Information for Developers Windows XP Service Pack 2 Information for Developers Tony Goodhew Product manager Developer Division Microsoft Corp

Slides:



Advertisements
Similar presentations
Desktop Value - Introducing Windows XP Service Pack 2 with Advanced Security Technologies Presenter: James K. Murray Title: Information Technologies Consultant.
Advertisements

Microsoft Windows XP SP2 Urs P. Küderli Strategic Security Advisor Microsoft Schweiz GmbH.
WSUS Presented by: Nada Abdullah Ahmed.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Windows Server 2003 SP1. Windows Server™ 2003 Service Pack 1 Technical Overview Jill Steinberg: Added TM Jill Steinberg: Added TM.
NETOP REMOTE CONTROL What’s new in version 9.5? DECEMBER 09 NETOP REMOTE CONTROL1.
Unleashing the Power of Ubiquitous Connectivity with IPv6 Sandeep K. Singhal, Ph.D Director of Program Management Windows Networking.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Windows XP Service Pack 2 Technical Update. Windows XP Service Pack 2 Technical Workshop Agenda –Security Overview –Introduce Windows XP Service Pack.
Windows XP Service Pack 2 Alex Balcanquall Senior Consultant Microsoft Services Organisation.
Changes in Windows XP Service Pack 2
1 of 3 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Information for Developers Windows XP Service Pack 2 Information for Developers.
Ran Oelgiesser, Sr. Product Manager Praveen Vijayaraghavan, Program Manager (Virtual PC) Yigal Edery, Group Program Manager (MED-V)
Windows XP Service Pack 2 and the Microsoft Virtual Machine: Developer Implications Rudi Larno Developer & Platform Group Microsoft BeLux.
Winter Consolidated Server Deployment Guide for Hosted Messaging and Collaboration version 3.5 Philippe Maurent Principal Consultant Microsoft.
Windows XP Service Pack 2 Customer Awareness Workshop XP SP2 Technical Drilldown – Part 2 Craig Schofield Microsoft Ltd. UK September.
Security Flaws in Windows XP Service Pack 2 CSE /14/04 By: Saeed Abu Nimeh.
Internet Explorer Opportunities For Partners Margaret Cobb Product Manager IE Group Microsoft Corporation.
Security of Communication & IT systems Bucharest, 21 st September 2004 Stephen McGibbon Chief Technology Officer, Eastern Europe, Russia & CIS Senior Director,
Richard Smith Senior Consultant – Management, Operations and Deployment Microsoft UK Simple Deployments with Windows AIK and Windows DS.
Microsoft Windows XP SP2 for Developers Rafal Lukawiecki Strategic Consultant Project Botticelli Ltd This session is based.
2851A_C01. Microsoft Windows XP Service Pack 2 Security Technologies Bruce Cowper IT Pro Advisor Microsoft Canada.
Microsoft Desktop Virtualization Migrating to Windows 7 With MED-V.
Microsoft October 2004 Security Bulletins Briefing for Senior IT Managers updated October 20, 2004 Marcus H. Sachs, P.E. The SANS Institute October 12,
Avanade: 10 tips for å sikring av dine SQL Server databaser Bernt Lervik Infrastructure Architect Avanade.
Microsoft ® Official Course Module 9 Configuring Applications.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
DIT314 ~ Client Operating System & Administration CHAPTER 2 INTRODUCTION TO WINDOWS XP PROFESSIONAL Prepared By : Suraya Alias.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
1 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Using Internet Explorer 7.0 to Access Cisco Unity 5.0(1) Web Interfaces Unity 5.0(1)
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
OFC290 Information Rights Management in Microsoft Office 2003 Lauren Antonoff Group Program Manager.
C HAPTER 2 Introduction to Windows XP Professional.
Computer Emergency Notification System (CENS)
Module 5: Configuring Internet Explorer and Supporting Applications.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Windows XP Service Pack 2 Customer Awareness Workshop Trustworthy Computing – XP SP2 Technical Overview Craig Schofield Microsoft.
Windows XP Service Pack 2 Customer Awareness Workshop XP SP2 Technical Drilldown – Part 1 Craig Schofield Microsoft Ltd. UK September.
NetTech Solutions Supporting Users and Troubleshooting Desktop Applications on Microsoft Windows XP Instructor Richard Fredrickson.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
DEV395 No Touch Deployment for Windows Forms Jamie Cool Program Manager.NET Client Microsoft Corporation.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring Windows Server 2008 Printing.
Internet Explorer 7 Updated Advice for the NHS 04 February 2008 Version 1.3.
Windows Server 2003 SP1 Technical Overview John Howard, IT Pro Evangelist, Microsoft UK
Active X and Signed Applets Chad Bollard. Overview ActiveX  Security Features  Hidden Problems Signed Applets  Security Features  Security Problems.
ITMT Windows 7 Configuration Chapter 7 – Working with Applications.
1 BCS 4 th Semester. Step 1: Download SQL Server 2005 Express Edition Version Feature SQL Server 2005 Express Edition SP1 SQL Server 2005 Express Edition.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
Provided Under NDA - Secure Access to Corporate Resources.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
1/10/2018 9:33 PM Cloud Roadshow © 2014 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO.
TMG Client Protection 6NPS – Session 7.
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Microsoft Connect /15/2018 3:03 AM
11/19/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Windows Server 2008 Iain McDonald Director of Program Management
Implementing Client Security on Windows 2000 and Windows XP Level 150
TechEd /23/2019 9:23 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
Designing IIS Security (IIS – Internet Information Service)
Deploying and Managing Windows To Go
Microsoft Virtual Academy
Using Software Restriction Policies
Implementing Advanced Server and Client Security
Microsoft Virtual Academy
Presentation transcript:

