Securing Tomorrow’s World Microsoft Security Roadmap Ed Gibson & Steve Lamb Microsoft Ltd.

Slides:



Advertisements
Similar presentations
Network Access Protection & Network Admission Control March 10, 2005 Teerapol Tuanpusa Network Consultant Cisco Systems Thailand Jirat Boomuang Technology.
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Microsoft Forefront Client Security
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
Building on the Foundation of Windows Vista: Introduction to Windows 7: Security and Management Dan Stolts IT Pro Evangelist Microsoft
Secure Platform Data Protection Secure Access Malware Protection
Security Features in Windows Vista. What Will We Cover? Security fundamentals Protecting your company’s resources Anti-malware features.
Providing 802.1X Enforcement For Network Access Protection Mudit Goel Development Manager Windows Enterprise Networking Microsoft Corporation.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
Chapter 7 HARDENING SERVERS.
WCL313 Windows Vista Security Overview Mike Chan Sr. Product Manager.
Security and Policy Enforcement Mark Gibson Dave Northey
Gabriel Fedorko Microsoft Slovakia. Evolving Security Threat Landscape Methods to Addressing Security Threats Microsoft Trustworthy Computing Addressing.
Optimizing Client Security by Using Windows Vista.
Kalpesh Patel Ramprabhu Rathnam
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Protection Through Software and Services James Hamilton General Manager Microsoft Corporation.
Windows Server 2008 Network Access Protection (NAP) Technical Overview.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Internet Explorer 7 Security Features Steve Lamb Technical Security Microsoft Ltd
What’s New in Exchange Online. Disclaimer This presentation contains preliminary information that may be changed substantially prior to final commercial.
Cliff Evans Security and Privacy Lead Trustworthy Computing Group Microsoft UK.
Security of Communication & IT systems Bucharest, 21 st September 2004 Stephen McGibbon Chief Technology Officer, Eastern Europe, Russia & CIS Senior Director,
Cyra Richardson Microsoft Corporation Internet Explorer 7.
Security and Compliance Bruce Cowper Senior Program Manager; Security Initiative Microsoft Canada Rodney Buike IT Pro Advisor Microsoft Canada.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Windows Vista: Volume Activation 2.0
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Networks worms Denial of Service Phishing / Social Engineering BotnetsRootkits Technically-oriented social engineering attacks Cross-device attacks.
A Holistic Approach to Malware Defense Bruce Cowper Senior Program Manager; Security Initiative Microsoft Canada.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Week #7 Objectives: Secure Windows 7 Desktop
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Module 14: Configuring Server Security Compliance
Module 6 Planning and Deploying Messaging Security.
Module 7 Planning Server and Network Security. Module Overview Overview of Defense-in-Depth Planning for Windows Firewall with Advanced Security Planning.
Security Fundamentals in Windows Vista Jayesh Mowjee Technical Consultant
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
May 30 th – 31 st, 2007 Chateau Laurier Ottawa. Getting it Done: Understanding the Security Features of Windows Vista Kai Axford, CISSP, MCSE-Security.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Delivering Assured Services John Weigelt National Technology Officer Microsoft Canada.
Internet Explorer 7 Updated Advice for the NHS 04 February 2008 Version 1.3.
Windows Server 2003 SP1 Technical Overview John Howard, IT Pro Evangelist, Microsoft UK
Module 5: Network Policies and Access Protection
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Windows Vista Configuration MCTS : Network Security.
Security Insights: How Microsoft Secures IT
Threat Management Gateway
Deriving more value from your Windows investment
Microsoft’s Security Strategy
{ Security Technologies}
Implementing Client Security on Windows 2000 and Windows XP Level 150
In the attack index…what number is your Company?
Using Software Restriction Policies
Security Insights: Secure Messaging
Presentation transcript:

Securing Tomorrow’s World Microsoft Security Roadmap Ed Gibson & Steve Lamb Microsoft Ltd

Security Development Lifecycle Security Response Center Better Updates And Tools

A secure platform strengthened by security products, services and guidance to help keep customers safe Excellence in fundamentals Security innovations Scenario-based content and tools Authoritative incident response Awareness and education Collaboration and partnership

