Windows 10

Windows 10 News You Can Use – October 2018

Posted on

Win10NewsLogo Providing insights into Windows 10 deployment & management, security & compliance, and productivity.

 

Microsoft Ignite 2018

There were more than 100 sessions focused on Windows at Microsoft Ignite 2018, and everything from a first look at Desktop Analytics and the Microsoft Managed Desktop to deep dives on Windows Autopilot, Windows servicing, Delivery Optimization, and credential protection, and so much more. Here is a list of the activities that took place for you to review and learn about.
https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/A-guide-to-Windows-at-Microsoft-Ignite-2018/ba-p/260409

The Microsoft Ignite 2018 Book of News is your guide to ALL the announcements that Microsoft made on Sept. 24, with summaries of the news and links to more information.

Why and how you simplify IT with Microsoft 365. At Microsoft Ignite, Brand Anderson showed 75 minutes worth of examples of how Microsoft has applied a new philosophy to the way we build tools and services for IT pros. We refer to this approach to architecture, development, and end-user experience in Microsoft 365 as being “Integrated for Simplicity.” Our goal with this integrated simplicity is to make it as easy as possible for our customers to shift to a modern desktop and make their modern workplace a reality.
https://www.microsoft.com/en-us/microsoft-365/blog/2018/09/28/why-and-how-you-simplify-it-with-microsoft-365

