CSPAN%3EIn%20collaboration%20with%20our%20OEM%20partners%20and%20hardware%20ecosystem%2C%20w%3C%2FSPAN%3E%3CSPAN%3Ee%20expect%20this%20effort%20to%3C%2FSPAN%3E%20bring%20%3CSPAN%3Eyour%20devices%3C%2FSPAN%3E%20advanced%20hardware-based%20protection%2C%20%3CSPAN%3Ewhile%20maintaining%20ease%20of%20%3C%2FSPAN%3E%3CSPAN%3Emanagement%3C%2FSPAN%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH1%20id%3D%22toc-hId--532783784%22%20id%3D%22toc-hId--532822412%22%3E%3CFONT%20size%3D%225%22%3ESecured-core%20server%3C%2FFONT%3E%3C%2FH1%3E%0A%3CP%3ELike%20PCs%2C%20Secured-core%20server%20is%20built%20on%20three%20key%20pillars%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3ESimplified%20security%3C%2FLI%3E%0A%3CLI%3EAdvanced%20protection%3C%2FLI%3E%0A%3CLI%3EPreventative%20defense%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CEM%3ESimplified%20security%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3EWhen%20customers%20%3CSPAN%3Eacquir%3C%2FSPAN%3E%3CSPAN%3Ee%3C%2FSPAN%3E%20a%20Secured-core%20server%3CSPAN%3E%2C%3C%2FSPAN%3E%20the%3CSPAN%3Ere%20is%20an%3C%2FSPAN%3E%20assurance%20that%20the%20%3CSPAN%3EOEM%20has%20provided%20a%20set%20of%20%3C%2FSPAN%3Ehardware%3CSPAN%3E%2C%3C%2FSPAN%3E%20firmware%3CSPAN%3E%20and%20drivers%3C%2FSPAN%3E%3CSPAN%3E%20that%3C%2FSPAN%3E%20satisf%3CSPAN%3Ey%3C%2FSPAN%3E%20the%20Secured-core%20promise.%20%26nbsp%3BWindows%20Server%20and%20Azure%20Stack%20HCI%20systems%20will%20have%20easy%20configuration%20experiences%20in%20the%20Windows%20Admin%20Center%20to%20enable%20the%20security%20features%20of%20Secured-core.%20With%20Integrated%20Azure%20Stack%20HCI%20systems%2C%20OEMs%20will%20also%20enable%20the%20operating%20system%20features%20%3CSPAN%3Eby%20default%2C%20%3C%2FSPAN%3Efurther%20simplifying%20the%20configuration%20for%20end%20customers.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3EAdvanced%20protection%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3ESecured-core%20servers%20use%20hardware%2C%20firmware%20and%20operating%20system%20capabilities%20to%20the%20fullest%20extent%20to%20provide%20protection%20against%20current%20and%20future%20threats.%20The%20protections%20enabled%20by%20%3CSPAN%3Ea%20%3C%2FSPAN%3ESecured-core%20server%20are%20targeted%20to%20create%20a%20secure%20platform%20for%20critical%20applications%20and%20data%20used%20on%20th%3CSPAN%3Eat%3C%2FSPAN%3E%20server.%20The%20Secured-core%20functionality%20spans%20the%20following%20areas%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3EHardware%20root-of-trust%3C%2FSTRONG%3E%3A%20Trusted%20Platform%20Module%202.0s%20(TPM%202.0)%20come%20standard%20with%20Secured-core%20servers%3CSPAN%3E.%20TPM%202.0%3C%2FSPAN%3E%20provide%3CSPAN%3Es%3C%2FSPAN%3E%20a%20secure%20store%20for%20sensitive%20keys%20and%20data%2C%20%3CSPAN%3Esuch%20as%3C%2FSPAN%3E%20measurements%20of%20the%20components%20loaded%20during%20boot.%20This%20hardware%20root-of-trust%20raises%20the%20protection%20provided%20by%20capabilities%20like%20BitLocker%20which%20uses%20the%20TPM%202.0%20%3CSPAN%3Eand%20%3C%2FSPAN%3Efacilitates%20creating%20attestation-based%20workflows%20that%20can%20be%20incorporated%20into%20zero-trust%20security%20strategies.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EFirmware%20protection%3C%2FSTRONG%3E%3A%20There%20is%20a%20clear%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F10%2F21%2Fmicrosoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Erise%20in%20security%20vulnerabilities%3C%2FA%3E%20being%20reported%20in%20the%20firmware%20space%20given%20the%20high%20privileges%20that%20firmware%20runs%20with%20and%20the%20relative%20opacity%20of%20what%20happens%20in%20firmware%20to%20traditional%20anti-virus%20solutions.%20Recent%20reports%20show%20that%20malware%20and%20ransomware%20platforms%20like%20Trickbot%20are%20%3CA%20href%3D%22https%3A%2F%2Fwww.bleepingcomputer.com%2Fnews%2Fsecurity%2Ftrickbots-new-module-aims-to-infect-your-uefi-firmware%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3Eadding%20firmware%20capabilities%3C%2FA%3E%20raising%20the%20risk%20of%20firmware%20attacks.%20Trickbot%20has%20already%20been%20seen%20targeting%20enterprise%20resources%20like%3CA%20href%3D%22https%3A%2F%2Fwww.bleepingcomputer.com%2Fnews%2Fsecurity%2Ftrickbot-now-steals-windows-active-directory-credentials%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%20Active%20Directory%20domain%20controllers%3C%2FA%3E.