Are Windows 10 Secured-Core PCs the best way to provide a secure computer?

Home Forums Security General Security Are Windows 10 Secured-Core PCs the best way to provide a secure computer?

Viewing 1 post (of 1 total)
  • Author

  • Robert-Hostetler

    Hi everyone,

    I’m looking for feedback from people that have actually used Secured-Core PCs. So far, what I have found is Microsoft’s marketing and documentation about it and news articles saying it exists. What I haven’t found yet is feedback from ethical hacker types confirming this stuff is worth it.

    Has anyone actually used one of these computers in a secured business/enterprise environment? If so, is it your preferred way to provide a secured Windows 10 computer? Why do you feel it is or isn’t?

    Are the two Microsoft Surface devices that are Secured-Core compliant (Surface Pro X and Surface Laptop 4 AMD chip) the best implementations of this since Microsoft also open-sources their BIOS/UEFI firmware?

    If someone’s needs can work on Macs or Linux too, are either of those better?

    My off the cuff guesses on ways to go here would be:
    * Microsoft manufactured Secured-Core PC
    * Other Secured-Core PCs
    * Get an enterprise grade computer, like a Lenovo ThinkPad that has similar hardware as a Secured-Core PC, but fiddle with the firmware and Windows 10 settings to lock it down
    * Get a Mac (is there evidence that the M1 processors are more securely designed than what Intel’s been doing the past few years and is the security posture of the current version of macOS better than Linux or Windows)
    * Use Linux (assuming either on a ThinkPad or something designed specifically for Linux, like System76), I’m not sure which distro would be appropriate for secure collaboration in a typical office/professional environment

    But, if you haven’t heard about it and want to learn more – here is Microsoft’s blog post describing what Secured-Core PCs are supposed to do:

Viewing 1 post (of 1 total)

You must be logged in to reply to this topic.

External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by: