Book Image

Windows 11 for Enterprise Administrators - Second Edition

By : Manuel Singer, Jeff Stokes, Steve Miles, Thomas Lee, Richard Diver
Book Image

Windows 11 for Enterprise Administrators - Second Edition

By: Manuel Singer, Jeff Stokes, Steve Miles, Thomas Lee, Richard Diver

Overview of this book

Windows 11 comes with a plethora of new security measures, customizability, and accessibility features that can help your organization run more smoothly. But, without a proper introduction to this new version of Windows, it’s easy to miss the most important improvements, along with configuration options that will make migrating to Windows 11 frictionless. Windows 11 for Enterprise Administrators helps you understand the installation process, configuration methods, deployment scenarios, and management strategies. You’ll delve into configuring Remote Server Administration Tools for remote Windows Server and Azure Active Directory management. This edition emphasizes PowerShell's role in automating administrative tasks, and its importance in Windows 11 and Windows Server management. It also provides comprehensive insights into Windows 11 updates, including Version 21H2 and 22H2, contrasting them with Windows 10, ensuring your knowledge stays current with the latest enhancements in the Windows ecosystem. By the end of this book, you'll be well-equipped with Windows 11's vital technologies and potentials, enabling you to adeptly oversee and implement these attributes within your company.
Table of Contents (13 chapters)
Chapter 9: Advanced Configurations

Zero trust

With many companies embracing a hybrid workforce, a new security model mindset is required more than ever. We need to adopt a holistic approach to security, a model that thinks beyond traditional network-perimeter-based security. The traditional firewalls and security-service-controlled network perimeters have vanished due to this hybrid workforce.

Zero trust, which uses the never trust, always verify approach, is not a service or solution but a wider security strategy and framework to be adopted. It ensures compliance and securing of access to the resources rather than the location or network it is on. We must not assume trust because of the device or resource’s network or location. We can no longer assume trust based on identity or self-attestation.

The zero-trust framework is built upon the following foundational principles:

  • Assume breach: From the start, we must adopt the mindset that there is a breach; it is all about damage limitation. As it is...