Deployment & Management
  1. Free e-book from Microsoft on making the shift to a modern desktop with Microsoft 365. It summarizes top considerations for deploying new PCs or getting PCs back to a business ready state, starting with some of the key things that may have changed since your last major desktop deployment. Followed by a pragmatic step-by-step approach to making the shift.
    https://info.microsoft.com/ww-landing-M365MD-making-the-shift-to-the-modern-desktop-eBook.html
  2. Announcing the Microsoft Managed Desktop (MMD), a new initial offering that brings together Microsoft 365 Enterprise, device as a service, and cloud-based device management by Microsoft. MMD enables customers to maximize their IT organizations’ focus on their business while Microsoft manages their modern desktops. We believe that MMD will be an option that allows organizations to fundamentally shift how they think about and manage their IT. Through MMD, customers will be able to move toward a secure, always up-to-date environment with device management by Microsoft.
    https://www.microsoft.com/en-us/microsoft-365/blog/2018/09/17/collaborating-with-customers-and-partners-to-deliver-a-modern-desktop-microsoft-managed-desktop
  3. Join Microsoft CVP Brad Anderson to discover the benefits of a modern desktop, major changes and considerations versus previous deployments and best practices to ensure a smooth transition to Windows 10 and Office 365 ProPlus. This will guide you through the recommended steps for your shift to Windows 10 and Office 365 ProPlus, detailing how to leverage your existing tools and processes while adopting modern management technology and approaches along the way.
    https://techcommunity.microsoft.com/t5/IT-Resources-Training-Blog/How-to-shift-to-a-modern-desktop/ba-p/259907
  4. A modern desktop offers end users the most productive, most secure computing experience—it also saves IT time and money, so you can focus on driving business results. To help you make the shift to a modern desktop, we’re pleased to announce the following important changes. (a) Cloud-based analytics tools to make modern desktop deployment even easier. (b) A program to ensure app compatibility for upgrades and updates of Windows and Office. (c) Servicing and support changes to give you additional deployment flexibility.
    https://www.microsoft.com/en-us/microsoft-365/blog/2018/09/06/helping-customers-shift-to-a-modern-desktop
  5. Windows Autopilot now includes delivering BitLocker policy at OOBE, so you no longer have to decrypt and re-encrypt to get automatic BitLocker devices to meet policy (e.g. 256-bit encryption).
    https://docs.microsoft.com/en-us/windows-insider/at-work-pro/wip-4-biz-whats-new#delivering-bitlocker-policy-to-autopilot-devices-during-oobe
  6. Forrester found that Unified Endpoint Management (UEM) is finally a viable alternative to managing PCs and mobile devices separately. Download the free report which holds a comprehensive overview of the current UEM space—along with vendor recommendations, best practices, and caveats.
    https://resources.office.com/ww-landing-M365PD-Forrester-UEM-Finally-Arrives-WhitePaper.html
  7. Reduced Windows 10 package size downloads for x64 systems! The new feature updates, released as Electronic Software Distribution (ESD) files through WSUS, provide you with the option to download the x64 file as a separate package. By separating the files by system type, the download file becomes approximately 2.6 GB for the x64 package, saving you approximately 2.2 GB of download size immediately.
    https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Reduced-Windows-10-package-size-downloads-for-x64-systems/ba-p/262386
  8. Major updates to documentation on Windows Hello for Business!
    https://aka.ms/whfb
  9. Use the “Flight Hub” dashboard to quickly identify the latest Windows Insider Preview releases for PC, Server, IoT. You can also look up the status of the SDK and ISO images.
    https://docs.microsoft.com/en-us/windows-insider/flight-hub
Security & Compliance
  1. Windows Defender Antivirus consistently achieves high scores in independent tests, displaying how it is a top choice in the antivirus market. We want to be transparent and have gathered top industry reports that demonstrate our enterprise antivirus capabilities.
    https://docs.microsoft.com/en-us/windows/security/threat-protection/intelligence/top-scoring-industry-antivirus-tests
  2. Out of sight but not invisible: Defeating fileless malware with behavior monitoring, AMSI, and next-gen AV.
    https://cloudblogs.microsoft.com/microsoftsecure/2018/09/27/out-of-sight-but-not-invisible-defeating-fileless-malware-with-behavior-monitoring-amsi-and-next-gen-av
  3. Cyber thieves are catching on that we are watching them, so they are trying something different. A new malware campaign puts that to the test by targeting home users and small businesses in specific US cities. This was a focused, highly localized attack that aimed to steal sensitive info from just under 200 targets. Macro-laced documents masqueraded as statements from legitimate businesses. The documents are then distributed via email to target victims in cities where the businesses are located. With Windows Defender AVs next gen defense, however, the size of the attack doesn’t really matter.
    https://cloudblogs.microsoft.com/microsoftsecure/2018/09/06/small-businesses-targeted-by-highly-localized-ursnif-campaign
  4. We have seen many IT departments simplify their deployment strategies using Windows Update for Business to more quickly improve productivity and the Windows 10 experience for their end users. Learn about the experience of one of those customers to help you better understand how you can leverage Windows Update for Business—in conjunction with Windows Analytics—to help you do the same.
    https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-Update-for-Business-amp-Windows-Analytics-a-real-world/ba-p/242417
  5. Windows Defender ATP September 2018 preview features are out!
    https://techcommunity.microsoft.com/t5/What-s-New/WDATP-September-2018-preview-features-are-out/m-p/242254#M95
  6. Video: In software supply chain attacks, attackers infect legitimate apps to distribute malware. Attackers target software developers and suppliers, seeking access to source codes, build processes, or update mechanisms. They hunt for unsecure network protocols, unprotected server infrastructures, and unsafe coding practices. Protect yourself, your customers, and your partners by strengthening your defenses against software supply chain attacks. Windows Defender Advanced Threat Protection’s security technologies are built into Windows 10 and create a unified endpoint security platform to defend against supply chain attacks.
    https://www.youtube.com/watch?v=uXm2XNSavwo
Productivity
  1. Windows 10 Tip: Set up Windows Hello from your lock screen.
    http://blogs.windows.com/windowsexperience/2018/09/10/windows-10-tip-set-up-windows-hello-from-your-lock-screen
  2. Windows 10 Tip: Improvements to the HDR video experience.
    http://blogs.windows.com/windowsexperience/2018/09/04/windows-10-tip-improvements-to-the-hdr-video-experience
  3. Windows 10 Tip: Get mobile with Microsoft Edge.
    http://blogs.windows.com/windowsexperience/2018/09/17/windows-10-tip-get-mobile-with-microsoft-edge
  4. Watch our how-to video and have fun using a digital pen in Microsoft Office on your Surface. Edit your writing naturally, create standout presentations, and learn to design and use features like Ink Editor, Ink-to-Text, Remix 3D, Math Assist, and more.
    https://www.youtube.com/watch?v=U85n5sltzZw
In other news related to Windows 10…
Advertisements

Windows 10 News You Can Use – September 2018

Posted on Updated on

Win10NewsLogo Providing insights into Windows 10 deployment & management, security & compliance, and productivity.

