Mark's Webcasts: Windows Security Boundries

Published Jun 27 2019 11:46 AM 97 Views
Microsoft
First published on TechNet on Jul 30, 2008

Windows Security Boundries : Mark’s session from TechEd US on what constitutes a security boundary is now available for on-demand viewing. Get the real story on Windows security-related features like Kernel Patch Protection (KPP), Kernel Mode Code Integrity, User sessions, UAC, Protected Mode IE, and more, to find out how they work, what they were designed for, and whether they are security boundaries.

%3CLINGO-SUB%20id%3D%22lingo-sub-725813%22%20slang%3D%22en-US%22%3EMark's%20Webcasts%3A%20Windows%20Security%20Boundries%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-725813%22%20slang%3D%22en-US%22%3E%0A%20%26lt%3Bmeta%20http-equiv%3D%22Content-Type%22%20content%3D%22text%2Fhtml%3B%20charset%3DUTF-8%22%20%2F%26gt%3B%3CSTRONG%3E%20First%20published%20on%20TechNet%20on%20Jul%2030%2C%202008%20%3C%2FSTRONG%3E%20%3CBR%20%2F%3E%3CP%20class%3D%22MsoNormal%22%20style%3D%22MARGIN%3A%200in%200in%200pt%22%3E%3CSPAN%20style%3D%22COLOR%3A%20%231f497d%22%3E%20%3CFONT%20size%3D%223%22%3E%20%3CFONT%20face%3D%22Calibri%22%3E%20%3CA%20class%3D%22%22%20href%3D%22http%3A%2F%2Fwww.microsoft.com%2Femea%2Fspotlight%2Fsessionh.aspx%3Fvideoid%3D993%22%20mce_href%3D%22http%3A%2F%2Fwww.microsoft.com%2Femea%2Fspotlight%2Fsessionh.aspx%3Fvideoid%3D993%22%20title%3D%22Windows%20Security%20Boundries%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3E%20Windows%20Security%20Boundries%20%3C%2FA%3E%20%3A%20Mark%E2%80%99s%20session%20from%20TechEd%20US%20on%20what%20constitutes%20a%20security%20boundary%20is%20now%20available%20for%20on-demand%20viewing.%20Get%20the%20real%20story%20on%20Windows%20security-related%20features%20like%20Kernel%20Patch%20Protection%20(KPP)%2C%20Kernel%20Mode%20Code%20Integrity%2C%20User%20sessions%2C%20UAC%2C%20Protected%20Mode%20IE%2C%20and%20more%2C%20to%20find%20out%20how%20they%20work%2C%20what%20they%20were%20designed%20for%2C%20and%20whether%20they%20are%20security%20boundaries.%20%3C%2FFONT%3E%3C%2FFONT%3E%3C%2FSPAN%3E%3C%2FP%3E%3CP%3E%3C%2FP%3E%0A%20%20%20%20%20%0A%20%20%20%20%0A%20%20%20%0A%20%20%3CP%3E%3C%2FP%3E%0A%20%0A%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-725813%22%20slang%3D%22en-US%22%3EFirst%20published%20on%20TechNet%20on%20Jul%2030%2C%202008%20Windows%20Security%20Boundries%3A%20Mark%E2%80%99s%20session%20from%20TechEd%20US%20on%20what%20constitutes%20a%20security%20boundary%20is%20now%20available%20for%20on-demand%20viewing.%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-725813%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3Esysinternals%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EWebcast%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Version history
Last update:
‎Jun 27 2019 11:47 AM
Updated by: