Networks worms Denial of Service Phishing / Social Engineering BotnetsRootkits Technically-oriented social engineering attacks Cross-device attacks.

Slides:



Advertisements
Similar presentations
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Advertisements

2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Network Access Protection & Network Admission Control March 10, 2005 Teerapol Tuanpusa Network Consultant Cisco Systems Thailand Jirat Boomuang Technology.
Microsoft Forefront Client Security
Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
Building on the Foundation of Windows Vista: Introduction to Windows 7: Security and Management Dan Stolts IT Pro Evangelist Microsoft
PETs and ID Management Privacy & Security Workshop JC Cannon Privacy Strategist Corporate Privacy Group Microsoft Corporation.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
SAGE-AU Adelaide Windows Update Services Michael Kleef IT Pro Evangelist Microsoft Corporation Level 200.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
WCL313 Windows Vista Security Overview Mike Chan Sr. Product Manager.
Ronald Beekelaar Beekelaar Consultancy Forefront Overview.
Security and Policy Enforcement Mark Gibson Dave Northey
Optimizing Client Security by Using Windows Vista.
Kalpesh Patel Ramprabhu Rathnam
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Internet Explorer 7 Security Features Steve Lamb Technical Security Microsoft Ltd
Cliff Evans Security and Privacy Lead Trustworthy Computing Group Microsoft UK.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Security of Communication & IT systems Bucharest, 21 st September 2004 Stephen McGibbon Chief Technology Officer, Eastern Europe, Russia & CIS Senior Director,
Cyra Richardson Microsoft Corporation Internet Explorer 7.
Security and Compliance Bruce Cowper Senior Program Manager; Security Initiative Microsoft Canada Rodney Buike IT Pro Advisor Microsoft Canada.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Windows Vista: Volume Activation 2.0
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
A Holistic Approach to Malware Defense Bruce Cowper Senior Program Manager; Security Initiative Microsoft Canada.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Brad Allen Windows Client Technical Specialist Microsoft Corporation.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
Troubleshooting Windows Vista Security Chapter 4.
Module 14: Configuring Server Security Compliance
Windows Vista, 2007 Office system, and Exchange 2007 Better Together.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Mark Aslett Microsoft Introduction to Application Compatibility.
Security Fundamentals in Windows Vista Jayesh Mowjee Technical Consultant
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
May 30 th – 31 st, 2007 Chateau Laurier Ottawa. Getting it Done: Understanding the Security Features of Windows Vista Kai Axford, CISSP, MCSE-Security.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
Advancing Security Progress and Commitment Stuart Okin Chief Security Advisor – Microsoft UK Delivering on security (an update on progress)
Service Pack 2 System Center Configuration Manager 2007.
Connect with life Ravi Sankar Technology Evangelist | Microsoft Corporation Ravisankar.spaces.live.com/blog.
Delivering Assured Services John Weigelt National Technology Officer Microsoft Canada.
Internet Explorer 7 Updated Advice for the NHS 04 February 2008 Version 1.3.
Windows Server 2003 SP1 Technical Overview John Howard, IT Pro Evangelist, Microsoft UK
Securing Tomorrow’s World Microsoft Security Roadmap Ed Gibson & Steve Lamb Microsoft Ltd.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
Kaspersky Small Office Security INTRODUCING New for 2014!
David B. Cross Product Unit Manager Microsoft Corporation Session Code: SIA303 Donny Rose Senior Program Manager.
Windows Vista Configuration MCTS : Network Security.
HARDENING CLIENT COMPUTERS
Forefront Security ISA
Threat Management Gateway
Deriving more value from your Windows investment
Protect Your Computer Against Harmful Attacks!
Microsoft’s Security Strategy
{ Security Technologies}
Implementing Client Security on Windows 2000 and Windows XP Level 150
Designing IIS Security (IIS – Internet Information Service)
In the attack index…what number is your Company?
Using Software Restriction Policies
Presentation transcript:

Networks worms Denial of Service Phishing / Social Engineering BotnetsRootkits Technically-oriented social engineering attacks Cross-device attacks Evolving Landscape Financially motivated attacks Specific target attacks Broadcast attacks

Service Pack 2 More than 260 million copies distributed; Enterprise deployment at 61% 15 times less likely to be infected by malware Significantly fewer important & critical vulnerabilities Malicious Software Removal Tool 2B total executions; 200M per month Focus on most prevalent malware Dramatically reduced the # of Bot infections Most popular download in Microsoft history Helps protect more than 25 million customers Great feedback from SpyNet participants As of February 2006 Security configuration wizard More secure by design; more secure by default More than 4.7 million downloads Service Pack 1

Security as an Enabler

Aspirations for the Industry Trust Ecosystem Engineering for Security Simplicity Fundamentally Secure Platforms

Trust Ecosystem IndirectionServices IdentityServices ReputationServices

Engineering for Security Threat modeling Code inspection Penetration testing Unused features off by default Reduce attack surface area Least Privilege Prescriptive guidance Security tools Enterprise management

Security that just works Make it easier to write secure code Simplify enterprise security management Visibility, control and context Consistent and integrated management Common APIs Tools and services Simplicity

Fundamentally Secure Platforms Unified Audit across applications Policy-based access control Trust-based multi-factor authentication Protection technologies that enable isolation