1)      Microsoft has heard from many customers to better understand the monthly Windows 10 quality update servicing cadence and terminology. In response, John Wilcox (principal program manager) shares the guiding principles, then dives into them further to provide context for the quality updates themselves.
https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-update-servicing-cadence/ba-p/222376

2)      What’s next for Windows 10 and Windows Server quality updates.  Beginning February 12, 2019, Microsoft will end its practice of creating delta updates for all versions of Windows 10.  In its place, a new design for quality updates to the next major versions of Windows 10 and Windows Server, coming later this year. This design creates a compact update package for easier and faster deployment.
https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-next-for-Windows-10-and-Windows-Server-quality-updates/ba-p/229461

3)      With new improvements in Windows 10 MDM management, advancements in cloud technology, and BYOD trends, many organizations are looking for modern ways to management their Windows devices. Watch this recorded webinar session to see how you can leverage a modern management approach with Enterprise Mobility + Security (EMS) to simplify deployment and management, improve security, provide better end user experiences, and lower total cost of ownership for your Windows 10 devices.
https://resources.office.com/ModernWindows10managementwithEnterpriseMobilitySecurityEMS-OnDemandRegistration.html

4)      Basic (but easy to forget) tips to remediate Windows application compatibility challenges.
https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Basic-but-easy-to-forget-tips-to-remediate-Windows-app-compat/ba-p/238308

Security & Compliance

1)      Improve your defensive posture with Exploit Guard Attack Surface Reduction (ASR).  See this step-by-step guide from Microsoft’s Chris Jackson on how to configure, monitor, and deploy ASR while maintaining application compatibility.
https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Improve-your-defensive-posture-with-Exploit-Guard-ASR/ba-p/22494

2)      Interpreting Windows 10 Exploit Guard ASR audit alerts.  Learn about when to test and when not to.
https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Interpreting-Exploit-Guard-ASR-audit-alerts/ba-p/228366

3)      If you want an additional layer of protection from ransomware, try saving your files in OneDrive. It’s part of the new experiences that arrived with the Windows 10 April 2018 Update. Here’s how it works: If a ransomware threat is found on a device, Windows Defender will notify you of the threat, help you remove the ransomware from your device, and give you options to recover your OneDrive files to the state they were in before the attack occurred.
http://blogs.windows.com/windowsexperience/2018/08/06/save-your-files-to-onedrive-for-expanded-ransomware-protection

4)      Hardening Windows Defender ATP machine learning defenses against adversarial attacks.
https://cloudblogs.microsoft.com/microsoftsecure/2018/08/09/protecting-the-protector-hardening-machine-learning-defenses-against-adversarial-attacks

5)      Protecting the modern workplace from a wide range of undesirable software. To protect our customers from the latest threats, massive amounts of security signals and threat intelligence from the Microsoft Intelligent Security Graph are processed by security analysts and intelligent systems that identify malicious and other undesirable software. Our evaluation criteria describe the characteristics and behavior of malware and potentially unwanted applications and guide the proper identification of threats. https://cloudblogs.microsoft.com/microsoftsecure/2018/08/07/protecting-the-modern-workplace-from-a-wide-range-of-undesirable-software

Productivity

1)      Windows 10 Tip: Use Paint 3D to edit your snips.
http://blogs.windows.com/windowsexperience/2018/08/20/windows-10-tip-use-paint-3d-to-edit-your-snips

In other news related to Windows 10…

Windows 10 News You Can Use – August 2018

Posted on Updated on

Win10NewsLogo Providing insights into Windows 10 deployment & management, security & compliance, and productivity.

