ltstudiooo - Fotolia
As with previous editions of Windows, administrators rely on Active Directory in Windows 8.1 to ensure software gets updated and to troubleshoot connections between network endpoints. Active Directory is also the primary means for authenticating users, which has become more important given security concerns for bring your own device programs.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Microsoft Windows 8.1 provides an application programming interface for mobile device management (MDM) support through Open MDM. This is good news for users of MDM applications from vendors like Air Watch and Mobile Iron.
Windows 8.1 also offers improved biometrics with support for fingerprint-based access. Microsoft has provided fingerprint biometrics in the past, but it depended on other vendors for drivers.
It's also possible to set encryption to always be on in Windows 8.1, but admins will need to understand the hardware requirements and know which drives are affected.
In addition, Group Policy settings, such as enabling the local administrator account, can affect password policies and how a PC joins a domain.
Operating system patches and updates are generally welcome, but we do encounter occasional problems. For instance, upgrading to Windows 8.1 can remove Remote Server Administration Tools (RSAT), and this can disrupt Active Directory services. You can download RSAT directly from Microsoft.
Fix single sign-on, which threatens Windows 8.1
Five Windows 8.1 settings can tighten security
Enable the local admin account and other settings for troubleshooting
Don't make assumptions around Windows 8.1 security
A look at Windows 8.1 includes enterprise security features
Microsoft tries to entice IT with Windows 8.1 enhancements
Windows 8.1 update includes BYOD support
Windows 8 security gets a boost from Windows 8.1 features
Dig Deeper on Microsoft Windows 8 operating system
Related Q&A from Dan Sullivan
Docker's recent upgrade introduced support for hardware signing and in the future, automated security analysis on Docker images. Expert Dan Sullivan ... Continue Reading
Cisco's new project Contiv automates operational policies for containerized applications in the cloud. Expert Dan Sullivan explains the benefits of ... Continue Reading
Dropbox API abused by attackers posing as legitimate users in a huge spear phishing campaign. Expert Dan Sullivan explains how to mitigate the risks ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.