Open-MS (Open-Management System) Ethan Hann 3.30.2010.

Slides:



Advertisements
Similar presentations
WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
Advertisements

ICS 434 Advanced Database Systems
Establishing an OU Hierarchy for Managing and Securing Clients Base design on business and IT needs Split hierarchy Separate user and computer OUs Simplifies.
Adding scalability to legacy PHP web applications Overview Mario A. Valdez-Ramirez.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 5 Database Application Security Models.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
Distributed Information Systems - The Client server model
Chapter 5 Database Application Security Models
Microsoft Operations Manager Presented by: Alen Plicanic.
Introduction to Web Applications Instructor: Enoch E. Damson.
Microsoft Load Balancing and Clustering. Outline Introduction Load balancing Clustering.
Web Application Architecture: multi-tier (2-tier, 3-tier) & mvc
N-Tier Architecture.
TOPIC 1 – SERVER SIDE APPLICATIONS IFS 234 – SERVER SIDE APPLICATION DEVELOPMENT.
Client/Server Architectures
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
COMP 6005 An Introduction To Computing Session Two: Computer Software Systems Software.
Migrating Business Apps to Windows Azure Marc Müller Principal Consultant, 4tecture GmbH
Module 1: Server Roles and Initial Configuration Tasks
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Client-Server & Peer-to-Peer Networks
File-Mate 1500 Design Review II
IT Infrastructure Chap 1: Definition
Network Operating Systems versus Operating Systems Computer Networks.
Database Application Security Models Database Application Security Models 1.
Introduction to Barracuda IM Firewall. Two Security Products in One Public IM Management –Manages traffic from public IM clients, including AIM, Yahoo!
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
Client – Server Architecture. Client Server Architecture A network architecture in which each computer or process on the network is either a client or.
Copyright © Clifford Neuman and Dongho Kim - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Advanced Operating Systems Lecture.
Objectives  To define network  To identify use of network  To differentiate major types of network  To identify basic networking terminologies  To.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
File-Mate 1500 Design Review III Keven Abbott Tyler Crouse Kiana Delventhal Liam Westby.
Intro – Part 2 Introduction to Database Management: Ch 1 & 2.
Database Architectures Database System Architectures Considerations – Data storage: Where do the data and DBMS reside? – Processing: Where.
Slide 1 ASP Authentication There are basically three authentication modes Windows Passport Forms There are others through WCF You choose an authentication.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 14 Database Connectivity and Web Technologies.
Windows Server 2003 with Active Directory and Group Policies Wendy Hurst Eastern Kentucky University Department of Technology CEN/CET.
Operating Systems Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
Application Development
Web Server.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Communications & Networks National 4 & 5 Computing Science.
Chapter 13Oracle9i DBA II: Backup/Recovery and Network Administration 1 Chapter 13 Network Administration and Server-side Configuration.
Comprehensive Project Management Solutions with the.NET Server family.
MICROSOFT WINDOWS 2000 NT ADVANCED SERVER Esra Tanrisever&Ozgur Topcu.
Introduction TO Network Administration
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
Creating competitive advantage Copyright © 2003 Enterprise Java Beans Presenter: Wickramanayake HMKSK Version:0.1 Last Updated:
Endpoints Lesson 17. Skills Matrix Endpoints Endpoints provide a reliable, securable, scalable messaging system that enables SQL Server to communicate.
Client – Server Architecture A Basic Introduction 1.
SNS Integrated Control System EPICS IOCs – Relational DB Connectivity Bridge A. Liyu, A. Zhukov.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Module 1: Introduction to Windows 2000 and Networking.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Peer-to-Peer Vs. Client/Server.
 Computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices include motherboards, hard drives,
Chapter 16 Client/Server Computing Dave Bremer Otago Polytechnic, N.Z. ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William.
N-Tier Architecture.
FTP - File Transfer Protocol
File Transfer Protocol
Comparison of LAN, MAN, WAN
Tiers vs. Layers.
RKL Remote key loading.
Distributed computing deals with hardware
File Operations Access Permissions.
APACHE WEB SERVER.
Presentation transcript:

Open-MS (Open-Management System) Ethan Hann

What will be presented? “The Benefits and Limitations of Implementing Computer Management Systems Using Web Technologies” Research Paper Open-MS Project

What is a Computer Management System? A client-server software system used by an IT department, typically, to manage client computers. What do they manage? – Antivirus – Encryption – Hardware and Software Auditing

Computer Management System Examples Symantec Endpoint Protection Manager – Antivirus and Network Security GuardianEdge Hard Disk Encryption – Whole Disk Encryption Open-AudIT – Hardware and Software Auditing

Typical CMS Architecture (That uses the web) Client Antivirus/Encryption/Whatever Usually Implemented as a Service or Daemon Web Server Web Service Administration Client Database Server Database Describes the state of the client. Policies and settings that should be applied to the client.

Why use the Web? Web servers are… – Secure – Reliable – Scale Well Load Balancing Devices + Additional Servers = Even Better Reliability and Scalability All the nuts and bolts are already put together for you.

My Project… Open-MS!

Open-AudIT Architecture Client A VBScript file that posts client data to the server. Some of this data is sensitive. Web Server Web Forms (No Authentication!) Database Server Database

My Project: Open-MS Client Windows Service Built Using C#.NET and WCF Communicates over HTTP Web Server Web Service Built Using C#.NET and WCF Hosted in IIS 7 Database Server Database Using MS SQL Server

Why Not “Open-AudIT Client?” Because that would be too easy! Open-MS – Uses a plug-in architecture to add additional functionality. – A plug-in will be created for Open-AudIT. – Open-MS client wraps the Open-AudIT VBScript.

But still, why not just make an Open-AudIT client?

The Real Beauty: Unmanaged to Managed! Open-MS TrueCryptSpider Moon Secure AV

Open-MS: Admin Interface

Questions?