Information for Developers Windows XP Service Pack 2 Information for Developers Tony Goodhew Product manager Developer Division Microsoft Corp Segment/Role Breakout Session: DEV354

Agenda Windows® XP Service Pack 2 Overview Developer Calls-To-Action

Exploits proliferating Time to exploit decreasing Exploits are more sophisticated Current approach is insufficient Security is a top priority No silver bullet: the solution is complex Change requires innovation Blaster Welchia/ Nachi Nimda 25 SQL Slammer Days between patch and exploit Background Responding to the Crisis

Securing Today’s World Windows XP SP2 Firewall on by default All outstanding fixes (QFE, Security, Customer) Safer and Web browsing Enhanced memory protection Available to developers at:

Windows XP SP2 Overview Memory Offer system-level protection for the base operating system Network Help protect the system from directed attacks from the network /IM Helps provide security for and Instant Messaging experience Web Helps provide security for Internet experience for most common Internet tasks

Windows firewall Intended Goal and Customer Benefit Offer increased protection from network attacks by default Focused on roaming systems, small business, home users What We’re Doing Windows Firewall (formerly ICF) will be on by default More configuration options Group policy, command line, unattended setup Enhanced user interface Boot time protection Multiple profile support Connected to corporate network vs. home Enable file sharing on home networks with Windows Firewall Developer Call-to-Action In-bound network connections, by default, are not permitted Dynamically enable ports as necessary, but only for as long as necessary, disable when done Memory Network /IM Web

Demo Windows Firewall

DCOM and RPC changes Intended Goal and Customer Benefit Reducing DCOM / RPC attack surface exposed on network What We’re Doing Require authentication on default interfaces Offer programmatic ability to restrict RPC interfaces to local machine only Configuration of access and launch permissions for DCOM through registry Move most RPCSS code into reduced privilege process Offer customer-controlled option to require authentication to the end-point mapper Disable RPC over UDP by default Developer Call-to-Action Where appropriate, use new RPC API to limit calls to local machine Ensure your application doesn’t require anonymous clients Don’t use RPC over UDP Network Memory /IM Web

Demo DCOM Security

Attachments Intended Goal and Customer Benefit System-provided mechanism for applications, intended to provide security for unsafe attachments Consistent user experience for attachment “trust” decisions What We’re Doing Offering new public API for handling of attachments (Attachment Execution Services) Default to “not trust” unsafe attachments Outlook ®, Outlook ® Express, Windows ® Messenger, Internet Explorer updated to make use of new API Security enhanced message “preview” Replaces AssocIsSafe() Developer Call-to-Action Use new API in your applications for better user experience, and better identification of potentially unsafe content Memory Network /IM Web

Demo Attachment Execution Services

Web Browsing Intended Goal and Customer Benefit Offer a security enhanced web browsing experience What We’re Doing Locking down local machine and local intranet zones Improving notifications for running or installing applications and ActiveX® controls HTML files on the local machine will not be able to script potentially unsafe ActiveX controls or access data across domains in the Local Machine Security Zone Blocking unknown, unsigned ActiveX controls Disarm cross domain script attacks on APIs Improved detection and handling of downloaded files through improvements to mime-handling code path Files served with mismatched or missing mime-headers and file extensions may be blocked Memory Network /IM Web

Web Browsing (cont’d) What We’re Doing (continued) Mitigate ActiveX® reuse through potential limited control leashing and increased amount of guided user experience Limit UI spoofing Pop-up windows will be suppressed unless they are initiated as a result of user action Developer Call-to-Action Check for web application compatibility with newly enhanced browsing defaults Identify whether controls are safe for scripting on the Internet, or if they can be more restricted Memory Network /IM Web

Demo IE Changes

Data Execution Protection Intended Goal and Customer Benefit Reduce exposure of some buffer overruns What We’re Doing Leverage hardware support in 64-bit and newer 32-bit processors to only permit execution of code in memory regions specifically marked as execute Reduces exploitability of buffer overruns Enable by default on all capable machines for Windows binaries Developer Call-to-Action Ensure your code doesn’t execute code in a data segment Ensure your code runs in PAE mode with <4GB RAM Use VirtualAlloc with PAGE_EXECUTE to allocated memory as executable Test your code on 64-bit and 32-bit processors with “Execution protection” Memory Network /IM Web

Demo Data Execution Prevention

SP2 Call-To-Action Right now Write secure code! Read Writing Secure Code, Second Edition by Michael Howard (MSPress) Michael HowardMichael Howard Ensure your applications work with a host firewall enabled Get the Service Pack from MSDN and test your applications Immediate Future Test your code with non-executable memory on 64- bit or capable 32-bit processors For more information, see

© Microsoft Corporation. All rights reserved. Windows, Microsoft, Outlook and ActiveX are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.