Jayesh Mowjee Security Consultant Microsoft Session Code: SIA203.

Slides:



Advertisements
Similar presentations
Identity & Security. Today's IT Security challenges Rising Internal Attacks 75% of companies report insiders responsible for breaches Growing headcount.
Advertisements

Microsoft Forefront Client Security
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
Secure Desktop Name Title Microsoft Corporation. Agenda.
Unified. Simplified. Unified Communications Launch 2007.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
Unleashing the Power of Ubiquitous Connectivity with IPv6 Sandeep K. Singhal, Ph.D Director of Program Management Windows Networking.
Ronald Beekelaar Beekelaar Consultancy Forefront Overview.
Ronald Beekelaar Beekelaar Consultancy Forefront Overview.
Why Improve Datacenter Automation? “ Studies show up to 80% of network availability incidents and 60% of security issues can be tied to human error” CIO.
Security and Policy Enforcement Mark Gibson Dave Northey
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Chris Sfanos Program Manager Forefront Client Security Microsoft Session Code: SW17.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Rob Williams Program Manager Microsoft Corporation.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Cliff Evans Security and Privacy Lead Trustworthy Computing Group Microsoft UK.
Ved Christian Stahl, Microsoft Enterprise Services Forefront Codenname ”Stirling”
SYSTEM CENTER: ENDPOINT PROTECTION FUNDAMENTALS Howard A. Carter III Senior Consultant Microsoft Consulting Services September 21, 2013 TechGate 2013 –
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Srinivas L Technology Specialist – Security | Microsoft
Wally Mead Senior Program Manager Microsoft Corporation.
Identity and Access Management Business Ready Security Solutions.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Dominik Zemp TSP Security Microsoft Switzerland
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
John “JG” Chirapurath Director, Identity & Security BG Microsoft SIA-205 Business Ready Security.
Yusuf Joosub Security Management SSP Microsoft Session Code: SIA302.
Anti-Malware Protection: A Technical Dive into Forefront Client Security Ketil Pedersen Technology Specialist Manager Microsoft.
Future of the Server Room Tour. Ottawa Montreal Calgary Vancouver Toronto Future of Your Server Room Three Pillars of Windows Server 2008 Virtualization.
Jim Harrison Program Manager, Forefront TMG Microsoft Corporation SESSION CODE: SIA325.
Shai Tirosh Windows Server Regional Director artNET Experts.
V-Alliance Solution Overview Years of Business Success.
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
Bill Jensen Bashar Kachachi Session Code: SIA309.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
Paul Cooke - CISSP Director Microsoft Session Code: CLI322.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
May 30 th – 31 st, 2007 Chateau Laurier Ottawa. Getting it Done: Understanding the Security Features of Windows Vista Kai Axford, CISSP, MCSE-Security.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Ellis Paul Technical Solution Specialist – System Center Microsoft UK Operations Manager Overview.
Connect with life Ravi Sankar Technology Evangelist | Microsoft Corporation Ravisankar.spaces.live.com/blog.
Walter Pitrof Technology Solution Professional Microsoft Switzerland Client Lifecycle Management mit Configuration Manager 2012 Chris Greuter Partner |
Delivering Assured Services John Weigelt National Technology Officer Microsoft Canada.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
David B. Cross Product Unit Manager Microsoft Corporation Session Code: SIA303 Donny Rose Senior Program Manager.
© 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks.
Microsoft Virtual Academy. Microsoft Virtual Academy First HalfSecond Half (01) Introduction to Microsoft Virtualization(05) Hyper-V Management (02) Hyper-V.
Deployment Planning Services
Hybrid Management and Security
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
SaaS Application Deep Dive
Threat Management Gateway
Excel Services Deployment and Administration
Cybersecurity Strategy
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
TechEd /7/ :16 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Microsoft Virtual Academy
Building an Integrated Security System Microsoft Forefront code name “Stirling” Ravi Sankar Technology Evangelist | Microsoft
What’s new in the Fall Creators Update for Windows Defender ATP
Service Template Creation from the Ground Up
Microsoft Virtual Academy
Microsoft Data Insights Summit
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
Microsoft Virtual Academy
Microsoft Virtual Academy
Presentation transcript:

Jayesh Mowjee Security Consultant Microsoft Session Code: SIA203

Session Objectives And Takeaways Session Objectives: Understand the capabilities of FCSv2 Know how FCSv2 protects endpoints against threats Plan an FCSv2 deployment Key Takeaways: FCSv2 provides comprehensive endpoint protection FCSv2 is part of Forefront codename: “Stirling”

Agenda Forefront Today Forefront Client Security v2 Unified Protection Simplified Administration Visibility and Control Enterprise Ready Question and Answer

Business Ready Security Help securely enable business by managing risk and empowering people Highly Secure & Interoperable Platform Block from: Enable CostValue SiloedSeamless to :

Comprehensive line of business security products that helps you gain greater protection and secure access through deep integration and simplified management Network Edge Server Applications Client & Server OS

Unified endpoint security that integrates anti-malware, host firewall and more Coordinated protection with Forefront codename: “Stirling” Inspection, threat mitigation and remediation Unified endpoint security that integrates anti-malware, host firewall and more Coordinated protection with Forefront codename: “Stirling” Inspection, threat mitigation and remediation Manage from a single role-based console Integrates with existing Microsoft infrastructure Easy discovery and deployment of protection for endpoints Manage from a single role-based console Integrates with existing Microsoft infrastructure Easy discovery and deployment of protection for endpoints One dashboard for visibility into threats, vulnerabilities, and configuration risks Increased visibility into endpoint security with vulnerability assessment scanning One dashboard for visibility into threats, vulnerabilities, and configuration risks Increased visibility into endpoint security with vulnerability assessment scanning Comprehensive protection for business desktops, laptops and server operating systems that is easier to manage and control ComprehensiveProtectionComprehensiveProtection SimplifiedAdministrationSimplifiedAdministration Visibility and Control Control

Comprehensive Protection Forefront Client Security v2 Vulnerability Remediation Reduce attack surface of vulnerabilities Host Firewall Restrict what applications can do Vulnerability Assessment Scan for vulnerabilities and configuration exposures Behavior Monitoring Monitor suspicious processes Antivirus/ Antispyware Block, remove and clean malicious software Proactive Reactive Limit exposure from vulnerable clients Network Access Protection

AVComparatives (Feb 2008) Test of consumer anti-virus products using a malware sample covering approximately the last three years. Received AVComparatives Advanced Certification FCS Awards and Certifications In recent tests, Microsoft rated among the leaders in anti-virus protection Test based on more than 1 million malware samples AVTest.org (March 2008)Kaspersky98.3%Symantec97.7% McAfee94.9% Microsoft93.9% VBA3287.7% AVK (G Data) 99.9% Trend Micro 98.7% Sophos98.1% Microsoft97.8% Kaspersky97.2% F-Secure96.8% Norton (Symantec) 95.7% McAfee95.6% eTrust / VET (CA) 72.1% Antivirus – Antispyware Building on FCS v1 Test based on more than 1 million malware samples AVTest.org (Sept 2008) AVK 2009 (G Data) 99.8%F-Secure99.2% Norton (Symantec) 98.7% Kaspersky98.4% Microsoft97.7% Sophos97.5% McAfee93.6% Trend Micro 91.3% CA - VET 65.5%

Antivirus – Antispyware Building on FCS v1 Integrated anti-virus/anti-spyware agent delivering real-time protection Uses Windows Filter Manager Maintains stable operation Scans viruses and spyware in real-time Dynamic Translation Unique to Microsoft agent Maximizes scanning speed: Decryption and code emulation of malware with speed of native code execution Other protection features: Tunneling signatures for detecting and removing rootkits Advanced system cleaning: Customized remediation (recreating registry entries, restoring settings) Event Flood Protection: Shields reporting infrastructure during outbreak from infected clients Heuristics for classifying programs based on behavior Better malware detection Multiple technologies for malware protection Greater stability of client environment Faster malware scanning conducted in real-time