Microsoft Baseline Security Analyzer 2.0 Microsoft Update Automatic Updates

Social Engineering Protections Phishing Filter and Colored Address Bar Dangerous Settings Notification Secure defaults for IDN Protection from Exploits Unified URL Parsing Code quality improvements (SDLC) ActiveX Opt-in Protected Mode to prevent malicious software Internet Explorer 7

Run More Securely Least Privilege  User Account Control Anti-Phishing and IE Protected Mode - protection from unknown vulnerabilities! Windows Service Hardening Run More Securely Least Privilege  User Account Control Anti-Phishing and IE Protected Mode - protection from unknown vulnerabilities! Windows Service Hardening Communicate More Securely Network Access Protection Firewall/IPsec Integration EFS support for Smart Cards Communicate More Securely Network Access Protection Firewall/IPsec Integration EFS support for Smart Cards Stay More Secure Anti-malware Restart Manager Client-based Security Scan Agent Control over device installation Stay More Secure Anti-malware Restart Manager Client-based Security Scan Agent Control over device installation Start More Securely BitLocker - Full Volume Encryption - Secure Startup - Trusted Platform Module Code Integrity Start More Securely BitLocker - Full Volume Encryption - Secure Startup - Trusted Platform Module Code Integrity Windows Vista - Integrated flexible security

Requesting access. Here’s my new health status. Network Access Protection Walk-through NetworkPolicyServer Client NetworkAccessDevice (DHCP, VPN) RemediationServers May I have access? Here’s my current health status. Should this client be restricted based on its health? Ongoing policy updates to Network Policy Server You are given restricted access until fix-up. Can I have updates? Here you go. According to policy, the client is not up to date. Quarantine client, request it to update. Corporate Network Restricted Network Client is granted access to full intranet. System Health Servers According to policy, the client is up to date. Grant access.

Service Pack 2 More than 275 million copies distributed 15 times less likely to be infected by malware Significantly fewer important & critical vulnerabilities Malicious Software Removal Tool 2.4B total executions; 230M per month Focus on most prevalent malware Dramatically reduced the # of Bot infections Most popular download in Microsoft history Helps protect more than 25 million customers Great feedback from SpyNet participants As of February 2006 Security configuration wizard More secure by design; more secure by default More than 4.7 million downloads Service Pack 1

© 2005 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

Reference Material

Identity Access Windows Server 2003 Federation Services Certificate Services Smart Card Support Microsoft Identity Integration Server 2003 Windows Server 2003 Active Directory with Group Policy Authorization Manager VPN Access Windows “Longhorn” Server Microsoft Identity Integration Services “Gemini” Microsoft Certificate Lifecycle Manager NextGen Active Directory Windows Vista Authorization Manager Enhancements Windows Communication Foundation Information Protection Encrypted File System Windows Rights Management Services Data Protection Manager 2006 Windows “Longhorn” Server Active Directory Rights Management Services Improved smart card support “WinFX” “InfoCard” Windows Vista BitLocker RMS Client EFS Improvements Windows Presentation Foundation “XPS” Windows “Longhorn” Server NextGen Access Policy Mgmt Solutions Identity & Access Control

Roadmap Services Platform Products Frontbridge hosted services for anti-virus and anti-spam filtering (for businesses) ISA Server 2004 Sybari Antigen anti- spam and anti-virus for , IM and SharePoint Windows XPSP2 Windows Server 2003 SP1 Anti-malware tools Microsoft Update Windows Server Update Services Windows Live OneCare (for consumers) Microsoft Client Protection Microsoft Antigen Anti-virus and Anti-spam for messaging and collaboration servers ISA Server 2006 Windows AntiSpyware Windows Vista Firewall Services Hardening Next generation of services Content filtering services Next generation of security products Network Access Protection IPSec Enhancements Audit Collection Services Threat & Vulnerability Mitigation

Next Generation Security and Compliance Identity & Access Control Threat & Vulnerability Mitigation Enable secure access to information Protect against malware and intrusions Code Integrity IE Protected Mode Windows Defender IPSEC/Firewall integration Network Access Protection User Account Control Plug and Play Smartcards Granular auditing Simplified Logon architecture Fundamentals Security Development Lifecycle Threat Modeling Code Scanning Service Hardening Information Protection BitLocker Drive Encryption EFS Smartcard key storage RMS client Control over removable device installation XPS Document + WPF APIs Engineered for the future

© 2006 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.