Windows 10 news you can use, July 2019 edition. Insights into Windows 10 deployment & management, security & compliance, and productivity & accessibility.
Deployment & Management
Microsoft is often asked to help customers choose between Windows 10 Enterprise or Windows 10 Pro. Specifically to clarify the differences between the two editions, and the impact those differences might have to your organization. With that in mind, we decided to take a closer look at these conversations—and the key considerations when it comes to deciding between Windows 10 Enterprise and Windows 10 Pro for your organization—by talking with Nick and Shawn, two technical specialists focusing in Windows deployments. https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-Enterprise-vs-Windows-10-Pro-Modern-management/ba-p/720445
Webinar (59:52) – experts at Microsoft Core Services Engineering and Operations answered questions about their modern desktop and device management. They discussed the processes and tools used to support a wide range of scenarios as well as the use of Intune, SCCM, WUfB, Azure AD, and transition to modern management. https://www.microsoft.com/en-us/itshowcase/it-expert-roundtable-modern-desktop-and-device-management
Video (58:40) – In today’s world, device health is a pillar of security. Unmanaged devices are a powerful entry point for malicious parties, and it is vital that only healthy devices can access critical apps and data. Learn about device health, device security at Microsoft, and key investment areas Microsoft are pursuing. https://www.microsoft.com/en-us/itshowcase/speaking-of-security-device-health
Microsoft’s vision for Windows is one of a passwordless platform—a world where users don’t have to deal with the pains of a password. With the release of Windows 10, version 1903, we’re bringing Windows 10 closer to delivering our passwordless user and security promises, with new features that we’re excited for you to try. https://www.microsoft.com/security/blog/2019/06/10/advancing-windows-10-passwordless-platform
New documentation for building secure, privileged access workstations! Secured isolated workstations are critically important for the security of sensitive roles like administrators, developers, and operators of critical services. Build a secure client workstation with these detailed step by step instructions, including how to set up starting security controls. https://docs.microsoft.com/en-us/azure/active-directory/devices/concept-azure-managed-workstation
Easier navigation with Windows 10 tablet mode. Using Tablet mode in Windows 10 can make it easier to browse the web and it can also free up room on your screen. But it isn’t just for touchscreen devices. This article will go over how to enter/exit Tablet mode followed by an overview of the information needed to navigate it. https://community.windows.com/en-us/stories/easier-navigation-with-windows-10-tablet-mode
Check out the most recent and greatest Edge features. From being able to mute tabs, to clutter-free printing, to various grammar tools. https://www.youtube.com/watch?v=i0gIzCZoaRU
Video (6:29) – Passwords are inherently insecure and requiring employees to change their corporate password every few months is frustrating and futile. By eliminating passwords, security is improved and employees have a much better experience. In this video the CISO at Microsoft, talks about why he is eliminating passwords. https://www.microsoft.com/en-us/itshowcase/microsofts-ciso-series-eliminating-passwords
Video (25:02) – Windows 10 co-management vs. co-existence. Learn about Windows PCs in the modern workplace and what it means to manage them. They spend time delving into the reasons why co-management is better than co-existence and why ONLY Intune and ConfigMgr can provide co-management. https://channel9.msdn.com/Series/Endpoint-Zone/Endpoint-zone-1906-co-management-vs-co-existence
Experts estimate that ransomware attacks are up over 600 percent. For most companies, the issue isn’t if a cyberattack is going to happen, but when. Some security experts advise that the best way to recover from a security breach is to plan for it before it happens. The team from Microsoft Security takes you through 1) strategies for building a plan for a cybersecurity attack, 2) four tips for sharing information with your customers, and 3) how to mitigate or prevent cyber incidents. https://www.microsoft.com/security/blog/2019/06/17/how-to-recover-from-a-security-breach