back to article What's Microsoft been up to? A quick tour of Windows 11 22H2's security features

As it rolled out a laundry list of features in the latest version of Windows 11, namely version 22H2, this month, Microsoft has also detailed some of the added security mechanisms. These changes touch on a range of areas, including hardware, drivers, and printers as well as protections against credential theft and account …

  1. Anonymous Coward
    Anonymous Coward

    So...we need to buy a bunch more "security" hardware to make up for Microsoft's lack of software security? No surprise there.

  2. steviebuk Silver badge

    Nothing to do with....

    .... security. Its all about Microsoft claiming an monopoly and wanting to use it to combat piracy. Just look at the recent issue with Lenovo, Linux and Microsoft UEFI cerfts.

    1. steviebuk Silver badge

      Re: Nothing to do with....

      What are cerfts?

      Certs you incapable of typing on a phone keyboard idiot.

      1. Scott 53

        Re: Nothing to do with....

        What are cerfts?

        Certificates issued by Vint Cerf himself?

      2. steviebuk Silver badge

        Re: Nothing to do with....

        I don't think the downvoters realised I was talking to myself. Lack of an edit button is the issue.

  3. Sgt_Oddball
    Windows

    So we now need to rely on

    Hardware for security? As in the immutable bits that when a flaw is discovered has to either get crippled or replaced with new shinier kit?

    And how much of this kit will only work correctly when using Windows 11? Do we get any compensation with any hardware flaw?

    It's a poor show whichever side of the OS fence you sit.

  4. Totally not a Cylon
    Linux

    Why not a simple front end?

    Why don't Microsoft just make windows a front end 'window manager' which can run on either their kernel (DOS etc) or Linux?

    Then their 'whale song & mind altered'* UI designers don't have to worry about kernel security...

    Would make running the whole mess a lot simpler as a VM

    * this is the only rational explanation for them; otherwise they must be deliberately breaking it.......

  5. Anonymous Coward
    Anonymous Coward

    Destroying the Self build architecture one day at a time. Way to alienate your long-time home customers. Though I am sure businesses obsessed with buying trash will lap it up.

    I'm not going to beg for you to move to an alternative. Only you can decide do do that.

  6. chivo243 Silver badge
    Trollface

    Microsoft®

    Where security is an after thought... Let's just bolt something on the side! Yeah, That'll work!

  7. captain veg Silver badge

    this is true

    My employer uses Microsoft Authenticator for MFA access to network resources. It's an app on your Android or Apple phone. I suppose the idea is that someone might steal your laptop but unless they have your phone too then they can't get in.

    In the spirit of scientific enquiry I installed the app on an Android table. One without any kind of cellular connectivity. Works just fine.

    So I put Android-86 in a VirtualBox VM on my laptop and installed the app there too. That works also. Very convenient. Totally insecure.

    -A.

    1. Anonymous Coward
      Anonymous Coward

      Re: this is true

      It's interesting how 'Microsoft's own malware tools' within Windows itself, added since Windows 10 started rolling out, are now being used more and more to create third party malware, that can bypass antivirus software by being lean.

      Instead of containing vast amounts of encrypted code, the malware just use what's available, uses the tools Microsoft just leave lying around to generate its own telemetry and spyware, to extract user data.

      The problem being, in many cases, none of these tools are locked down and are there for the picking.

      The day they started building in screenshot generators into web browsers, for instance and why it should have always remained a tool that was an add-in.

    2. SsiethAnabuki

      Re: this is true

      That you choose to make great efforts to bypass the security options that are available to you, doesn't make them inherently bad. Two factor authentication is pretty much always collapsable to a single factor if the user is enough of an informed idiot to do so.

      Making security measures idiot-proof is really a lost cause. You can make it such that the user in question has to go to greater lengths to circumvent their own protection (or that of their employer) but, in the end, there will pretty much always be a way to make your own systems less secure if you choose to,

      1. 43300 Silver badge

        Re: this is true

        I think the main point is that the users most likely to get fooled by an attempt at harvesting credentials are not likely to have the IT skills to devise MFA workarounds!

        1. captain veg Silver badge

          Re: this is true

          I don't have it installed anywhere, so haven't tried this, but I understand that Windows 11 can run Android apps directly. Not many IT skills required there, I'd say.

          -A.

    3. Martin 26

      Re: this is true

      MS, Apple, Android all use the same RFC6238 algorithm for their respective authenticator apps. It doesn't need any cellular connectivity, that's the whole point for people who can't get SMS messages.

    4. James O'Shea Silver badge

      Re: this is true

      I hate taking MS's side, but...

      1. normal people don't have a clue what a VM is, and wouldn't know where to get hold of Virtual Box.

      2. doing things that way is a deliberate attempt to bypass security.

      3. Apple's 'security' sends a signal to every 'trusted' device available. If you're signing in on a Mac or iDevice, this _includes the Mac or iDevice that you're signing in on_. You don't have to set up a VM, you get the MFA message on the very device you're signing in on. Yes, really. (Assuming that you have the correct password, that is, and that the device is connected to the Internet) Apple's security is actually worse than Microsoft's, difficult though that may be to be believed. If you're signing into a Windows machine, you need an Apple device _which is on the list of trusted devices_ somewhere near. Windows machines are not on the list of trusted devices. (Imagine that!) If you don't have at least one Apple device which is trusted, you're screwed. Seriously, you get a dialog stating that someone currently at location X is trying to sign in. You you want to let them? If you click 'yes', you get a dialog with a six-digit number which you must input on the device that you want to log in on. There is a deadline after which you need a new number. Each 'trusted' device gets a different number.

      I don't know enough about Android 'security' to comment. As Apple, Google, and Microsoft all use the same 'security' standard, I suspect that it isn't much better.

      First line of defense: have a good password. Mine is 12-15 characters, depending on device, with lowercase, uppercase, numbers, and symbols. Do not use biometrics. Do not use PINs. Do not use funny figures or shapes or other MS nonsense. If the opposition doesn't have your password, they don't get as far as the MFA. A 12-15 character password is hard to break. Someone serious can still do it, but they'd have to really want in. John Q. Hacker would just go looking for easier targets. I hope.

  8. Anonymous Coward
    Facepalm

    Security hardware

    xkcd says it better than I could:

    Hardware Security

  9. A random security guy

    So do we need windows too?

    I have a zero-trust approach to Windows. I have no trust in it so it stays outside my house.

  10. Anonymous Coward
    Anonymous Coward

    Here for the omg wtf M$ lol bbq comments from people who don't understand coding or security...

  11. Anonymous Coward
    Anonymous Coward

    "In addition, other features have been designed to protect enterprises that continue to lean on usernames and passwords for Windows authentication."

    What else are they going to use, because the day they want me to install something on my personal phone, is the day I get a flip phone.

    1. MJB7

      Re: "What else are they going to use?"

      Yubikey, client certificates, there are lots of other options. (But all of them tend to be less convenient that a simple username and password for the end user.)

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like