%20Using%20processor%20support%20for%20Dynamic%20Root%20of%20Trust%20of%20Measurement%20(DRTM)%20technology%2C%20along%20with%20DMA%20protection%2C%20Secured-core%20systems%20isolate%20the%20security%20critical%20hypervisor%20from%20attack%3CSPAN%3Es%20such%20as%20this.%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EVirtualization-based%20security%20(VBS)%3C%2FSTRONG%3E%3A%20Secured-core%20servers%20support%20VBS%20and%20hypervisor-based%20code%20integrity%20(HVCI).%20The%20cryptocurrency%20mining%20attack%20mentioned%20%3CSPAN%3Eabove%20%3C%2FSPAN%3Eleverage%3CSPAN%3Es%3C%2FSPAN%3E%20the%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2017%2F06%2F30%2Fexploring-the-crypt-analysis-of-the-wannacrypt-ransomware-smb-exploit-propagation%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EEternalBlue%20exploit%3C%2FA%3E%3CSPAN%3E.%3C%2FSPAN%3E%20VBS%20and%20HVCI%20protects%20against%20this%20entire%20class%20of%20vulnerabilities%20given%20the%20isolation%20VBS%20provides%20between%20the%20privileged%20parts%20of%20the%20operating%20system%20%3CSPAN%3Esuch%20as%3C%2FSPAN%3E%20the%20kernel%20and%20the%20rest%20of%20the%20system.%20VBS%20also%20provides%20additional%20capabilities%20that%20customers%20can%20enable%20like%20Credential%20Guard%20which%20better%20protects%20domain%20credentials.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CEM%3EPreventative%20defense%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3EEnabling%20Secured-core%20functionality%20helps%20proactively%20%3CSPAN%3Edefend%20against%20and%20disrupt%3C%2FSPAN%3E%20many%20%3CSPAN%3Eof%20the%20%3C%2FSPAN%3Epaths%20attackers%20may%20%3CSPAN%3Euse%3C%2FSPAN%3E%20to%20exploit%3CSPAN%3E%20a%20system.%26nbsp%3B%20%3C%2FSPAN%3E%3CSPAN%3EThis%20set%20of%20defenses%20also%20enables%3C%2FSPAN%3E%20IT%20and%20SecOps%20teams%20better%20leverage%20their%20time%20across%20the%20many%20areas%20that%20need%20their%20attention.%20%26nbsp%3B%26nbsp%3B%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH1%20id%3D%22toc-hId-1954729049%22%20id%3D%22toc-hId-1954690421%22%3E%3CFONT%20size%3D%225%22%3EManagement%20made%20easy%20with%20the%20Windows%20Admin%20Center%3C%2FFONT%3E%3C%2FH1%3E%0A%3CP%3EWindows%20Admin%20Center%20%3CSPAN%3Enow%20has%3C%2FSPAN%3E%20capabilities%20to%20both%20report%20on%20the%20current%20state%20of%20%3CSPAN%3ESecured-core%20%3C%2FSPAN%3Efeatures%20and%20where%20applicable%2C%20allow%20customers%20to%20enable%20the%20features.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20Windows%20Admin%20Center%20security%20tool%20is%20currently%20available%20as%20a%20preview%20and%20can%20be%20accessed%20by%20the%20%3CSPAN%3Einsider%20%3C%2FSPAN%3Eextensions%20feed.%20Navigate%20to%20aka.ms%2FWindowsAdminCenter%20to%20download%20the%20latest%20version%20of%20Windows%20Admin%20Center%3CSPAN%3E%2C%20and%20add%20aka.ms%2Fwac-insiders-feed%20to%20your%20extension%20feed%3C%2FSPAN%3E.%3CSPAN%3E%20Feedback%20can%20be%20shared%20through%20the%20Windows%20Admin%20Center%20User%20Voice%3A%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22http%3A%2F%2Faka.ms%2Fwacfeedback%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%3CSPAN%3Ehttp%3A%2F%2Faka.ms%2Fwacfeedback%3C%2FSPAN%3E%3C%2FA%3E.%3C%2FP%3E%0A%3CDIV%20id%3D%22tinyMceEditorNazmus%20Sakib_0%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Secured-CoreWAC.PNG%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F259392i49025737C2E73C26%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Secured-CoreWAC.PNG%22%20alt%3D%22Windows%20Admin%20Center%20Security%20extension%20makes%20management%20easy%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EWindows%20Admin%20Center%20Security%20extension%20makes%20management%20easy%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH1%20id%3D%22toc-hId-147274586%22%20id%3D%22toc-hId-147235958%22%3E%3CFONT%20size%3D%225%22%3EEnd-to-end%20security%3C%2FFONT%3E%3C%2FH1%3E%0A%3CP%3ESecured-core%20servers%20complement%20other%20security%20capabilities%20in%20Windows%20Server%202022%20across%20multiple%20areas.%20Taken%20together%2C%20Secured-core%20and%20Windows%20Server%202022%20provide%20the%20comprehensive%20protection%20that%20servers%20need%20today.