Skip To Main Content
Intel logo - Return to the home page

Sign In

Your username is missing
Your password is missing

By signing in, you agree to our Terms of Service.

Forgot your Intelusername orpassword?

Frequently Asked Questions

Do you work for Intel? Sign in here.

Don’t have an Intel account? Sign up here for a basic account.

My Tools

Select Your Region

Asia Pacific

  • Asia Pacific (English)
  • Australia (English)
  • India (English)
  • Indonesia (Bahasa Indonesia)
  • Japan (日本語)
  • Korea (한국어)
  • Mainland China (简体中文)
  • Taiwan (繁體中文)
  • Thailand (ไทย)
  • Vietnam (Tiếng Việt)

Europe

  • France (Français)
  • Germany (Deutsch)
  • Ireland (English)
  • Italy (Italiano)
  • Poland (Polski)
  • Spain (Español)
  • Turkey (Türkçe)
  • United Kingdom (English)

Latin America

  • Argentina (Español)
  • Brazil (Português)
  • Chile (Español)
  • Colombia (Español)
  • Latin America (Español)
  • Mexico (Español)
  • Peru (Español)

Middle East/Africa

  • Israel (עברית)

North America

  • United States (English)
  • Canada (English)
  • Canada (Français)
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Alder Lake
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.
  1. Intel and Microsoft: Advanced Endpoint Security

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

Empower Possibilities with Modern Intel vPro® Devices

Read the eBook

Advanced Endpoint Security Coengineered by Intel and Microsoft

The work-from-anywhere future is here. Equip distributed workforces with one of the most advanced and security-focused platforms ever developed by Intel and Microsoft.

Your PC Fleet’s Foundation for Confidence and Continued Growth

A diverse install base of devices, operating systems (OSs), and cloud apps across distributed locations means a wider attack surface than ever before. Software-only solutions aren’t enough to address new vectors such as fileless and living-off-the-land attacks, threats cloaking in the VM, cryptojacking, and ransomware.

Security starts at the silicon level. Businesses need advanced cybersecurity that stays ahead of an evolving threat landscape. The combined intelligence of Intel vPro® at the hardware level and Microsoft Defender for Endpoint at the OS to software level results in one of the most advanced platforms offered by either company. Now endpoints can use silicon-based telemetry to help identify evolving threats and offload security workloads to the Intel-integrated GPU. Employees stay productive, and businesses can focus on growth despite disruption and uncertainty.

Hardware Is Essential to PC Security


Explore the Intel vPro® platform

Intel vPro® Platform

Hardware-enabled remote manageability gives IT the tools to fix compromised endpoints without needing to be in front of the device. This helps keep organizations secure while also getting end users back online and restoring productivity.

Intel® Hardware Shield

Below-the-OS security capabilities establish a root of trust and help prevent malicious code and privileged attacks from executing and escalating.

Intel® Threat Detection Technology (Intel® TDT)

12th generation Intel vPro® with Intel® TDT has the first and only hardware-based threat detection of its kind that works to augment security software for high-efficacy detection of the latest ransomware, cryptojacking, and supply chain style attacks in Windows-based systems.1

Microsoft Defender for Endpoint

Defender for Endpoint combines hardware telemetry from Intel® TDT with its own threat intelligence to help assess, block, and remediate threats automatically. Together, Microsoft Defender for Endpoint and the Intel vPro® platform deliver optimized capabilities that help increase security and performance across the organization and for a hybrid workforce.

Stay Ahead of Emerging Cybersecurity Threats

Detect and remediate threats remotely, help ensure uptime for distributed workforces, and keep business transformation projects on track with Intel vPro® platform-based devices.

Intel vPro® Enterprise

For larger enterprises and global corporations, Intel vPro® Enterprise on Windows devices helps drive optimal outcomes for enhanced remote productivity and IT manageability at scale.

Get started with Intel vPro® Enterprise

Intel vPro® Essentials for Small Business

Built for small, growing businesses, Intel vPro® Essentials on Windows devices delivers intelligence and platform hardening from the chip level up.

Explore Intel vPro® Essentials

Security Features That Are Easy to Deploy and Configure

The built-in protection and benefits of Intel vPro® help secure endpoints and sensitive data, simplifying IT’s job while helping minimize disruptions so workers stay focused and on task.

Featured Assets: Cybersecurity Challenges and Solutions

Access expert perspectives and demonstrations showcasing how to solve modern cybersecurity challenges and strategies for success.

Windows Security Is Rooted in Intel® Silicon

Discover how hardware and software security work together to enhance device protection.

Read the eBook

Security Unlocked Episode 58: Cryptojacking

Learn the basics of cryptojacking and how businesses can help safeguard their endpoints.

Listen to the podcast

How Hardware Sees Malware

Learn how silicon-based sensors can detect malware execution in everyday workloads and trigger client-side solutions.

Watch the video

Ransomware Blocked

Watch as Intel® TDT and Microsoft Defender automatically stop a ransomware execution in real time.

Watch the demo

Defending against Ransomware

Follow along on a step-by-step breakdown of how Intel and Microsoft work together to stop ransomware.

Read the blog post

Remotely Accessing Out-of-Band PCs

See how Intel® Endpoint Management Assistant (Intel® EMA) lets you control a PC as if you were sitting in front of it.

Watch the demo

Intel vPro® Customer Stories

Explore the real-world impact of the Intel vPro® platform and digital transformation solutions.

View customer stories

Show more Show less

Explore Related Business and Technology Resources

Continue your journey with a deep-dive exploration of specific cybersecurity capabilities and industry analysis.

Intel® Hardware Shield Product Page

Intel® TDT Product Page

Intel® TDT Anomalous Behavior Detection White Paper

Forrester: Tackle Endpoint Security

Forrester: Total Economic Impact™ of Intel vPro®

Intel and Microsoft: A Shared Cloud Vision

Windows 11 Secured-Core PCs


Microsoft is shipping millions of devices with Intel® TDT-enabled security capabilities.

Explore PC options

Product and Performance Information

1See intel.com/Performance-vPro for additional details. Performance varies by use, configuration, and other factors. Learn more at intel.com/PerformanceIndex. Performance results are based on testing as of dates shown in configurations and may not reflect all publicly available updates. No product or component can be absolutely secure.
  • Overview
  • Solution Information
  • Get Started
  • Featured Assets
  • Resources
  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Diversity & Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Do Not Share My Personal Information
  • Recycling

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration and other factors. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding complicity in human rights abuses. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to a violation of an internationally recognized human right.

Intel Footer Logo