WSL officially welcomes Red Hat and also presents security, architecture and other improvements

wsl

Some days ago Microsoft unveiled through a blog post, the release of the WSL November Cumulative Update 2, which is quite important, since represents an important step in integration of Linux environments on Windows by announcing support official for Red Hat Enterprise Linux (RHEL).

The arrival of RHEL to WSL marks a significant advance within WSL, since Red Hat will begin providing specific builds RHEL builds designed for WSL, accessible through commands like wsl –list –online and wsl –install. This will make it easier to install and use RHEL directly from the system.

“Developers have their preferred platforms for developing applications for multiple operating systems, and WSL is an important platform for many of them. Red Hat is committed to providing greater choice and flexibility to developers, so we are working closely with the team at Microsoft to bring Red Hat Enterprise Linux, the largest commercially available open source Linux distribution, to all WSL users.”

-Ron Pacheco, Senior Director, Red Hat Enterprise Linux Ecosystem, Red Hat

Another novelty that is presented in this update, is eThe new method of packaging distributions, since now It is possible to install Linux distributions from files or network storage without requiring Windows-specific code. Previously, the appx-based architecture was used, in which a .tar file was included and packaged within an .appxbundle file, after which the code was written in Windows to configure and create users and then distributed through the Microsoft Store.

But that has now changed. with packaging that is based on a tar filewhich now It only requires one additional file /etc/wsl-distribution.conf, which includes metadata such as the name, icon, default user, and initial configuration scripts. These tarballs can be renamed with the .wsl extension and installed using the wsl –install command.

Besides that, A new initial welcome interface has been added which provides an overview of WSL's capabilities, along with instructions for users just getting started with Linux. This interface appears automatically when starting up a Linux virtual machine for the first time and can also be accessed from the configurator via the “Welcome to WSL” button.

On the part of the security enhancements that Microsoft has introduced in WSL, Those focused on improving business security stand out by strengthening zero trust practices. The updatess include advanced integrations with device compliance integration with Intune, which is now generally available, allowing IT administrators to:

  • Selective Distribution Control: Enforce policies that restrict which Linux distributions can be installed on WSL and which versions are allowed within an organization.
  • Compliance Assessment: WSL status is included as part of the overall compliance assessment for managed Windows devices. This ensures that WSL configurations meet enterprise security standards.
  • Guided Correction: When non-compliant Linux distributions or configurations are detected, users are provided with clear instructions to correct them via the Company Portal.

Another improvement security measures implemented is the integration of Microsoft Enter ID, which is available in private preview. Key features include:

  • Security in Token Management: Improves the handling of Entra authentication tokens, preventing their passage through network packets, which reduces the risk of interception.
  • Automatic Authentication: Allows Linux processes running on WSL to natively use Windows authentication credentials, providing a more seamless experience for users without compromising security.

finally if you are interested in knowing more about it, you can check the details in the following link


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.