Sources: West Coast Labs, AVTest.org, Performance benchmarking study conducted by West Coast Labs. Product Name/ Capability LeadingCompetitor Forefront Client Security Memory Footprint 1 Client – uninfected Client -infected 536 Mbs 593 Mbs 522 Mbs 495 Mbs Avg Usage, CPU & Memory 2 % Client – uninfected % Client - infected 82.37%88.56%79%81.6% Scanning time Uninfected client Infected client min min min min Application Startup time Starting Word with no AV – sec sec Starting IE with no AV – sec 2.6 sec 7% less CPU 2x faster Antivirus – Antispyware Building on FCS v1 Product Name/ Capability Leading Competitor Forefront Client Security Memory Footprint 1 ServerClient 58.6 Mbs 66.3 Mbs 56.5 Mbs 57.9 Mbs Avg Usage, CPU & Memory 2 % Server Avg % Client Avg 30.5%29.4%2.0%11.1% Boot time increase 3 62% avg increase 4.5% avg increase Scanning time (quick) Network 1 (Avg) 4 Network 2 (Avg) min 12.0 min 13.6 min 5.3 min Scanning time (full) Network 1 (Avg) 4 Network 2 (Avg) min 92.8 min 34.6 min 18.3 min 60%+ less CPU usage 14x faster at boot time 2x faster in quick scans 5x faster in full scans The FCS agent efficiently uses system resources, scans quickly, and detects malware effectively

Vulnerability Management Proactively reduce the surface area Check Assess Remediate NEW Detect common vulnerabilities and missing security updates Discover misconfiguration exposures Configure security checks parameter New checks include: IE Security Setting, DEP, IIS Setting, and more… Compare system configuration against security best practices Assign score based on associated risk Surface issues found across the enterprise in real time Automatically remediate based on policy Integrate with NAP for compliance enforcement Remotely remediate from the management console

Vulnerability Assessment Checks Available in Forefront Client Security v2 Internet Explorer Browser Security  Restricted Sites  Allowed Trusted Sites  Home Page Protection Internet Explorer Browser Security  Phishing Filter  Pop-up Blocker  Protected Mode Antimalware Malware detected and/or failed to clean BitLocker Device Control Antimalware  AM Service Running  AM Signatures Up-To-Date  AM Scan Required Windows Firewall Data Execution Prevention (DEP) Account Management  Guest Account  Autologon  Restrict Anonymous  Auditing (Login/Logoff)  Password Expiration File System  File System NTFS  Shares Security Updates  Approved Updates  Unapproved Updates  Automatic Updates Unnecessary Desktop Services Office Macros Internet Explorer Browser Security  Internet Explorer Zones  Enhanced Security Configuration User Account Control (UAC)  Application Elevation for App Install  Application Elevation for Signed Exe  Application Elevation for UIAccess Apps  ActiveX Install Without Prompt  Virtualization for File and Registry Failures  Admin Approval Mode for Built-In Admin  Elevation Prompt for Admins  Elevation Prompt for Standard Users  Admin Approval Mode for All Admins  Elevation Prompt Secure Desktop  Secure Credential Entry

Network Access Protection 15 Up-to-date Protection: ensures that all clients have the latest definitions & host protection policy Compliance Enforcement: enables administrators to enforce their corporate security policy and protect the network from non-compliant and vulnerable clients Outbreak Containment: protects the network from clients with active malware infections Network Eviction: enables administrators to protect the network from suspicious and potentially compromised clients

