Defending Laptops with MinUWet By Erick Engelke. Laptops and our future? laptops now outsell desktops laptops now outsell desktops we expect continued.

Slides:



Advertisements
Similar presentations
Anders Vinger, University of Oslo Personal Data Recovery The pain of laptops.
Advertisements

Network Access Protection & Network Admission Control March 10, 2005 Teerapol Tuanpusa Network Consultant Cisco Systems Thailand Jirat Boomuang Technology.
Supporting The Mobile Client: Expanding Our Borders John Guidone Manager, Desktop Technologies and Dawn E. Colonese Manager, Help Desk & Client Access.
Minuwet 2.0 Aruba and More. Minuwet 1.0 Provided sanity check on wireless computers 8,370 distinct users used it in March 2008 Saved lots of IT effort.
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
Supporting A Laptop Environment Erick Engelke Faculty of Engineering University of Waterloo
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
©2005 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software SSL VPN Solutions Technical Overview Thorsten Schuberth Technical.
Copyright© Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 Tightening the Network: Network.
© 2008 McAfee, Inc. “Endpoint” Security Defining the endpoints and how to protect them.
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
Information Security in Real Business
Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Windows Anti-virus and Security WNUG Meeting
PresentPC August 2009 Erick Engelke Engineering Computing.
Norman Endpoint Protection Advanced security made easy.
1 Panda Malware Radar Discovering hidden threats Technical Product Presentation Name Date.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Course 201 – Administration, Content Inspection and SSL VPN
Internet safety By Lydia Snowden.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
1 Network Admission Control to WLAN at WIT Presented by: Aidan McGrath B.Sc. M.A.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Brown University Exchange 2003 Molly Baird Manager, Windows-Novell Services.
Laptops, Notebooks, & Tablets, Oh My! Kathleen Hamby M.S. CBPA Governors State University.
Module 8: Managing Client Configuration and Connectivity.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Campus Network Accession - Authentication and Controlling Student Laptops Brian O’Hora BSc (Hons) & MBA Technology Management Networks & Infrastructure.
Endpoint Control. Module Objectives By the end of this module participants will be able to: Define application detection lists to monitor applications.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
CERN’s Computer Security Challenge
70-411: Administering Windows Server 2012
© British Telecommunications plc BT Managed Services Innovate
Honeypot and Intrusion Detection System
Mobile Device Management Central Management of Wintel Laptop Software and Hardware in a Secure Environment.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Time lag between discovering issue and resolving Difficult to find solutions and patches that can help resolve issue Service outages expensive and.
CAEN Wireless Network College of Engineering University of Michigan October 16, 2003 Dan Maletta.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Living Next to the Anarchists By Erick Engelke. Anarchists? Anarchy is (various definitions) - lawlessness or disorder when there is a lack of governance.
Operating Systems & Information Services CERN IT Department CH-1211 Geneva 23 Switzerland t OIS Update on Windows 7 at CERN & Remote Desktop.
Defending Laptops with MinUWet By Erick Engelke. Laptops and our future? laptops now outsell desktops laptops now outsell desktops we expect continued.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Copyright ©2015 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training WatchGuard XCS What’s New in version 10.1.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
What is Spam? d min.
Frontline Enterprise Security
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Defending Laptops with MinUWet By Erick Engelke. Laptops and our future? laptops now outsell desktops laptops now outsell desktops we expect continued.
CSCE 201 Identification and Authentication Fall 2015.
What’s New in Fireware v WatchGuard Training.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Page PearsonAccess™ Technology Training Online Test Configuration.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
CACI Proprietary Information | Date 1 PD² v4.2 Increment 2 SR13 and FPDS Engine v3.5 Database Upgrade Name: Semarria Rosemond Title: Systems Analyst, Lead.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Remote Support Remote Support World leading Online Computer Support with iGennie on and get Online Technical Support, Online Computer Help,
Tuque Automated Software Distribution System By Erick Engelke.
Barracuda SSL VPN 2012.
Chapter 7. Identifying Assets and Activities to Be Protected
Self-service enrollment for Windows desktops
Presentation transcript:

Defending Laptops with MinUWet By Erick Engelke

Laptops and our future? laptops now outsell desktops laptops now outsell desktops we expect continued growth of laptops we expect continued growth of laptops laptops present new opportunities for learning and budgets, but also new IT staff challenges laptops present new opportunities for learning and budgets, but also new IT staff challenges laptop security issues are time-consuming for staff laptop security issues are time-consuming for staff outdated antivirus definitions and OS updates need Internet connectivity to be updated outdated antivirus definitions and OS updates need Internet connectivity to be updated

Solution: We need a strategy which encourages responsible client laptop management

Possible Solutions Cisco NAC (Network Admission Control) - forklift upgrade Cisco NAC (Network Admission Control) - forklift upgrade Microsoft… NAP (Network Access Protection) vapourware due with Vista server Microsoft… NAP (Network Access Protection) vapourware due with Vista server UToronto Endpoint Security Policy (see Managing Self-Managed Computers at this conference) (just learned about it this May) UToronto Endpoint Security Policy (see Managing Self-Managed Computers at this conference) (just learned about it this May)

Continuum of Security none - anarchy available but optional encouraged / accessible heavily enforced

Accessible Security? make technology simple to conceptualize though not necessarily understand make technology simple to conceptualize though not necessarily understand it becomes part of the culture it becomes part of the culture examples: examples: privacy of PIN numbers on debit cards privacy of PIN numbers on debit cards security of SSL web sites security of SSL web sites eventual tolerance by users eventual tolerance by users

How to Encourage Security Educate Educate Reward Reward Remind Nag Embarrass Punish or

Possible Education Points 1. secure your computer Antivirus, Workstation Firewall, Updates, … Antivirus, Workstation Firewall, Updates, … 2. secure your applications MyWaterloo, SSH, Secure IMAP, VPN MyWaterloo, SSH, Secure IMAP, VPN 3. secure yourself best practices, (strong secret passwords), avoid probable malware best practices, (strong secret passwords), avoid probable malware users can conceptualize these points, but will they act ?