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CSTRONG%3EEnhanced%20exploit%20protection%3C%2FSTRONG%3E%3A%20Hardware%20innovations%20allow%20for%20robust%20and%20performant%20implementations%20of%20exploit%20mitigations.%20Hardware-enforced%20Stack%20Protection%20will%20take%20advantage%20of%20the%20latest%20chipset%20security%20extension%2C%20Control%20flow%20Enforcement%20Technology.%20Windows%20Server%202022%20and%20protected%20applications%20will%20be%20secured%20from%20a%20common%20exploit%20technique%2C%20return%20oriented%20programming%20(ROP)%2C%20often%20used%20to%20hijack%20intended%20control%20flow%20of%20a%20program.%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EConnection%20security%3C%2FSTRONG%3E%3A%20Secure%20connections%20are%20at%20the%20heart%20of%20today%E2%80%99s%20interconnected%20systems.%20%3CSPAN%3ETransport%20Layer%20Security%20(TLS)%201.3%20is%20the%20latest%20version%20of%20the%20internet%E2%80%99s%20most%20deployed%20security%20protocol%2C%20which%20encrypts%20data%20to%20provide%20a%20secure%20communication%20channel%20between%20two%20endpoints.%20TLS%201.3%20eliminates%20obsolete%20cryptographic%20algorithms%2C%20enhances%20security%20over%20older%20versions%2C%20and%20aims%20to%20encrypt%20as%20much%20of%20the%20handshake%20as%20possible.%3C%2FSPAN%3E%3CSPAN%3E%20Windows%20Server%202022%20includes%20TLS%201.3%20enab%3C%2FSPAN%3E%3CSPAN%3Eled%20by%20default%2C%20protecting%20the%20data%20of%20%3C%2FSPAN%3E%3CSPAN%3Eclients%20connecting%20to%20the%20server.%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%3CSTRONG%3EImproved%20account%20support%20for%20containers%3A%20%3C%2FSTRONG%3EContainers%20are%20being%20embraced%20by%20many%20customers%20as%20a%20preferred%20building%20block%20for%20their%20applications%20and%20services.%20Customers%20use%20group%20Managed%20Service%20Accounts%20(%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows-server%2Fsecurity%2Fgroup-managed-service-accounts%2Fgroup-managed-service-accounts-overview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EgMSA%3C%2FA%3E)%20as%20the%20recommended%20Active%20Directory%20identity%20solution%20for%20running%20a%20service%20across%20a%20server%20farm.%20Today%2C%20anyone%20trying%20to%20containerize%20their%20Windows%20services%20and%20applications%20that%20use%20gMSA%20is%20required%20to%20domain%20join%20their%20container%20host%20to%20enable%20gMSA%20functionality.%20This%20can%20cause%20scalability%20and%20management%20issues.%20Windows%20Server%202022%20supports%20improvements%20to%20gMSA%20for%20Windows%20Containers%20that%20allow%20you%20to%20enable%20support%20for%20gMSA%20without%20domain%20joining%20the%20host.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EFor%20customers%20deploying%20Windows%20Server%202022%20in%20Azure%2C%20the%20Azure%20Marketplace%20will%20have%20Windows%20Server%202022%20virtual%20machine%20images%20available%20that%20have%20the%20Azure%20Security%20baselines%20configured%20by%20default%2C%20making%20it%20easier%20for%20customers%20to%20use%20Windows%20Server%202022%20securely%20in%20Azure.%20More%20information%20on%20image%20configuration%20will%20be%20available%20through%20the%20Azure%20Security%20blog.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH1%20id%3D%22toc-hId--1660179877%22%20id%3D%22toc-hId--1660218505%22%3E%3CFONT%20size%3D%225%22%3EComing%20soon%2C%20with%20the%20support%20of%20the%20ecosystem%3C%2FFONT%3E%3C%2FH1%3E%0A%3CP%3ESecured-core%20servers%20across%20Windows%20Server%202022%20and%20Azure%20Stack%20HCI%20will%20help%20customers%20stay%20ahead%20of%20attackers%20and%20protect%20their%20infrastructure%20across%20hardware%2C%20firmware%3CSPAN%3E%2C%20drivers%3C%2FSPAN%3E%20and%20the%20operating%20system.%20Supported%20hardware%20will%20be%20available%20in%20future%20product%20generations%20from%20Intel%2C%20AMD%20and%20our%20vibrant%20OEM%20ecosystem.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2176002%22%20slang%3D%22en-US%22%3E%3CP%3EEnhanced%20foundational%20security%20for%20Windows%20Server%202022%20and%20Azure%20Stack%20HCI%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2176002%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EThreat%20Protection%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Version history
Last update:
‎May 11 2021 02:03 PM
Updated by: