PWG-IDS Differences of the attributes between NEA and NAP protocols By Ron Nevo Sharp June 2008.

Slides:



Advertisements
Similar presentations
1Copyright © 2008, Printer Working Group. All rights reserved. Imaging Device Security (IDS) Working Group Longmont, CO - PWG F2F Meeting June 25, 2008.
Advertisements

1Copyright © 2009, Printer Working Group. All rights reserved. PWG -Imaging Device Security (IDS) Working Group Irvine, CA - PWG F2F Meeting April 29,
1Copyright © 2009, Printer Working Group. All rights reserved. PWG -Imaging Device Security (IDS) Working Group Seattle area, WA IDS-Microsoft F2F Meeting.
1Copyright © 2010, Printer Working Group. All rights reserved. PWG Plenary Status Report IDS Working Group August 4, 2010 Bagsværd, Denmark- PWG F2F Meeting.
Surviving the PCI Self -Assessment James Placer, CISSP West Michigan Cisco Users Group Leadership Board.
Tech·Ed North America /6/2017 9:33 AM
Network Access Protection & Network Admission Control March 10, 2005 Teerapol Tuanpusa Network Consultant Cisco Systems Thailand Jirat Boomuang Technology.
10 Things You Can do to Secure Your PC Presented by Peter Nowak OIS Client Services Manager.
5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
What's new in Threat Management Gateway (TMG) 2010 Ronald Beekelaar
WCL317 Disclaimer The information in this presentation relates to a pre-released product which may be substantially modified before it’s commercially.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Agenda Introduction Network Access Protection platform architecture
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
Providing 802.1X Enforcement For Network Access Protection Mudit Goel Development Manager Windows Enterprise Networking Microsoft Corporation.
1Copyright © 2008, Printer Working Group. All rights reserved. PWG Imaging Device Security (IDS) Working Group Lexington, KY – P2600 Meeting October 24,
Copyright© Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 Tightening the Network: Network.
Network Access Protection Platform Architecture Joseph Davies Technical writer Windows Networking and Device Technologies Microsoft Corporation.
The State of Security Management By Jim Reavis January 2003.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Jayson Ferron CIO Interactive Security Training WSV206.
Security and Policy Enforcement Mark Gibson Dave Northey
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
Information Security in Real Business
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
How To Keep Up With Security Patches Eric Schultze Security Strategies Microsoft.
Windows Anti-virus and Security WNUG Meeting
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Course 201 – Administration, Content Inspection and SSL VPN
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Chapter 2: Installing and Upgrading to Windows Server 2008 R2 BAI617.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
1 Network Admission Control to WLAN at WIT Presented by: Aidan McGrath B.Sc. M.A.
Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Open Standards for Network Access Control Trusted Network Connect.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Using Microsoft Network Access Protection to test Dr.Web anti-virus software The workstations successfully checked by NAP can be used in a corporate network.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Endpoint Control. Module Objectives By the end of this module participants will be able to: Define application detection lists to monitor applications.
70-411: Administering Windows Server 2012
Implementing Network Access Protection
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Module 8: Configuring Network Access Protection
RINGS (ResNet Integrated Next Generation Solution) Educause Security Professionals Conference 2006.
Cisco’s Secure Access Control Server (ACS)
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
NEA Requirement I-D IETF 68 – Prague Paul Sangster Symantec Corporation.
Configuring Network Access Protection
TNC Proposals for NEA Protocols Presentation by Steve Hanna to NEA WG meeting at IETF 71 March 11, 2008.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
NAC-NAP Interoperability
Security Discussion IST Retreat June IT Security Statement definition In the context of computer science, security is the prevention of, or protection.
Microsoft Virtual Academy Windows Intune for IT Pros Jump Start M05: Windows Intune Policies David Tesar Richard Harrison.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Securing Tomorrow’s World Microsoft Security Roadmap Ed Gibson & Steve Lamb Microsoft Ltd.
Managing Network Access Protection. Introduction to NAP Issues  Although corporate networks are highly secured, no control over the configuration of.
D-Link Wireless AP with NAP 802.1x solution
Implementing Network Access Protection
Threat Management Gateway
100% Exam Passing Guarantee & Money Back Assurance
Download Cisco Exam Dumps - Valid Cisco Question Answers - Dumpsprofessor.com
Information Security Session October 24, 2005
PWG Plenary Status Imaging Device Security (IDS) Working Group
Security and identity (Network Access Protection, Parental Controls)
Intel Active Management Technology
Network Access Control
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
NAP / PWG Discussion August 17, 2009.
Presentation transcript:

PWG-IDS Differences of the attributes between NEA and NAP protocols By Ron Nevo Sharp June 2008

NAP-Network Access Protection (Microsoft) NEA-Network Endpoint Assessment (Cisco) NEA and NAP are a new platform and solution that controls access to network resources based on a client computers (Health) identity and compliance with corporate governance policy. NAP and NEA allow network administrators to define granular levels of network access based on who a client is, the groups to which the client belongs, and the degree to which that client is compliant with corporate governance policy. If a client is not compliant, NAP and NEA provide a mechanism to automatically bring the client back into compliance and then dynamically increase its level of network access. SoH/SSoH- Statement of Health

NEA vs NAP (Attributes) Attributes Type Attributes name NAPNEANAP Comments Product Name Vendor-specified SoH Attribute Product Information Version Vendor-specified SoH Attribute Numeric Version / String Version Vendor info Name -- Product Information Vendor-specified SoH Attributes Id part of MS System Generated IDs Sub Packet in MS System Generated IDs Packet which is one of SSoH attributes Product Information Optional -Vendor-specified SoH Attributes OS Name/type- Product Information A mandatory SSOH attributes This value set is in MS- Machine-Inventory Packet (a SSoH attribute (TV pairs)) in SSoH. The packet also has 2-byte ProcArch at end. Ver. OS Version Major, Version Minor, OS version Build Numeric Version / String Version Patches SP ver. Major Sp ver. MinorProduct Information Install date and time -Product Information Release date

NEA vs NAP (Attributes) Attributes Type Attributes name NAPNEAComments Applications Name Product InformationIETF Std. Attribute Version Numeric Version / String VersionIETF Std. Attribute Patches Product InformationIETF Std. Attribute AV-Software Software name Name Software -ID Software identifier Version version Scan-Engine Antivirus version DAT Version Anti Virus version DAT date Anti Virus date Protection Enabled 0 enable, 1 Disable ActionVendor specific content

NEA vs NAP (Attributes) Attributes TypeAttributes nameNAPNEAComments Others NAP MS Quarantine State Packet A mandatory SSoH attribute MS Packet Info Packet A mandatory SSoH attribute MS System Generated IDs Packet A mandatory SSoH attribute MS Correlation Id Packet A mandatory SSoH attribute MS Machine Name Packet A mandatory SSoH attribute MS Machine Inventory Ex Packet A mandatory SSoH attribute MS Installed Shvs packet(include Health Validation Service Id) A mandatory SSoH attribute -

(New Attributes)? (New Attributes)? Attributes Type Attributes name NAPNEAComments Certification TokenPWG Sub-Type Attribute? Minimal Security LevelsXXPWG Attribute? Encryption Key LengthXXPWG Attribute? AlgorithmXXPWG Attribute? Admin Password = defaultXXPWG Attribute? Configuration TokenPWG Sub-Type Attribute? Bridging/Forwarding enabled?XXPWG Attribute? Fax EnabledXXPWG Attribute? Secure Time?XXPWG Attribute? Trusted Secure Time Service?XXPWG Attribute? Firewall SettingsFirewallIETF Std. Sub-Type Attribute

Other comments ?