MinUWet Setting minimum standards NAA detects OS at login screen NAA detects OS at login screendetects highly vulnerable OS’s must endure a scan using MinUWet (currently only MS Windows) highly vulnerable OS’s must endure a scan using MinUWet (currently only MS Windows)MinUWet Antivirus enabled and up-to-date? Freshen! Antivirus enabled and up-to-date? Freshen! OS getting patches? OS getting patches?

MinUWet Setting minimum standards (cont.) NAA detects OS at login screen NAA detects OS at login screendetects highly vulnerable OS’s must endure a scan using MinUWet(currently only MS Windows) highly vulnerable OS’s must endure a scan using MinUWet(currently only MS Windows) MinUWet Antivirus enabled and up-to-date? Freshen! Antivirus enabled and up-to-date? Freshen! OS getting patches? OS getting patches? HTTP always allowed, download patches HTTP always allowed, download patches pass test… get additional or “premium” network access pass test… get additional or “premium” network access

MinUWet Setting minimum standards (cont) only test once per week, cache results only test once per week, cache results other OS’s are not affected other OS’s are not affected users who do not wish to participate or fail are granted web-only access users who do not wish to participate or fail are granted web-only access web only access is sufficient for AV and OS updates web only access is sufficient for AV and OS updates will still do existing security scans and SNORT will still do existing security scans and SNORT complementary solutions add more security complementary solutions add more security

Some MinUWet Facts idea is similar to Cisco NAC and MS NAP idea is similar to Cisco NAC and MS NAP MinUWet is compatible with all existing hardware and safe with non-MS OSs (challenging, many PDAs claim to be Windows). MinUWet is compatible with all existing hardware and safe with non-MS OSs (challenging, many PDAs claim to be Windows). local expertise, we can adapt it local expertise, we can adapt it Cisco and MS solutions are stronger but more difficult to run and inflexible Cisco and MS solutions are stronger but more difficult to run and inflexible MinUWet doesn’t have to be hack-proof, it just has to be better than today’s mess! MinUWet doesn’t have to be hack-proof, it just has to be better than today’s mess! MinUWet - retired upon better options MinUWet - retired upon better options

Statistics from Two Week Engineering Trial 6486 NAA Windows sessions 6486 NAA Windows sessions 3161 or 49% of sessions ran MinUWet 3161 or 49% of sessions ran MinUWet 628 distinct users ran MinUWet 628 distinct users ran MinUWet 168 or 26% of them failed the test initially 168 or 26% of them failed the test initially 75 or 45% of those who failed later passed. 75 or 45% of those who failed later passed. this indicate users upgraded their systems this indicate users upgraded their systems zero security threats observed (snort) zero security threats observed (snort)

Campus-wide Rollout March 2 nd March 2 nd “help desks” co-ordinate information sharing “help desks” co-ordinate information sharing March 3 rd – March 3 rd – appears in daily newsletter appears in daily newsletter brief message appears at each wireless user login brief message appears at each wireless user login both messages point to a web site where users can learn more and test their laptops ( both messages point to a web site where users can learn more and test their laptops ( Two Weeks Later: March 16 th Two Weeks Later: March 16 th MinUWet goes live and enforces user security MinUWet goes live and enforces user security

Adding Memory Users didn’t like testing every time Users didn’t like testing every time we subsequently added memory - computers need only validate once per week we subsequently added memory - computers need only validate once per week 2/3rds of passes are typically pre-approved 2/3rds of passes are typically pre-approved

How it Works Client System user logs in using browser user logs in using browser browser Identifies OS browser Identifies OS download MinUWet download MinUWet run MinUWet run MinUWet collect stats collect stats transmit stats transmit stats displays decision displays decision Web server logs user in checks OS against list looks for prior pass sets routing rules informs user of status makes decision changes router settings

What we did right… MinUWet is not too strict MinUWet is not too strict not testing for absolute latest patch, look for trend not testing for absolute latest patch, look for trend users can still download the patches they need users can still download the patches they need Web access granted until user demonstrates compromised/vulnerable system Web access granted until user demonstrates compromised/vulnerable system one week between tests, good compromise of security versus annoyance one week between tests, good compromise of security versus annoyance MinUWet is still strict MinUWet is still strict Not a one-time deal, we catch computers that fall out of scope for patches Not a one-time deal, we catch computers that fall out of scope for patches

Future move to a shared database to store notes of problem users move to a shared database to store notes of problem users adopt a self-remediation system – some prefer human contact, others want automation. adopt a self-remediation system – some prefer human contact, others want automation. wider deployment, grad student offices, maybe residences wider deployment, grad student offices, maybe residences eventual retirement when vendor product is better eventual retirement when vendor product is better

Thank you