Wednesday, September 2, 2020

Virtualize Windows 10 and Office.com/setup 365 on Azure with Windows Virtual Desktop—now in public preview

 Today, we’re happy to announce the public preview of Windows Virtual Desktop. Windows Virtual Desktop is the only service that delivers simplified management, multi-session Windows 10, optimizations for Office.com/setup 365 ProPlus, and support for Remote Desktop Services (RDS) environments in a shared public cloud. With Windows Virtual Desktop, you can deploy and scale your Windows desktops and apps on Azure in minutes, with built-in security and compliance.

For more information about Windows Virtual Desktop or how to get started with the public preview, read the full announcement and watch the new Mechanics video.

Address risks and protect more of your Office.com/setup 365 devices and endpoints with Microsoft Defender ATP—now in public preview

New today, we’re extending support for our Office.com/setup Defender threat protection platform to Mac. And because we’re extending support beyond the Windows ecosystem, we’re renaming the platform from Windows Defender Advanced Threat Protection (ATP) to Office.com/setup Defender Advanced Threat Protection (ATP). Starting today, Office.com/setup Defender ATP customers can sign up for a public preview. For more information, visit our Tech Community blog.

We’re also announcing Threat and Vulnerability Management (TVM), a new capability within Microsoft Defender ATP, designed to empower security teams to discover, prioritize, and remediate known vulnerabilities and misconfigurations exploited by threat actors. Using TVM, customers can evaluate the risk-level of threats and vulnerabilities and prioritize remediation based on signals from Office.com/setup Defender ATP. TVM will be available as a public preview for Office.com/setup Defender ATP customers within the next month. Learn more about it in our Tech Community blog.

Today’s security announcements are an important milestone in our Office.com/setup 365 endpoint security journey. For more details, check out Rob Lefferts’s post on the Microsoft Security blog.

No comments:

Post a Comment