Explore Credential Guard technology. Introduced in Windows 10 Enterprise, Credential Guard offers hardware security by managing secrets unique to a system. This is virtualization-based security that protects hardware and protects against persistent threats. You can manage Credential Guard through Group Policy, WMI, a command prompt, and Windows PowerShell.
- [Instructor] It's extremely important…to protect devices from attacks.…Device Guard protects devices by limiting…what apps can run on a machine.…There's another technology that goes hand in hand…with that called Credential Guard.…Credential Guard protects a computer's credentials.…These are not user credentials.…These are secrets unique to the computer itself,…like NTLM hashes and Kerberos tickets,…and the processes that manage them.…Credential Guard is only available on…Windows 10 Enterprise and only on…machines that include the necessary…virtualization software and hardware.…
You must have a 64 bit version of Windows,…UEFI 2.3.1 or greater, virtualization extensions,…IOMMU, TPM, and the ability to lockdown the BIOS.…Administrators use specific group policy objects…to manage Credential Guard.…The feature has to be turned on…and weaker encryption protocols need…to be disabled for it to work.…Like Device Guard, you must enable a…few things on the Windows 10 machine.…In the search box type turn on or off Windows features.…
Note: The course also maps to the third part of MCSA exam 70-698, Installing and Configuring Windows 10. Taking this course will prepare you for objectives in the Manage and Maintain Windows domain of the test.
- Configuring Windows Update
- Updating Windows apps
- Reviewing event logs
- Using Resource Monitor and Performance Monitor
- Managing security with Windows Defender
- Creating a recovery drive
- Restoring and recovering files
- Recovering the OS with Windows Recovery
- Configuring authorization and authentication
- Securing Windows 10 with passwords
- Joining workgroups and domains
- Creating and using accounts
- Automating tasks with PowerShell
Skill Level Intermediate
1. Configure Updates
2. Monitor Windows
3. Configure System and Data Recovery
4. Configure Authorization and Authentication
5. Configure Advanced
Next steps1m 13s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.