User Manual

Scenario Feature Description Windows
Server
2008 R2
Windows
Server
2012 R2
Windows
Server
2016
Security
Shielded Virtual Machines: Uses BitLocker to encrypt disk and
state of virtual machines.
Host Guardian Service: Helps ensure Hyper-V hosts running
Shielded Virtual Machines are allowed and healthy hosts.
Just Enough Administration (JEA): Limits administrative
privileges to the bare-minimum required set of actions (limited
in space).
Just-in-Time Administration (JIT): Provides privileged access
through a workow that is audited and limited in time.
Credential Guard: Uses virtualization-based security to help
secure credential information.
Remote Credential Guard: Works in conjunction with Credential
Guard for Remote Desktop Protocol (RDP) sessions to deliver
Single Sign-On (SSO), eliminating the need to pass credentials
to the RDP host.
Device Guard: Helps ensure only authorized executables run on
the machine.
AppLocker: Provides policy-based access control management
for applications.
Windows Defender: Automatically helps protect machines from
malware while allowing legitimate applications to run.
Control Flow Guard: Helps protect against classes of memory
corruption attacks.
Generation 2 virtual machines: Allows VMs to use hardware-
based security to leverage Secure Boot, BitLocker, etc.
Enhanced auditing for threat detection: Provides better log
information.
Dynamic Access Control: Enables administrators to apply access-
control permissions and restrictions based on well-dened rules.
Windows Firewall with Advanced Security: Allows granular
rewall conguration.
BitLocker: Uses a hardware or virtual Trusted Platform Module
(TPM) chip to provide disk encryption for data and system
volumes.
Small-footprint Hyper-V host (Server Core/Nano Server):
Minimizes attack surface with a Hyper-V host running minimum
required components.
Security is a top priority for IT teams. New threats have made it harder than ever for IT
to secure data and applications. Windows Server 2016 gives you new capabilities to help
prevent attacks and detect suspicious activity, with features to control privileged access,
help protect virtual machines, and harden the platform against emerging threats.
Not Supported
Limited Support
Fully Supported