{"id":954,"date":"2013-11-08T11:38:49","date_gmt":"2013-11-08T17:38:49","guid":{"rendered":"http:\/\/www.poweradmin.com\/blog\/?p=954"},"modified":"2015-04-27T08:28:50","modified_gmt":"2015-04-27T13:28:50","slug":"an-overview-of-the-new-windows-8-enterprise-edition","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/an-overview-of-the-new-windows-8-enterprise-edition\/","title":{"rendered":"An Overview of the New Windows 8 Enterprise Edition"},"content":{"rendered":"<p>\n\t<a href=\"\/blog\/wp-content\/uploads\/2013\/11\/windows-8.1-enterprise-start.png\" rel=\"\" style=\"\" target=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"windows 8.1 enterprise start\" class=\"alignleft size-medium wp-image-955\" height=\"268\" src=\"\/blog\/wp-content\/uploads\/2013\/11\/windows-8.1-enterprise-start-300x202.png\" style=\"margin-right: 20px; border: 4px solid black;\" title=\"\" width=\"379\"><\/a><span style=\"color:#2F4F4F;\"><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\">Not since the launch of the Windows Vista operating system has there been so much negativity about the latest upgrade of Windows for consumers. But is it really justified, or is it simply misinformation and\/or the lack of information that has driven large swathes of the business community to avoid it thus far?<\/span><\/span><\/span>\n<\/p>\n<h2>\n\t\u00a0<br>\n<\/h2>\n<h2>\n\t<span style=\"font-size:16px;\"><span style=\"color: rgb(255, 102, 0);\"><span style=\"font-family: tahoma,geneva,sans-serif;\"><strong>Setting the Record Straight<\/strong><\/span><\/span><\/span><br>\n<\/h2>\n<p>\n\t<a href=\"\/blog\/wp-content\/uploads\/2013\/11\/1-for-the-record.jpg\" rel=\"\" style=\"\" target=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"windows 8.1-for the record\" class=\"alignright size-medium wp-image-970\" height=\"200\" src=\"\/blog\/wp-content\/uploads\/2013\/11\/1-for-the-record-298x300.jpg\" style=\"margin-left: 10px;\" title=\"\" width=\"198\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/1-for-the-record-298x300.jpg 298w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/1-for-the-record.jpg 858w\" sizes=\"auto, (max-width: 198px) 100vw, 198px\"><\/a><span style=\"color:#2F4F4F;\"><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\">A lot of the negative feedback seems to have stemmed from a number of reviews that have centred their attention on the design of the user interface on the start screen, which mimics a tablet. Other uninspiring reviews have mentioned the disappointing lack of current applications available in the app store \u2013 however, this really only boils down to window-dressing and fads, which are after all, only incidentals. When it comes down to the new operating system itself, Windows 8.1 Enterprise offers several advantages (as one would of course expect) over previous releases. These advantages include:<\/span><\/span><\/span>\n<\/p>\n<ul>\n<li>\n\t\t<span style=\"color:#2F4F4F;\"><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\">Enhanced security<\/span><\/span><\/span>\n\t<\/li>\n<li>\n\t\t<span style=\"color:#2F4F4F;\"><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\">Faster start-up<\/span><\/span><\/span>\n\t<\/li>\n<li>\n\t\t<span style=\"color:#2F4F4F;\"><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\">Easier data management<\/span><\/span><\/span>\n\t<\/li>\n<li>\n\t\t<span style=\"color:#2F4F4F;\"><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\">Improved stability<\/span><\/span><\/span>\n\t<\/li>\n<\/ul>\n<p>\n\t<span style=\"color:#2F4F4F;\"><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\">Let\u2019s now drill down a little further into each of these components.<\/span><\/span><\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"color: rgb(255, 102, 0);\"><span style=\"font-family: tahoma,geneva,sans-serif;\"><strong>Enhanced Security<\/strong><\/span><\/span><\/span>\n<\/p>\n<p>\n\t<a href=\"\/blog\/wp-content\/uploads\/2013\/11\/2-enhanced-security.jpg\" rel=\"\" style=\"\" target=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"enhanced security\" class=\"alignleft size-thumbnail wp-image-971\" height=\"200\" src=\"\/blog\/wp-content\/uploads\/2013\/11\/2-enhanced-security-150x150.jpg\" style=\"margin-right: 50px; margin-top: 15px; margin-bottom: 15px;\" title=\"\" width=\"220\"><\/a><span style=\"color:#2F4F4F;\"><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\">Security is a major concern for most enterprise level businesses, so the enhanced security functions that Windows 8.1 brings with it, will be welcomed.