Building on the Foundation of Windows Vista: Introduction to Windows 7: Security and Management Dan Stolts IT Pro Evangelist Microsoft

Slides:



Advertisements
Similar presentations
Microsoft ® Official Course First Look Clinic Overview of Windows 8 By Ragowo Riantory, S.Kom, MCP.
Advertisements

Ljubomir Ivaniš CPU d.o.o.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
The System Center Family Microsoft. Mobile Device Manager 2008.
Remote Desktop Services
System Center Configuration Manager Push Software By, Teresa Behm.
Benefits, Risks and Service Desk Impact. Robert Half Technology Kelly O’Connell Robert Half International Branch Manager 2/11/2010.
Welcome Thank you for taking our training. Collection 6292: Installing and Configuring Windows 7 Client Course – at
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Jayesh Mowjee Security Consultant Microsoft Session Code: SIA 201.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
Dan Stolts IT Pro Evangelist US DPE - North East Microsoft Corporation
Security and Policy Enforcement Mark Gibson Dave Northey
Full Packaged Product (FPP) OEM – PC Preinstall Volume Licensing.
Module 8: Implementing Administrative Templates and Audit Policy.
1 Objectives Discuss the Windows Printer Model and how it is implemented in Windows Server 2008 Install the Print Services components of Windows Server.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Session 2 – Security and Application Compatibility NameTitleCompany Your City MVP – Product Arrea
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Securing Windows Servers Using Group Policy Objects
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Week #7 Objectives: Secure Windows 7 Desktop
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
XPand your capabilities with Citrix ® MetaFrame XP ™ for Windows ®, Feature Release 2.
Configuring Encryption and Advanced Auditing
Troubleshooting Windows Vista Security Chapter 4.
Module 14: Configuring Server Security Compliance
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Configuring Folder Redirection and Offline Files Group Policy Settings
Module 7: Fundamentals of Administering Windows Server 2008.
Windows Vista, 2007 Office system, and Exchange 2007 Better Together.
Microsoft and Community Tour 2011 – Infrastrutture in evoluzione Community Tour 2011 Infrastrutture in evoluzione.
Managing User Desktops with Group Policy
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
Windows XP Professional Features ©Richard L. Goldman February 5, 2003.
Craig A. Brown Practice Leader – Microsoft Global Knowledge MCT, Since 1996 MCSA/MCSE NT/2000/2003 MCDST MCITP: ES / CS.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Security Fundamentals in Windows Vista Jayesh Mowjee Technical Consultant
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
Under The Hood Ranjana Jain IT Pro Evangelist Microsoft India MCSE, MCT, RHCE, CISSP, CIW Security Analyst.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Paul Cooke - CISSP Director Microsoft Session Code: CLI322.
“How can I reduce costs and take advantage of new technologies like virtualization?” “My users are becoming more savvy and have more diverse needs. How.
May 30 th – 31 st, 2007 Chateau Laurier Ottawa. Getting it Done: Understanding the Security Features of Windows Vista Kai Axford, CISSP, MCSE-Security.
May 25 – June 15, Technical Overview Bruce Cowper IT Pro Advisor Microsoft Canada Damir Bersinic IT Pro Advisor Microsoft.
1 Windows® 7 Manageability Corey Hynes President, Technical Lead HynesITe, Inc Music by DreamensionN
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Windows for the Enterprise Boris Ulík Technology Solutions Professional Microsoft Slovakia.
Jurgen Van Duvel Business Manager Windows Client Microsoft
Securing Tomorrow’s World Microsoft Security Roadmap Ed Gibson & Steve Lamb Microsoft Ltd.
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
Provided Under NDA - Secure Access to Corporate Resources.
© 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Tony Krijnen IT Pro Evangelist Daniel van Soest IT Pro Evangelist Session Code:CLI201.
Chapter Objectives In this chapter, you will learn:
Configuring Windows Firewall with Advanced Security
Preparing for the Windows 8.1 MCSA
IT Management, Simplified
Presentation transcript:

Building on the Foundation of Windows Vista: Introduction to Windows 7: Security and Management Dan Stolts IT Pro Evangelist Microsoft

Fundamentally Secure Platform Protect Users & Infrastructure Windows Vista Foundation User Account Control Enhanced Auditing Securing Anywhere Access Windows 7 Enterprise Security Building upon the security foundations of Windows Vista, Windows 7 provides IT Professionals security features that are simple to use, manageable, and valuable. Protect Data from Unauthorized Viewing Network Security Network Access Protection DirectAccess TM AppLocker TM Internet Explorer 8 Data Recovery RMS EFS BitLocker TM

Windows Vista Foundation Enhanced Auditing Make the system work well for standard users Administrators use full privilege only for administrative tasks File and registry virtualization helps applications that are not UAC compliant User Account Control XML based Granular audit categories Detailed collection of audit results Simplified compliance management Fundamentally Secure Platform Security Development Lifecycle process Kernel Patch Protection Windows Service Hardening DEP & ASLR IE 8 inclusive Mandatory Integrity Controls

User Account Control

Network Security DirectAccess TM Ensure that only “healthy” machines can access corporate data Enable “unhealthy” machines to get clean before they gain access Network Access Protection Security protected, seamless, always on connection to corporate network Improved management of remote users Consistent security for all access scenarios Securing Anywhere Access Windows Firewall can coexist with 3rd party products Multi-Home Profiles DNSSec (RFCs 4033, 4034 and 4035)

AppLocker TM Data Recovery Protect users against social engineering and privacy exploits Protect users against browser based exploits Protect users against web server exploits Internet Explorer 8 File back up and restore CompletePC™ image-based backup System Restore Volume Shadow Copies Volume Revert Protect Users & Infrastructure Enables application standardization within an organization without increasing TCO Increase security to safeguard against data and privacy loss Support compliance enforcement

AppLocker vs Software Restriction Policy 7 Feature Software Restriction Policies AppLocker Rule scopeAll usersSpecific user or group Rule conditions provided File hash, path, certificate, registry path, and Internet zone rules File hash, path, and publisher rules Rule types providedAllow and deny Default rule actionAllow or denyDeny Audit-only modeNoYes Wizard to create multiple rules at one time NoYes Policy import or exportNoYes Rule collectionNoYes PowerShell supportNoYes Custom error messagesNoYes

AppLocker TM

RMS BitLocker TM User-based file and folder encryption Ability to store EFS keys on a smart card EFS Easier to configure and deploy Roam protected data between work and home Share protected data with co-workers, clients, partners, etc. Improve compliance and data security Protect Data from Unauthorized Viewing Policy definition and enforcement Protects information wherever it travels Integrated RMS Client Policy-based protection of document libraries in SharePoint

BitLocker-to-go TM

Windows 7: Manageability Enterprise-scale Scripting Engine with PowerShell Scripting Richer Support Tools Customized Troubleshooting Enhanced Group Policy Scenarios Group Policy Preferences Reduce Help Desk Calls and Keep Users Productive Flexible Administrative Control Increased Automation to Reduce Costs

Reliability Monitor Reliability data is exposed via APIs for remote collection Integration of Reliability Monitor and Problem Reports and Solutions to better correlate system changes and events Resource Monitor SysInternals Process Explorer features integrated into Resource Monitor for clearer identification of process issues Windows Recovery Environment Windows Recovery Environment (WinRE) Restore to OEM or IT image without data loss or reimage with recent system backup System Restore Users will now be able to view the list of software changes before rolling their PC back Restore points will be available from system backups allowing users to roll-back to a point further back in time Problem Steps Recorder Users record steps taken when an issue occurs, giving help desk screen shots and comments to help resolve issues Keep Users Productive

Fundamentally Secure Platform Protect Users & Infrastructure Windows Vista Foundation User Account Control Enhanced Auditing Securing Anywhere Access Summary Building upon the security foundations of Windows Vista, Windows 7 provides IT Professionals security features that are simple to use, manageable, and valuable. Protect Data from Unauthorized Viewing Network Security Network Access Protection DirectAccess TM AppLocker TM Internet Explorer 8 Data Recovery RMS EFS BitLocker TM

Problem Step Recorder

15