On July 10th, Windows 10 version 1803 was declared as a fully available Semi-Annual Channel (aka CBB) release. Be sure to also review “What’s new for IT pros in Windows 10, version 1803” at
https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/What-s-new-for-IT-pros-in-Windows-10-version-1803/ba-p/188568.

Deployment & Management

1)      Windows 10 quality updates explained & the end of delta updates. Beginning February 12, 2019 Microsoft will deprecate delta updates for all versions of Windows 10.  Learn about the role of Express Updates to reduce the impact to network delivery of quality updates.
https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-quality-updates-explained-amp-the-end-of-delta/ba-p/214426

2)      Forrester Study: Modernize Your Device Management Using the Cloud (whitepaper, updated June 2018).
https://resources.office.com/ModernizeYourDeviceManagementThankYou.html

3)      Detailed information on how Upgrade Readiness collects application inventory for your OMS workspace.  Includes info about data collection, appraiser updates, best practices, and troubleshooting!
https://techcommunity.microsoft.com/t5/Windows-Analytics-Blog/How-Upgrade-Readiness-collects-application-inventory-for-your/ba-p/213586

4)      Most companies manage their PCs and mobile devices with separate management tools. In a recent report, Forrester found that Unified Endpoint Management (UEM) is now a more optimal option—and a good way to help organizations modernize their management strategies.  Download this Forrester report to learn more.
https://resources.office.com/ww-landing-M365PD-Forrester-UEM-Finally-Arrives-WhitePaper.html

5)      Microsoft Mechanics’ 7-minute video which explores the latest capabilities in Windows Analytics across Upgrade Readiness, Update Compliance, and Device Health.
https://www.youtube.com/watch?v=4Kb78NmfV6E

6)      Best practices and recommendations for deploying Windows 10 Feature updates to mission critical devices.
https://docs.microsoft.com/en-us/windows/deployment/update/feature-update-mission-critical

7)      Suggested in-depth guidance on Windows Update for Business policies and how they have changed over time.
https://docs.microsoft.com/en-us/windows/deployment/update/wufb-onboard

8)      We are happy to announce that the MSIX Packaging Tool (Preview) is now available to from the Microsoft Store. MSIX Packaging Tool enables you to update your existing win32 application packages to the MSIX format.
https://techcommunity.microsoft.com/t5/MSIX-Blog/MSIX-Packaging-Tool-Preview-is-now-available-from-the-Microsoft/ba-p/216204

Security & Compliance

1)      Windows Defender Antivirus (WDAV) scores in the March-April 2018 tests. In this new iteration of the transparency report, we continue to investigate the relationship of independent test results and the real-world protection of antivirus solutions. We hope that you find the report insightful.
https://cloudblogs.microsoft.com/microsoftsecure/2018/07/20/march-april-2018-test-results-more-insights-into-industry-av-tests

2)      Introducing Web Authentication in Microsoft Edge.  With Web Authentication, Microsoft Edge users can sign in with their face, fingerprint, PIN, or portable FIDO2 devices, leveraging strong public-key credentials instead of passwords.
http://blogs.windows.com/msedgedev/2018/07/30/introducing-web-authentication-microsoft-edge

3)      Security Updates around side-channel speculative execution vulnerabilities (Spectre and Meltdown). New Disclosure: On June 13, 2018, an additional vulnerability involving side channel speculative execution, known as Lazy FP State Restore, was announced and assigned CVE-2018-3665. For more information about this vulnerability and recommended actions, please refer to the Security Advisory: ADV180016 | Microsoft Guidance for Lazy FP State Restore.
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV180016

4)      A new software supply chain attack unearthed by Windows Defender Advanced Threat Protection (Windows Defender ATP) emerged as an unusual multi-tier case. Unknown attackers compromised the shared infrastructure in place between the vendor of a PDF editor application and one of its software vendor partners, making the app’s legitimate installer the unsuspecting carrier of a malicious payload. The attack seemed like just another example of how cybercriminals can sneak in malware using everyday normal processes. The plot twist: The app vendor’s systems were unaffected. The compromise was traceable instead to a second software vendor that hosted additional packages used by the app during installation. This turned out be an interesting and unique case of an attack involving “the supply chain of the supply chain”.
https://cloudblogs.microsoft.com/microsoftsecure/2018/07/26/attack-inception-compromised-supply-chain-within-a-supply-chain-poses-new-risks

