Skip to content

Commit 6451e42

Browse files
committed
removal of Windows to Go
1 parent ba49350 commit 6451e42

File tree

2 files changed

+2
-14
lines changed

2 files changed

+2
-14
lines changed

articles/security/fundamentals/management.md

Lines changed: 2 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.devlang: na
1414
ms.topic: conceptual
1515
ms.tgt_pltfrm: na
1616
ms.workload: na
17-
ms.date: 10/31/2019
17+
ms.date: 04/08/2020
1818
ms.author: terrylan
1919

2020
---
@@ -141,9 +141,6 @@ We recommend three primary configurations for a hardened workstation. The bigges
141141
| - | Clear separation of duties | - |
142142
| Corporate PC as virtual machine |Reduced hardware costs | - |
143143
| - | Segregation of role and applications | - |
144-
| Windows to go with BitLocker drive encryption |Compatibility with most PCs |Asset tracking |
145-
| - | Cost-effectiveness and portability | - |
146-
| - | Isolated management environment |- |
147144

148145
It is important that the hardened workstation is the host and not the guest, with nothing between the host operating system and the hardware. Following the “clean source principle” (also known as “secure origin”) means that the host should be the most hardened. Otherwise, the hardened workstation (guest) is subject to attacks on the system on which it is hosted.
149146

@@ -167,15 +164,6 @@ To avoid several security risks that can arise from using one workstation for sy
167164

168165
The corporate PC virtual machine runs in a protected space and provides user applications. The host remains a “clean source” and enforces strict network policies in the root operating system (for example, blocking RDP access from the virtual machine).
169166

170-
### Windows To Go
171-
Another alternative to requiring a stand-alone hardened workstation is to use a [Windows To Go](https://technet.microsoft.com/library/hh831833.aspx) drive, a feature that supports a client-side USB-boot capability. Windows To Go enables users to boot a compatible PC to an isolated system image running from an encrypted USB flash drive. It provides additional controls for remote-administration endpoints because the image can be fully managed by a corporate IT group, with strict security policies, a minimal OS build, and TPM support.
172-
173-
In the figure below, the portable image is a domain-joined system that is preconfigured to connect only to Azure, requires multi-factor authentication, and blocks all non-management traffic. If a user boots the same PC to the standard corporate image and tries accessing RD Gateway for Azure management tools, the session is blocked. Windows To Go becomes the root-level operating system, and no additional layers are required (host operating system, hypervisor, virtual machine) that may be more vulnerable to outside attacks.
174-
175-
![](./media/management/hardened-workstation-using-windows-to-go-on-a-usb-flash-drive.png)
176-
177-
It is important to note that USB flash drives are more easily lost than an average desktop PC. Use of BitLocker to encrypt the entire volume, together with a strong password, makes it less likely that an attacker can use the drive image for harmful purposes. Additionally, if the USB flash drive is lost, revoking and [issuing a new management certificate](https://technet.microsoft.com/library/hh831574.aspx) along with a quick password reset can reduce exposure. Administrative audit logs reside within Azure, not on the client, further reducing potential data loss.
178-
179167
## Best practices
180168
Consider the following additional guidelines when you are managing applications and data in Azure.
181169

@@ -211,7 +199,7 @@ Minimizing the number of tasks that administrators can perform on a hardened wor
211199
* Group Policy. Create a global administrative policy that is applied to any domain workstation that is used for management (and block access from all others), and to user accounts authenticated on those workstations.
212200
* Security-enhanced provisioning. Safeguard your baseline hardened workstation image to help protect against tampering. Use security measures like encryption and isolation to store images, virtual machines, and scripts, and restrict access (perhaps use an auditable check-in/check-out process).
213201
* Patching. Maintain a consistent build (or have separate images for development, operations, and other administrative tasks), scan for changes and malware routinely, keep the build up to date, and only activate machines when they are needed.
214-
* Encryption. Make sure that management workstations have a TPM to more securely enable [Encrypting File System](https://technet.microsoft.com/library/cc700811.aspx) (EFS) and BitLocker. If you are using Windows To Go, use only encrypted USB keys together with BitLocker.
202+
* Encryption. Make sure that management workstations have a TPM to more securely enable [Encrypting File System](https://technet.microsoft.com/library/cc700811.aspx) (EFS) and BitLocker.
215203
* Governance. Use AD DS GPOs to control all the administrators’ Windows interfaces, such as file sharing. Include management workstations in auditing, monitoring, and logging processes. Track all administrator and developer access and usage.
216204

217205
## Summary

0 commit comments

Comments
 (0)