In the early days of PCs, an IT professional could replace components on the motherboard and the OS would use them without flagging that anything had changed. Today, the software and hardware are constantly validating each other. Windows 11 would recognize that something changed because the original known part would no longer respond. As a result, Secure Boot would flag the issue.
“This adds to Windows’ security because you can no longer bypass the Windows layer and boot into a DOS prompt to make changes to the system,” Brown says. “If someone tries to insert malicious code onto the computer, Secure Boot will alert you to an unexpected change and restore to a known state, blocking the change.”
Cybersecurity has changed radically, and Windows 11 is a response to the pervasive nature of cyberthreats today. The final version of Windows 10, 22H2, will reach the end of support on Oct. 14, 2025. While it will still function, there will be no more version updates unless the date is extended by Microsoft.
To ensure that higher education IT systems are secure, colleges and universities should start to consider migrating to Windows 11, Brown says. It can provide institutions with many security benefits, but IT leaders must understand that migration to Windows 11 is a journey that requires preparation.
Windows 11 Includes Layers of Security Features to Protect Data
While OSs have become much more secure over the years due to firewalls, anti-virus software and malware scans, Brown says that nothing was blocking the worst hole in the entire infrastructure: an end user clicking on a link to launch something he or she thought was benign. In fact, the “human element” was a factor in 74 percent of total breaches according to a report from Verizon. Windows 11 could change that.
“Windows is now constantly scanning every internet site that you visit, every document that you open, and running processes to make sure they are legitimate and safe to continue,” Brown says.
Windows 11 does this using a feature called Microsoft Defender SmartScreen, one of several new tools rolled out with the operating system update. Here are security features of note that higher education institutions should be aware of when considering a migration to Windows 11:
- BitLocker: While this feature was included on Windows 10, it was optional. Now, device and drive encryption are built into the OS by default to protect patient data from unauthorized access, Brown says.
- Credential Guard: This feature uses virtualization-based security (VBS) to defend systems from credential theft and malware attacks even if they are running with admin privileges, according to a Microsoft blog.
- Config Lock: Using mobile device management policies, this feature monitors registry keys to detect changes in a college’s device ecosystem and reverts changed systems to an IT-desired state. Microsoft states that it also prevents users from altering security settings.
- Hypervisor-Protected Code Integrity: Also known as memory integrity, HVCI is another VBS feature integral to ensuring that all drivers plugged into the OS are safe and trustworthy.
- Microsoft Defender SmartScreen: This program addresses the vulnerability created by end users by protecting against phishing, malware and malicious files. SmartScreen is constantly watching the sites a user browses no matter which browser is used, Brown says. It will reference each site visited against Microsoft’s known secure databases and alert a user if a site could be malicious. “Before you even move your mouse, that website, link or attachment has been checked and validated,” he adds.
- Microsoft Pluton: This security processor was built on the principles of zero trust. It is integrated into the CPU and OS to protect personal information, credentials and encryption keys, according to Microsoft. Instead of requiring higher education IT teams to manually update the processor, it can be done via Windows Update, adding another level of security.
- Smart App Control: According to Microsoft, this feature blocks malicious and untrustworthy apps as well as unwanted apps that can slow down devices or come with unexpected or unwanted properties such as ads or extra software.
All of these security layers and more are in constant communication, prepared to isolate suspicious applications and lock down the system so that malicious programs can’t take over and propagate onto other devices, Brown says. It’s all a part of a zero-trust architecture.
“Even though your device might be managed, if you have certain things turned off, the system will no longer trust that device. If Microsoft Defender anti-virus isn’t running, it will say, ‘I no longer trust you. You cannot come in until that’s fixed.’ If you don’t have the latest Microsoft patches installed, it won’t trust you until Microsoft Intune finishes pushing the update to you,” Brown says, adding that Microsoft Azure cloud tools and Microsoft Intune work together with the OS to protect the higher education IT ecosystem.
Having enhanced security on devices can enable more mobility for instructors in the classroom as well. Universities can extend the capabilities of Windows 11 onto other systems, says Brown.
For example, institutions can use Windows 11 to securely manage their smart screens. An instructor can walk around the room and manage that smart screen using a tablet protected by layers of robust security features.
“Professors can change the content on that screen or make annotations with a digital pen. They’re no longer sitting at a desk,” Brown says. “They can now roam around the room and be more interactive with their students.”
On the IT side, Windows 11 gives IT staffers the ability to remote into many of these systems so they no longer have to run down hallways or change buildings to manage devices.
For more on the specific security features offered by Windows 11, Brown recommends that higher ed IT leaders check out Windows 11 Security Book: Powerful Security by Design.