Microsoft Leadership WS-* Web Services Architecture Anti-spam and anti-phishing Anti-malware and anti-spyware Identity Metasystem Broad partnerships Public policy Industry standards Technology Innovations Industry Collaboration

Stay Safe Online

Trust Ecosystem 64-Bit Driver Signing Windows Defender Info Card Plug and Play Smartcards Certificate Lifecycle Manager High Assurance SSL Certificates Anti Phishing Anti Spam Network Access Protection IPSec

Phishing Filter Dynamic protection against fraudulent Websites 3 “checks” to protect users from phishing scams Compares web site with local list of known legitimate sites Compares web site with local list of known legitimate sites Scans the web site for characteristics common to phishing sites Scans the web site for characteristics common to phishing sites Double checks site with online Microsoft service of reported phishing sites updated several times every hour Double checks site with online Microsoft service of reported phishing sites updated several times every hour Level 1: Warn Suspicious Website Signaled Level 2: Block Confirmed Phishing Site Signaled and Blocked Two Levels of Warning and Protection in IE7 Security Status Bar and MSN Search Toolbar

Engineering For Security Microsoft’s Security Development Lifecycle Updated periodically Evangelized internally through training Verified through pre-ship accountability Shared with ISV and IT development partners Documentation and training Learning Paths for Security Active community involvement Automated with tools in VS 2005 PREfastFxCop

SDL in Vista Code Quality (Quality Gates) Banned API Removal & SAL Annotations Weak Crypto Removal Giblets Initiative Threat Model Reviews Feature Reviews Penetration Testing Special Projects

Simplicity Security that just works Make it easier to write secure code Simplify enterprise security management Windows Vista Security Center Windows OneCare Live Info Card Active Directory Integration Windows Server Updates Services Microsoft Client Protection Visual Studio 2005 SDL Publishing best practices

Windows One Care Live

Prioritizes data to help focus resources on the right issues Maximizes the value of existing investments Guards against current and emerging malware threats Provides businesses the control they need to protect against current and emerging malware threats

Tools facilitate creating secure applications New Security Tools In Visual Studio Static Analysis Scan your code for security vulnerabilities Seamlessly create applications for a custom zone Create non-admin apps Secure by Default Use features like the /GS switch and SafeCRT libraries to create secure apps

Protect Data from Unauthorized Viewing Enable Secure Access to Information Protect Against Malware and Intrusions Fundamentally Secure Platform BitLocker Drive Encryption EFS Smartcard key storage Rights Management client IE Protected Mode Windows Defender Service Hardening User Account Control Improved Smartcard support Pervasive Kerberos

Malware Protection Defending systems from malicious attacks Protected Mode reduces severity of threats Eliminates silent malware install IE process ‘sandboxed’ to protect OS Designed for security and compatibility Protected Mode User Actio n IE Cache My Computer (C:) Broker Process Low Rights Windows Defender provides ongoing malware protection Detection, removal, and real-time blocking of spyware and other potentially unwanted software Protection of OS extensibility points Windows Service Hardening reduces attack surface area Runs services with reduced privileges Services have profiles for allowed file system, registry, and network activities that are enforced by the firewall and ACLs

User Account Control Goal: allow businesses to move to a better-managed desktop and consumers to use parental controls Make the system work well for standard users Allow standard users to change time zone and power management settings, add printers, and connect to secure wireless networks High application compatibility Make it clear when elevation to admin is required and allow that to happen in-place without logging off High application compatibility with file/registry virtualization Administrators use full privilege only for administrative tasks or applications User provides explicit consent before using elevated privilege

Data Protection in Vista Scenario RMSEFSBitLocker Protect my information outside my direct control Set fine-grained usage policy on my information Collaborate with others on protected information Protect my information to my smartcard Untrusted admin of a file share Protect my information from other users on a shared machine Lost or stolen laptop Physically insecure branch office server Local single-user file & folder protection

Windows Vista Security Jen Field Senior Product Manager Security Products Windows Vista Security

Roadmap Services Platform Products Frontbridge Federation Services Certificate Services ISA Server 2004 Sybari Antigen Active Directory with Group Policy Windows Rights Management Services Microsoft Identity Integration Server 2003 Data Protection Manager 2006 Windows XPSP2 Windows Server 2003 SP1 Anti-malware tools Microsoft Update Windows Server Update Services Smartcard Support Encrypted File System VPN Access Windows OneCare Live Microsoft Client Protection Microsoft Antigen Anti- virus and Anti-spam for messaging and collaboration servers ISA Server 2006 WinFX Windows Vista Windows Defender Windows Presentation Foundation “XPS” Authorization Manager Enhancements Windows Communication Foundation Improved Smartcard support Info Card Next generation of services Microsoft Identity Integration Services “Gemini” Microsoft Certificate Lifecycle Manager Active Directory Rights Management Services Content filtering services Next generation Active Directory Next generation security products Windows “Longhorn” Server Network Access Protection IPSec Enhancements Audit Collection Services

Support the Trust Ecosystem through accountable identities Embrace secure coding practices Drive for Simplicity Moving Ahead Together Develop products, services, and platforms using standards and best practices

© 2006 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.