Snynet Solution Logo
MON - SUN: 10 AM - 6 PM
+60 11 5624 8319

Blog

The unsurprising lesson Microsoft learned after upgrading its own PCs to Windows 11

Image Description

After upgrading its own business PCs to its latest operating system, Microsoft has reached a rather unsurprising conclusion: Windows 11 is good.

In a new blog post, Microsoft explained it has now upgraded almost the entirety of its circa 182,000-strong workforce to Windows 11, claiming it had no increase in support tickets in the process.

Microsoft attributed the successful rollout to having far fewer app compatibility challenges than in the past, not needing to build out a plethora of disk images, and delivery processes and tools that were greatly improved during the rollout of Windows 10. The update utilized a gradual ‘ring-based’ approach.

Windows 11 rollout

Microsoft said it identified which of its devices were upgradable first, using its Update Compliance tool and Microsoft Endpoint Manager's Endpoint analytics, allowing the firm to create a clear timeline for the rollout.

Windows 11 has specific hardware requirements, and a percentage of Microsoft’s devices were not upgraded. The employees with these incompatible devices will continue to run Windows 10 in parallel, before getting a Windows 11 device at their next device refresh.

Microsoft said that, in total, 190,00 devices qualified for the upgrade and that its upgrade process was 99% successful.

The company also explained the importance of preparing readiness content for its employees during the internal rollout process.

The software giant said that Yammer, FAQs, Microsoft SharePoint, email, Microsoft Teams, its internal homepage, and digital signage were some of the tools used to bring the message to its employees.

Microsoft said its communications team focused on promoting the new look and features of Windows 11, including the speed of the update and its flexible scheduling.

The news comes as adoption of Windows 11 by the wider market seems to be moving relatively slowly.

In March 2022, Windows 11 took just 0.1% market share from other editions of Microsoft's software, accounting for 19.4% of the overall usage, with a further 0.6% using a Windows 11 Insider build.

It seems consumers also need to be wary of installing and managing their own Windows 11 updates, as some cybercriminals seem to be snapping up the opportunity to attack devices.

Security researchers found a fake Windows 11 upgrade website that promises to offer a free Windows 11 install for PCs that don’t meet the minimum specifications, but instead installs data-stealing malware.

Date

25 Apr 2022

Sources


Share


Other Blog

  • Microsoft begins killing off the Control Panel in Windows 10

    The journey to replace the Control Panel is coming to an end, with users being redirected to newer Settings pages.

    Read More
  • Best iPad 2020: is the iPad Air, Mini or Pro the best for you?

    Whether you want the best iPad Pro or the best cheaper iPad, you'll find the best options here.

    Read More
  • Microsoft's Linux work apparently broke itself

    Microsoft’s repository of its Linux packages was down for over 18 hours.

    Read More
  • HPE reveals attack on Aruba Central platform

    Threat actors have managed to compromise and access data about devices monitored by Hewlett Packard Enterprise (HPE)-owned Aruba Networks, the company has revealed. 

    Aruba provides network access solutions for large enterprise networks through Aruba Central, which is its unified cloud-based network operations, assurance and security platform that helps streamline deployment, and management of wireless, wired and WAN environments.

    According to a FAQ on the incident, HPE/Aruba shares that an unauthorized actor got hold of an access key, which enabled them to view “a limited subset of information” held in Aruba Central.

    “The data repositories exposed to the external actor contained information classified as "Customer Personal Data" under our Data Privacy and Security Addendum and as a result, we are notifying customers of the incident,” shares the company.

    Damage control

    HPE’s security operations team noticed suspicious activity and immediately revoked the key, before launching an investigation that confirmed the unauthorized access.

    According to the company’s own admission, the threat actor had access to the data between October 9th, 2021, and October 27th, when HPE revoked the key.

    The company says that the “Customer Personal Data” in the exposed repositories consists of device Media Access Control (MAC) address, IP address, device operating system type and hostname, and, in certain cases, the username. Furthermore, the data repositories also contained other details, which can be used to extrapolate the general vicinity of a user's location. 

    Importantly though, the company has revealed that the exposed data did not include any sensitive or special categories of personal data, as defined by the General Data Protection Regulation (GDPR).

    Moreover, the company states that it has no reason to believe that the attackers exfiltrated any data.

    Make sure you stay protected against inadvertent data leaks with these best identity theft protection services

    Read More

Find Out More About Us

Want to hire best people for your project? Look no further you came to the right place!

Contact Us