Host Firewall Firewall Management: centralized management of the Windows Firewall Windows XP/2003, Windows Vista/2008, and Windows 7 Support Inbound and Outbound Filtering Configure Firewall Exceptions for Ports, Applications, and Services Configure Network Location Profiles for Roaming Users Centralized Visibility: Firewall State in the Enterprise Sensors for Security Incident Detection Activity Monitoring Statistics

Central Management Server Central Management Server Forefront Code Name "Stirling" Network Edge Server Applications Client & Server OS An integrated security suite that delivers comprehensive protection across endpoint, application servers, and the edge that is easier to manage and control Code Name “Stirling” Third-Party Partner Solutions Other Microsoft Solutions Active Directory NAP Unified Management In-Depth Investigation Enterprise-Wide Visibility Security Assessment Sharing (SAS)

Simplified Administration With Stirling Protect your business with greater efficiency FCSv2 is managed through “Stirling” One console for simplified, role-based security management Define one security policy for your assets across protection technologies Deploy signatures, policies and software quickly Integrates with your existing infrastructure: SQL, WSUS, AD, NAP, SCCM, SCOM (new & existing)

REPORTS POLICY SIGNATURE, UPDATES MicrosoftUpdate GROUPS (OR ALTERNATE SYSTEM) POLICY EVENTS Network Access Protection (NAP) (OR ALTERNATE SYSTEMS) Forefront Client Security, Forefront Security for Exchange Server, Forefront Security for SharePoint, Forefront Threat Management Gateway Required Infrastructure INTEGRATION INFRASTRUCTURE CORE INFRASTRUCTURE Integration With Your Infrastructure

Stirling Core Stirling Console Stirling SQL DB SCOM Root Management Server (RMS) SCOM SQL DB SQL Reporting Server SQL Reporting DB Stirling Server Roles Software/Signature Deployment e.g. WSUS or SCCM (TYPICALLY ALREADY DEPLOYED BEFORE STIRLING) 250 – 2,500 Assets 1 Up to 25,000 Assets Stirling Console Stirling Core SCOM (RMS) SQL Reporting Server Stirling SQL DB SCOM SQL DB SQL Reporting DB WSUS Scaling Up… Stirling Console Stirling Core SQL Reporting Server SCOM RMS SCOM SQL DB + Per 25,000 Assets Per 20,000 Assets 1 1 WSUS 1 1 Stirling SQL DB SQL Reporting DB 1 An asset is a computer with one of the Stirling protection technologies (FCS, FSE, FSSP and/or TMG) Deployment and Scalability

Know your security state View insightful reports Investigate and remediate security risks Critical Visibility and Control Know where action is required

FCSv2 Tasks: Update signatures AM quick/full Scan Vulnerability scan Install missing updates Vulnerability remediation Network eviction Reboot computer Integrated With Dynamic Response Critical Visibility and Control Take action to remediate issues

Enhanced Enterprise Capabilities Forefront Client Security Scale to the largest enterprises Role-based Administration Virtualized Deployments Clustering and High Availability Deployments Support for both domain and non-domain joined assets Protection for Windows Server Roles Native NAP Integration Microsoft Confidential

Platform Support Client Agents Windows XP, Windows Vista, Windows 7 Windows 2003, Windows 2008 Virtual machines (MSFT virtual machine technology only) Non-domain joined machines Windows Embedded, WEPOS Server Infrastructure Windows Server 2003, Windows 2008 (x64 only) SQL Server 2008 Standard or Enterprise Will support installation of server infrastructure on virtual machines (MSFT virtual machine technology only) Will support clustered environments for high availability

Summary Forefront Client Security v2 provides unified protection for endpoints (desktops, laptops and servers) that is easier to manage and control Forefront Client Security v2 provides unified protection for endpoints (desktops, laptops and servers) that is easier to manage and control Built on FCS v1 strong foundations Offers greater protection Integrated with “Stirling” Centralized management Comprehensive, insightful reports Enterprise Ready

Sessions On-Demand & Community Resources for IT Professionals Resources for Developers Microsoft Certification & Training Resources Resources

© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.