Security for Mere Mortals Steve Lamb Technical Security Advisor Microsoft Ltd.

Slides:



Advertisements
Similar presentations
Unified. Simplified. Unified Communications Launch 2007.
Advertisements

Enabling IPv6 in Corporate Intranet Networks
Microsoft Windows XP SP2 Urs P. Küderli Strategic Security Advisor Microsoft Schweiz GmbH.
Unified. Simplified. Unified Communications Launch 2007.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
How (not) to use your firewall Jurjen N.E. Bos Information Security Consultant.
Secure Messaging Nick Hall & James Clifford Microsoft.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Windows XP Service Pack 2 Alex Balcanquall Senior Consultant Microsoft Services Organisation.
Welcome Mark Greatorex Director - Developer & Platform Group Microsoft Ltd.
Information for Developers Windows XP Service Pack 2 Information for Developers.
Lesson 19: Configuring Windows Firewall
WCLCT03 Windows Vista Security and UAC Chalk Talk Russ Humphries Mike Chan.
MICROSOFT ASSESSMENT AND PLANNING (MAP) TOOLKIT LAB Dev Chaudhari zevenseas India.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS158B Don Tran. What is a Firewall? A firewall can be a program or a device that controls access to a network.
Internet Explorer Opportunities For Partners Margaret Cobb Product Manager IE Group Microsoft Corporation.
Security of Communication & IT systems Bucharest, 21 st September 2004 Stephen McGibbon Chief Technology Officer, Eastern Europe, Russia & CIS Senior Director,
2851A_C01. Microsoft Windows XP Service Pack 2 Security Technologies Bruce Cowper IT Pro Advisor Microsoft Canada.
1 © 2006 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Using the Cisco Technical Support & Documentation Website for Security.
Course 201 – Administration, Content Inspection and SSL VPN
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
A Holistic Approach to Malware Defense Bruce Cowper Senior Program Manager; Security Initiative Microsoft Canada.
Information for Developers Windows XP Service Pack 2 Information for Developers Tony Goodhew Product manager Developer Division Microsoft Corp
Damian Leibaschoff Support Escalation Engineer Microsoft Becky Ochs Program Manager Microsoft.
Using Windows Firewall and Windows Defender
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
1 Safely Using Shared Computers Amanda Grady December 2013.
Internet and Intranet Fundamentals Class 9 Session A.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Security Assessment Tools Paula Kiernan Senior Consultant Ward Solutions.
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
Lesson 11: Configuring and Maintaining Network Security
Windows XP Service Pack 2 Customer Awareness Workshop XP SP2 Technical Drilldown – Part 1 Craig Schofield Microsoft Ltd. UK September.
Security fundamentals Topic 10 Securing the network perimeter.
Retina Network Security Scanner
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
A Network Security -Firewall Bruce Turin.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
IPv6 - The Way Ahead Christian Huitema Architect Windows Networking & Communications
Advancing Security Progress and Commitment Stuart Okin Chief Security Advisor – Microsoft UK Delivering on security (an update on progress)
Advancing Security Progress and Commitment. Individual control of personal data Products, online services adhere to fair information principles Protects.
Security Insights: User Security. Users – the Achilles heel Users interaction Security technology protects: Machine Machine User > Machine Machine.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Securing Tomorrow’s World Microsoft Security Roadmap Ed Gibson & Steve Lamb Microsoft Ltd.
Security Configuration Wizard - how to make your systems only do the things you need them to! Steve Lamb IT Pro Evangelist for Security Technologies
Windows Vista Configuration MCTS : Network Security.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Security fundamentals
Deployment Planning Services
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
Security Insights: How Microsoft Secures IT
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Deriving more value from your Windows investment
Best Practices for Securing Hybrid Clouds
Firewalls.
Chapter 2: Basic Switching Concepts and Configuration
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
Security in a Container based World
Fixing Bad IT Security: Stupid Mistakes and Dangerous Conveniences
Windows 7 Deployment en Masse
{ Security Technologies}
Implementing Client Security on Windows 2000 and Windows XP Level 150
Microsoft Data Insights Summit
7/28/ :33 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or.
Security in the Real World – Plenary Day One
Using Software Restriction Policies
Presentation transcript:

Security for Mere Mortals Steve Lamb Technical Security Advisor Microsoft Ltd

Microsoft Technical Roadshow days of in-depth technology information Birmingham – May Harrogate – 1-2 June London – 7-8 June Register now at:

Ground Rules for this Session It’s YOUR session based on your requests Interaction WILL BE rewarded Don’t be Shy There are NO STUPID questions We’re all friends here!

“You don’t put brakes on a car to go slower – you put them on to go faster more safely” User education is key As are processes and procedures Mis-configured systems are a major threat

“Good Security enables business to do more with less risk” Hold off the Rocket Science Apply Technology to Support the Business Policy Learn how the business works Don’t get in the way!

Keep It Simple Stupid!

Why Security Policies Fail!

Get a decent POLICY First! Forget the Rocket Science Start with a mandate from the top Define a realistic policy based on how users actually work! Keep it up to date Communicate it Why? Punish Offenders

Phishing

ISA – Application Layer Firewalling Currently – most firewalls check only basic packet information Real world equivalent of looking at the number and destination of a bus – and not looking at the passengers

XP SP2

Windows Firewall Basic behavior Outbound TCP Response from target IP only Outbound UDP Response from any IP; closed after 90 seconds of inactivity Outbound b’cast and m’cast Open for 3 seconds to permit reponse from same subnet only Unsolicited for apps Application must be on exception list Unsolicited for services Port must be statically opened Unsolicited RPC Firewall must be configured to permit inbound RPC

Internet Explorer Managing pop-ups

Internet Explorer Pre-SP2 IE ActiveX warning

Internet Explorer New IE ActiveX notice

Training and Awareness PEOPLE Social Engineering: IM and IRC downloads Training and Awareness: Apply procedures Carrot not stick: Recognise employees

Process - The Glue No where else in society do we put so much faith in technology. No-one has said, “This door lock is so effective that we don’t need police protection and breaking and entering laws.” Products work to a certain extent but you need processes in place to leverage their effectiveness. SOURCE: Bruce Schneier, CTO, Counterpane PROCESS

Embrace Process TECHNOLOGY Limit privilege Secure weakest link Defend in depth Enlist users Detect attacks Embrace simplicity Be vigilant Watch the watchers

RMS

How good is YOUR Security Knowledge?

Guidance and Tools Delivering Support, Creating Community Security tools Security Bulletin Search Tool Guidance and training Security Guidance Center How Microsoft Secure our own Infastructure - ITShowcase E-Learning Clinics Community engagement Newsletters Webcasts and chats

© 2005 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.