Feeds

MS opens kimono on Windows 7 security features

Less invasive control

Internet Security Threat Report 2014

Microsoft has unveiled the security improvement is expects to deliver with Windows 7, the next version of its flagship operating system.

To coincide with the opening of the RSA Conference on Monday, Redmond unveiled a much more detailed list of security enhancements and tweaks. It is, of course, routine for Microsoft to describe the next version of its OS as the most secure it has ever created.

But leaving cynicism about such pronouncements to one side, there are a significant numbers of enhancements with Windows 7 in areas including remote access, biometric integration, and ease of use.

User account control (UAC), a feature that debuted with Vista, is been tuned to generate fewer invasive pop-ups.

BitLocker encryption will be extended to cover USB drives, a feature described as BitLocker To Go. A remote access feature, called DirectAccess, will be included that makes setting up secure remote access far easier than was previously possible. The same feature will allow sys admins to patch remotely-connected devices. Network Access Protection, a separate feature, can be used to restrict access to corporate networks to only fully-patched PCs.

Another feature, AppLocker, will give sys admins the ability to control what applications can run on corporate systems, including the ability to remotely purge disavowed applications.

Microsoft recommends that users run Windows 7 clients in conjunction with Windows 2008 R2 servers in order to get the benefit of BranchCache, a caching application that makes networked applications faster and more responsive.

A full run-down of the security features expected to ship with Windows 7 security can be found on the Windows Security Blog here. A shorter summary can be found on the Windows blog here. ®

Internet Security Threat Report 2014

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.