5)      Hawkeye Keylogger – Reborn v8: An in-depth campaign analysis.  Includes the roles that Windows Defender Antivirus and Windows Defender ATP played in the security protections.
https://cloudblogs.microsoft.com/microsoftsecure/2018/07/11/hawkeye-keylogger-reborn-v8-an-in-depth-campaign-analysis

Productivity

1)      Windows 10 Tip: Yikes, stop that sound! Mute-a-tab in Microsoft Edge.
http://blogs.windows.com/windowsexperience/2018/07/02/windows-10-tip-yikes-stop-that-sound-mute-a-tab-in-microsoft-edge

2)      Windows 10 Tip: Get more out of reading online with Grammar Tools in Microsoft Edge.
http://blogs.windows.com/windowsexperience/2018/07/09/windows-10-tip-get-more-out-of-reading-online-with-grammar-tools-in-microsoft-edge

3)      Windows 10 Tip: Windows Ink directly in textbox.
http://blogs.windows.com/windowsexperience/2018/07/16/windows-10-tip-windows-ink-directly-in-textbox-new-in-the-windows-10-april-2018-update

4)      Windows 10 Tip: Try reading on a full screen for a distraction-free experience in Microsoft Edge.
http://blogs.windows.com/windowsexperience/2018/07/23/windows-10-tip-try-reading-on-a-full-screen-for-a-distraction-free-experience-in-microsoft-edge

In other news related to Windows 10…

Resources for Windows Autopilot

Posted on Updated on

Similar to last month’s post on resources for Windows Analytics, I’m often also asked for a collection of useful resources on Windows Autopilot.  With that said, most of these are just cumulatively pulled from my monthly Windows 10 “news you can use”.

Other resources related to Windows Autopilot when using Microsoft Intune.

Auto MDM Enroll: Failed (The system tried to delete the JOIN of a drive that is not joined.)

Posted on Updated on

When setting up hybrid Azure AD join with on-premises Windows 10 environments, if you encounter the an error that “The system tried to delete the JOIN of a drive that is not joined.“, then there is a good chance that the device has not yet synchronized into Azure AD.

Event76

A few tips to help you isolate the cause and get past this issue:

  1. First, confirm the device exists in Azure Active Directory (or not).  In the Azure portal, navigate to Azure Active Directory > Devices > All devices.
    AzureDevicesList
  2. Review the steps in Troubleshooting hybrid Azure Active Directory joined Windows 10 and Windows Server 2016 devices.  Note that this article points back to another article on How to configure hybrid Azure Active Directory joined devices, which presently contains way more helpful information to help you troubleshoot.
  3. In the most current Azure AD Connect releases, use the built-in Troubleshooter.  Then in the PowerShell windows which launches, use both options to troubleshooting options for Object Sync and Password Hash Sync.
    AADC_troubleshooter

In my case, the troubleshooting guides were useful to confirm that I had configured everything correctly.  Then the Azure AD Connect troubleshooter reported an error that “Password Hash Synchronization cloud configuration is disabled”.  Searching that issue on the Internet led me to discover that the cause was likely due to mismatched passwords between the Azure AD account “On-Premises Directory Synchronization Service Account” with the password currently set in the local synchronization service.

To fix that, first set a new password for the “On-Premises Directory Synchronization Service Account”.  To do that, try setting it in Azure directly.  However, given that it’s a special account, it may be necessary to reset the password through PowerShell with the MSOL cmdlets.  While I’m not getting into the full end-to-end setup and use of those add-on Azure PowerShell cmdlets, the command could be as simple as:

Connect-AzureAD
Set-AzureADUserPassword -ObjectId abc123def456xyz980 -Password MyP@ssw0rd! -ForceChangePasswordNextLogin $false

Next, start program Synchronization Service Manager, then click on Connectors.  Locate the Windows Azure Active Directory Account and click Properties.

syncservice

Finally, set the password.  Voila, devices will now sync to Azure AD on the next synchronization!

