This blog post was authored by Nir Ben Zvi, Principal PM Manager, Windows Server Security Team.
Windows Server 2016 includes built-in breach resistance mechanisms to thwart attacks on your systems and help meet compliance goals. Even if someone finds a way into your environment, the layers of security built into every Windows Server 2016 system limits the damage they can cause. Several credential isolation and threat defense capabilities are activated upon deployment. Other security features can be enabled as needed.
On Tuesday, August 8, 2017 from 9:00 AM to 10:00 AM Pacific, we will host a one-hour AMA (Ask Microsoft Anything) session to answer your questions about the security features of Windows Server. In this free session, you’ll be able to ask Microsoft experts your questions about the new layers of protection built into the operating system to further safeguard against security breaches. We have reserved an air-conditioned conference room and promised free snacks to lure members of our security team.
Our goal for this AMA is to help you understand how to:
- Block Pass-the-Hash attacks and other attempts to compromise admin credentials.
- Prevent malware and ransomware from being injected into servers.
- Quickly identify behavior that indicates a server breach.
- Extend protection that exists for your physical servers to your virtual machines.