<\/span><\/span><\/span>\n<\/p>\n<ul>\n<li>\n<p>\n\t\t\t<span style=\"color:#2F4F4F;\"><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\"><strong>Boot-up Malware Check \u2013 <\/strong>Microsoft have planted a 3<sup>rd<\/sup> party piece of software programming (this in itself is a revelation) that seeks out any malware present, into the start-up routine, creating a trusted boot-up procedure. It\u2019s a clever move because this makes it inaccessible to prying eyes, and protects the rest of the start up procedure, and therefore the device itself. But that\u2019s not all\u2026.<\/span><\/span><\/span>\n\t\t<\/p>\n<\/li>\n<\/ul>\n<ul>\n<li>\n<p>\n\t\t\t<span style=\"color:#2F4F4F;\"><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\"><strong>Boot-up time measurement procedure<\/strong> \u2013 Once the trusted boot procedure has been deployed, Windows 8.1 goes on to actually measure other elements of the boot-up procedure. It then uses these measurements, and compares them to known data which is stored in the TPM (Trusted Platform Module) chip. In a networking environment, (present in most enterprise level organisations), a process known as remote attestation can then take place, whereby a remote server can check the device\u2019s integrity before allowing it onto the network.<\/span><\/span><\/span>\n\t\t<\/p>\n<\/li>\n<\/ul>\n<ul>\n<li>\n<p>\n\t\t\t<span style=\"color:#2F4F4F;\"><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\"><strong>App Disabler<\/strong> \u2013 The new \u201cAppLocker\u201d function gives IT managers the ability to police potentially harmful and non-company-approved apps, and prevent them from running. A set of rules can be created (and modified as necessary) to check things such as who downloaded the app, and what signature the app package carries.<\/span><\/span><\/span>\n\t\t<\/p>\n<\/li>\n<\/ul>\n<ul>\n<li>\n<p>\n\t\t\t<span style=\"color:#2F4F4F;\"><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\"><strong>Reputation Checker<\/strong> \u2013 Windows 8, has introduced something called \u201cSmarSscreen app reputation\u201d. This new safety feature checks the reputation of any new application it comes across when the user is browsing the Internet. It helps to block any malware being downloaded, and also helps to prevent viruses from sneaking through. It works with Internet Explorer\u2019s similarly named SmartScreen feature, which blocks any attempts to obtain personal data such as the username, passwords, and financial data<\/span><\/span><\/span>\n\t\t<\/p>\n<\/li>\n<\/ul>\n<ul>\n<li>\n<p>\n\t\t\t<span style=\"color:#2F4F4F;\"><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\"><strong>Access Limitation Control <\/strong>\u2013 Windows 8 grants IT managers the ability to fine-tune employee\u2019s access to certain pieces of sensitive corporate data. So, for example, purchasing staff could have access to supplier account information, but not data relating to staff salaries. The criteria used to filter this accessibility can be changed by IT personnel as and when necessary.<\/span><\/span><\/span>\n\t\t<\/p>\n<\/li>\n<\/ul>\n<p>\n\t<span style=\"color:#2F4F4F;\"><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\">All of the above new features in Windows 8.1 will be welcomed by most enterprise level businesses, as they not only increase corporate security, but also enable authorised IT personnel to apply and change criteria, which helps to keep security current.<\/span><\/span><\/span>\n<\/p>\n<p>\n\t<span style=\"color:#696969;\"><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\">Continue reading <\/span><\/span><\/span><a href=\"\/blog\/an-overview-of-the-new-windows-8-enterprise-edition-part-2\"><span style=\"color:#0000FF;\"><span style=\"font-size: 16px;\"><span style=\"font-family: tahoma,geneva,sans-serif;\">\"An Overview of the New Windows 8 Enterprise Edition\" \u2013 Part 2 &gt;&gt;&gt;<\/span><\/span><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Not since the launch of the Windows Vista operating system has there been so much negativity about the latest upgrade of Windows for consumers. But is it really justified, or is it simply misinformation and\/or the lack of information that has driven large swathes of the business community to avoid it thus far? \u00a0 Setting [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":955,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,6,8],"tags":[],"class_list":["post-954","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-tech","category-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/954","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=954"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/954\/revisions"}],"predecessor-version":[{"id":3568,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/954\/revisions\/3568"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/955"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=954"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=954"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=954"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}