AADsyncProperties

Windows 10 News You Can Use – July 2018

Posted on

 

Win10NewsLogo Windows 10 news you can use, July 2018 edition
Providing insights into Windows 10 deployment & management, security & compliance, and productivity. Also see other news related to Windows 10.

 

Deployment & Management

1)      For build 17682 of the Windows 10 Insider Preview, RSAT is now available on demand! What does that mean? You no longer need to manually download RSAT every time you upgrade! http://blogs.windows.com/windowsexperience/2018/05/31/announcing-windows-10-insider-preview-build-17682

2)      Techcommunity blog post which outlines the latest enhancements to Windows Autopilot in Windows 10, version 1803.  Specifically: Enrollment status, OEM and hardware vendor supply chain integration, BitLocker integration, automatic Windows Autopilot profile assignment, and device deletion with Microsoft Intune. https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-Autopilot-What-s-new-and-what-s-next/ba-p/201884

3)      Microsoft Mechanics 8-minute video which explores the most recent updates to Windows Autopilot, which include a zero-touch experience for the deployment of new Windows 10 devices and device reset capabilities, all powered by Microsoft 365. https://www.youtube.com/watch?v=7t7xaV8sm50

4)      Walkthrough for deploying a kiosk using Windows Autopilot. https://blogs.technet.microsoft.com/mniehaus/2018/06/07/deploying-a-kiosk-using-windows-autopilot

5)      Announcing new extensions to the Windows Autopilot zero-touch experience with several new capabilities available in preview with the Windows Insider Program today.
https://www.microsoft.com/en-us/microsoft-365/blog/2018/06/07/simplifying-it-with-the-latest-updates-from-windows-autopilot

6)      Windows 10 Updates and Store GPO behavior with DualScan disabled and client managed by SCCM SUP/WSUS. https://blogs.technet.microsoft.com/swisspfe/2018/04/13/win10-updates-store-gpos-dualscandisabled-sup-wsus

7)      New FastTrack benefit from Microsoft: Deployment support for Co-management on Windows 10 devices. We’d like to provide a few highlights on what you can expect. https://cloudblogs.microsoft.com/microsoftsecure/2018/06/18/new-fasttrack-benefit-deployment-support-for-co-management-on-windows-10-devices

8)      Implementing the Right Inertia in your Windows 10 Deployment Process: measuring and managing risk effectively with systems designed for change management.
https://blogs.msdn.microsoft.com/cjacks/2018/06/25/implementing-the-right-inertia-in-your-windows-10-deployment-process-defaulting-to-progress-vs-stasis

9)      Two new policies added for Edge when doing MDM management of Windows 10 through Microsoft Intune: Path to favorites file and Changes to Favorites. https://docs.microsoft.com/en-us/intune/device-restrictions-windows-10#edge-browser

Security & Compliance

1)      Virtualization-based security (VBS) memory enclaves: Data protection through isolation. The escalating sophistication of cyberattacks is marked by the increased use of kernel-level exploits that attempt to run malware with the highest privileges and evade security solutions and software sandboxes. Kernel exploits famously gave the WannaCry and Petya ransomware remote code execution capability, resulting in widescale global outbreaks. Windows 10 remained resilient to these attacks, with Microsoft constantly raising the bar in platform security to stay ahead of threat actors. Virtualization-based security (VBS) hardens Windows 10 against attacks by using the Windows hypervisor to create an environment that isolates a secure region of memory known as secure memory enclaves. https://cloudblogs.microsoft.com/microsoftsecure/2018/06/05/virtualization-based-security-vbs-memory-enclaves-data-protection-through-isolation

