Windows can protect itself from exploits – but you need to turn it on! Richard talks to Chris Jackson about his recently published document about exploit protection. Chris talks about the long list of mitigation strategies that exist inside of Windows to stop arbitrary code (read: malware) from executing. Each strategy comes with the risk of breaking your application. You need to apply the mitigations on an application-by-application basis, and with some testing around it. But if you want to make your Windows desktops more secure, these exploit protections are enormous!
Links:
MLOps + DevOps + Kubernetes with Annie Talvasto
Identity Governance with Jef Kazimer
SQL Server and AI with Muazma Zahid & Bob Ward
PowerShell 7.4 with Sydney Smith
GitHub Copilot with Damian Brady
Securing AI with Sarah Young
Microsoft Copilot for Security with George Coldham
GitHub for SysAdmins with April Edwards
From SysAdmin to Platform Engineer with Steve Buchanan
Understanding Large Language Models with Jodie Burchell
Upgrading TLS with Scott Helme
Copilot Governance with Martina Grom
Windows Server vNext with Jeff Woolsey
Maximizing Metadata with Emily Mancini
Managing Cloud Native with Brendan Burns
Software Licensing in 2024 with Mary Jo Foley
AI for IT with Gil Pekelman
Copilots for Power Platform with April Dunnam
Hardening Active Directory with Jerry Devore
Doing More with Less in 2024 with Erin Chapple
Create your
podcast in
minutes
It is Free
.NET Rocks!
Hanselminutes with Scott Hanselman
.NET Rocks!
Mondays