


Device management
Device management allows organizations to secure, and maintain devices like virtual machines, earn the latest in device management and how solutions like Microsoft Intune and Microsoft Entra help keep devices secure, up to date, and compliant.
Refine results
Topic
Products and services
Publish date
-
Organizations are seeing a substantial increase in the diversity of devices accessing their networks.
-
Blue Cedar partners with Microsoft to combat BYOD issues
IT and security teams have been searching for a solution to accommodate BYOD that won’t compromise network security. -
3 ways Microsoft 365 can help you reduce helpdesk costs
Microsoft 365 Security is an integrated solution that helps you strengthen security, enhance productivity, and reduce costs. -
Zero Trust Deployment Guide for devices
Guidance on how to make your endpoints one of the strongest. -
Cybersecurity best practices to implement highly secured devices
If an internet-connected device performs a non-critical function, why does it need to be highly secured? Because any device can be the target of a hacker, and any hacked device can be weaponized. -
Secured-core PCs help customers stay ahead of advanced data theft
Secured-core PCs provide customers with Windows 10 systems that come configured from OEMs with a set of hardware, firmware, and OS features enabled by default, mitigating Thunderspy and any similar attacks that rely on malicious DMA. -
Microsoft and partners design new device security requirements to protect against targeted firmware attacks
We’ve been working with partners to design what we call Secured-core PCs, devices that meet a specific set of device requirements that apply the security best practices of isolation and minimal trust to the firmware layer. -
Delivering major enhancements in Windows Defender Application Control with the Windows 10 May 2019 Update
With the Windows 10 May 2019 Update we delivered several important features for Windows Defender Application Control. -
Announcing the all new Attack Surface Analyzer 2.0
Attack Surface Analyzer 2.0 can help you identify security risks introduced when installing software on Windows, Linux, or macOS by analyzing changes to the file system, registry, network ports, system certificates, and more. -
Introducing the security configuration framework: A prioritized guide to hardening Windows 10
The security configuration framework is designed to help simplify security configuration while still allowing enough flexibility to allow you to balance security, productivity, and user experience. -
Step 5. Set up mobile device management: top 10 actions to secure your environment
The “Top 10 actions to secure your environment” series outlines fundamental steps you can take with your investment in Microsoft 365 security solutions. -
Windows Defender ATP has protections for USB and removable devices
We recommend a layered approach for device control security, which incorporates multiple avenues of protection, including each of the above.