2)      Machine learning is a key driver in the constant evolution of security technologies at Microsoft. Machine learning allows Microsoft 365 to scale next-gen protection capabilities and enhance cloud-based, real-time blocking of new and unknown threats. Social engineering gives cybercriminals a way to get into systems and slip through defenses. The hardening of Windows 10 and Windows 10 in S mode, the advancement of browser security in Microsoft Edge, and the integrated stack of endpoint protection platform (EPP) and endpoint detection and response (EDR) capabilities in Windows Defender Advanced Threat Protection (Windows Defender ATP) further raise the bar in security. https://cloudblogs.microsoft.com/microsoftsecure/2018/06/07/machine-learning-vs-social-engineering

3)      What is new in Windows 10 1803 for the Privileged Access Workstation (PAW) solution.
https://blogs.technet.microsoft.com/datacentersecurity/2018/06/08/what-is-new-in-windows-10-1803-for-paw

4)      Go beyond external defenses. Eradicate attacks faster when they get inside. Download the 5 risk points to avoid in enterprise security—crash course. You’ll see how solutions built in to an operating system can (a) Make user identities more secure to prevent malicious access to devices and systems, (b) Detect the hidden actions of attackers already inside your systems more quickly, and (c) Leverage the largest data sets that index billions of sources to alert you of attacks immediately. https://info.microsoft.com/5RiskPointsEbook.html

5)      Zero Trust networks eliminate the concept of trust based on network location within a perimeter. Instead, Zero Trust architectures leverage device and user trust claims to gate access to organizational data and resources. Read more about building Zero Trust networks with Microsoft 365, based on Azure Active Directory, conditional access, Windows Defender Advanced Threat Protection, Windows Defender System Guard runtime attestation, and Microsoft Intune. https://cloudblogs.microsoft.com/microsoftsecure/2018/06/14/building-zero-trust-networks-with-microsoft-365

6)      Announcing the pre-release (v0.9) of “AaronLocker:” robust and practical application whitelisting for Windows. AaronLocker is designed to make the creation and maintenance of robust, strict, AppLocker-based whitelisting rules as easy and practical as possible. The entire solution involves a small number of PowerShell scripts. You can easily customize rules for your specific requirements with simple text-file edits. AaronLocker includes scripts that document AppLocker policies and capture event data into Excel workbooks that facilitate analysis and policy maintenance. https://blogs.msdn.microsoft.com/aaron_margosis/2018/06/26/announcing-application-whitelisting-with-aaronlocker

Productivity

1)      Windows 10 Tip: How to start creating in Paint 3D. http://blogs.windows.com/windowsexperience/2018/06/04/windows-10-tip-how-to-start-creating-in-paint-3d

2)      Windows 10 Tip: Go back and forth in time with Timeline, new in the Windows 10 April 2018 Update. http://blogs.windows.com/windowsexperience/2018/06/11/windows-10-tip-go-back-and-forth-in-time-with-timeline-new-in-the-windows-10-april-2018-update

3)      Windows 10 Tip: How to start using Nearby Sharing with the Windows 10 April 2018 Update.
http://blogs.windows.com/windowsexperience/2018/06/18/windows-10-tip-how-to-start-using-nearby-sharing-with-the-windows-10-april-2018-update

4)      SwiftKey intelligence comes to the touch keyboard in Windows 10 Insider Build 17692.
http://blogs.windows.com/windowsexperience/2018/06/14/announcing-windows-10-insider-preview-build-17692

5)      Windows 10 Tip: Search, shop and learn through the photos you take with Visual Search.
http://blogs.windows.com/windowsexperience/2018/06/25/windows-10-tip-search-shop-and-learn-through-the-photos-you-take-with-visual-search

In other news related to Windows 10…
  • Public preview support for Windows 7 and Windows 8.1 with Windows Defender Advanced Threat Protection (WDATP).
    https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-atp/onboard-downlevel-windows-defender-advanced-threat-protection
  • We live in a time of both great opportunity and great responsibility. Our children have access to more information, entertainment and more ways to connect than ever before, but with that comes plenty of new things that parents like you and I need to worry about and new ways to distract their attention. Today, we are excited to introduce new features that make it easier and safer for families to interact with technology and, each other, across devices and platforms.  One feature announcement is with Microsoft Edge giving the ability to allow or block websites has always existed on your PCs….and now, we are extending this feature to you and your family’s Android devices. If you have set up a Microsoft family group, any websites you have already tagged as allowed or blocked for your kid(s) will carry the same settings as they try to access websites in Microsoft Edge on their Android devices. http://blogs.windows.com/windowsexperience/2018/05/31/microsoft-gives-parents-peace-of-mind-with-new-family-features-across-devices
  • Getting the most value out of your security deployment. This blog is part of a series that responds to common questions we receive from customers about deployment of Microsoft 365 security solutions. In this series you’ll find context, answers, and guidance for deployment and driving adoption within your organization. In the last blog Now that you have a plan, it’s time to start deploying, we covered some of the tactical issues that you’ll want to consider planning your Microsoft 365 Security deployment. Now we’ll move to the third and final step of an effective planning process: Drive Value. https://cloudblogs.microsoft.com/microsoftsecure/2018/05/31/getting-the-most-value-out-of-your-security-deployment
  • The Microsoft Cybersecurity Reference Architecture describes Microsoft’s cybersecurity capabilities and how they integrate with existing security architectures and capabilities. We recently updated this diagram and wanted to share a little bit about the changes and the document itself to help you better utilize it.
    https://cloudblogs.microsoft.com/microsoftsecure/2018/06/06/cybersecurity-reference-architecture-security-for-a-hybrid-enterprise
  • Defining a crisp modern security strategy to support business success. A modern security agenda needs to define the purpose of the security team, its vision and mindset. It should also explain the high-level strategies it will employ, and how it will be organized, including the definition of priorities and deadlines and how the results will be measured. More detailed information regarding enabling and accelerating digital transformation is available in this whitepaper. It is designed to articulate what a modern security strategy can look like, and is useful for CISOs, CIOs, CDOs, and potentially board members who want to learn more about secure transformation and benchmark their own teams. https://cloudblogs.microsoft.com/microsoftsecure/2018/06/12/updating-your-cybersecurity-strategy-to-enable-and-accelerate-digital-transformation
  • Artificial Intelligence (AI) continues to be a key area of investment for Microsoft, and we’re pleased to announce that for the first time we’ve leveraged AI at scale to greatly improve the quality and reliability of the Windows 10 April 2018 Update rollout.  Our AI approach intelligently selects devices that our feedback data indicate would have a great update experience and offers the April 2018 Update to these devices first.  As our rollout progresses, we continuously collect update experience data and retrain our models to learn which devices will have a positive update experience, and where we may need to wait until we have higher confidence in a great experience.  Our overall rollout objective is for a safe and reliable update, which means we only go as fast as is safe. http://blogs.windows.com/windowsexperience/2018/06/14/ai-powers-windows-10-april-2018-update-rollout

No Internet on Hyper-V guest using Default Switch

Posted on Updated on

Beginning in Windows 10 1709, Hyper-V networking included a “Default Switch” to help simplify Internet connectivity to guest VMs. The idea is that this switch would automatically share whatever Internet connection is used by the Host, then NAT the addresses to the guests. This sharing is accomplished using the Internet Connection Sharing (ICS) service on the Host.

While in theory this makes the networking of guests easier, one particular challenge with this solution still exists today with Windows 10 1803….occasionally this guest loses it’s ability to work through the Host’s connection. And thereby the guest has no Internet access. So, if you’re faced with this issue, try restarting the ICS service on the host to restore connectivity.

For Internet connection issues with the default switch on a Windows 7 guest VM, I found the best solution to be changing the “Automatic metric” settings on the NICs in the VM.  This workaround/solution was posted in a TechNet forum thread, but the details are copied below for ease of reading.

“Go to <Network and Sharing><Change Adapter Settings> and right click your wired and wireless adapters one at a time to change the properties. Select IPv4, click <Properties> then click <Advanced>. For each one, clear the “Automatic metric” check box and assign the metric value manually. I set the wireless to 1 and the wired to 2, which gave me the behavior I wanted.”