Donald Hester May 4, 2010 For audio call Toll Free 1 - 888-886-3951 and use PIN/code 227625 Windows 7 for IT Professionals Part 1: Security and Control.

Slides:



Advertisements
Similar presentations
Osman Parada Senior Technology Support Specialist San Bernardino Community College District November 4, 2009 For audio call Toll Free
Advertisements

Micah Orloff March 17, 2010 For audio call Toll Free and use PIN/code What's New with Blackboard 9: Increase Student Success by.
Marti Atkinson October 29, 2009 For audio call Toll Free and use PIN/code Free and Easy Collaboration Tools.
Sean Keegan August 5, 2008 For audio call Toll Free and use PIN/code The ABCs of PDFs Part 3: Creating Accessible PDF Documents.
Ryan Eash September 30, 2009 For audio call Toll Free and use PIN/code Camtasia for the Mac: Enhancing Online Learning for Mac.
Donald Hester October 21, 2009 For audio call Toll Free and use PIN/code Getting the Most from Word 2007, Part 2: References and.
The Art of PowerPoint, Part 2: Animations and Audio Zachary Schroeder April 9, 2008 For audio call Toll Free and use PIN/code
Janet Davis October 29, 2008 This is a VoIP session. All audio will be through your computer without any phone. The ABCs of PDFs with Acrobat 9, Part 2:
Bill Doherty and Pat James 2/25/2010 For audio call Toll Free and use PIN/code Professional Development on a Shoe String Budget.
Janet Davis October 22, 2008 For audio call Toll Free and use PIN/code The ABCs of PDFs with Acrobat 9, Part 1: ePortfolios, Converting.
The Art of PowerPoint, Part 1: Tools, Views and Master Slides Zachary Schroeder April 2, 2008 For audio call Toll Free and use PIN/code.
Micah Orloff September 21, 2010 For audio call Toll Free and use PIN/code
Donna Eyestone February 23, 2011 For audio call Toll Free and use PIN/code
Gregory Beyrer July 22, 2010 For audio call Toll Free and use PIN/code From Blackboard to Desire2Learn.
Donna Eyestone 2/24/2010 For audio call Toll Free and use PIN/code Free Podcast Hosting with 3CRSS.
Tony McKinley August 11, 2009 For audio call Toll Free and use PIN/code Save $$ with Nuance's New PDF Converter.
Micah Orloff March 10, 2010 For audio call Toll Free and use PIN/code What's New with Blackboard 9: Increase Student Retention.
Donald Hester March 30, 2010 For audio call Toll Free and use PIN/code IT Best Practices for Community Colleges Part 3: Configuration.
Donald Hester March 9, 2010 For audio call Toll Free and use PIN/code IT Best Practices for Community Colleges Part 2: Business.
Donald Hester February 9, 2010 For audio call Toll Free and use PIN/code IT Best Practices for Community Colleges Part 1: IT Risk.
Richard Mundell November 11, 2009 For audio call Toll Free and use PIN/code Free and Easy Course Authoring with myUDUTU.
Eric Wilson, MS Ed March 16, 2010 For audio call Toll Free and use PIN/code Online Collaborative Groups.
Micah Orloff March 3, 2010 For audio call Toll Free and use PIN/code What's New with Blackboard 9: Getting Acquainted.
Donna Eyestone 4/21/2010 For audio call Toll Free and use PIN/code The Power of iLife.
Eric Wilson August 5, 2010 For audio call Toll Free and use PIN/code
Micah Orloff July 31, 2008 For audio call Toll Free and use PIN/code The Art of PowerPoint 2007 Part 1: Tools, Views and Master.
Michelle Macfarlane November 10, 2009 For audio call Toll Free and use PIN/code Building Community Online, Part 5: Social Networking.
Micah Orloff August 7, 2008 For audio call Toll Free and use PIN/code The Art of PowerPoint 2007 Part 2: Animations and Audio.
Micah Orloff July 7, 2009 For audio call Toll Free and use PIN/code What's New on Blackboard: Exploring the Grade Center.
Tahiya Marome October 8, 2009 For audio call Toll Free and use PIN/code Engaging Millennial Students with Fun Tech: Games.
Donald Hester October 7, 2009 For audio call Toll Free and use PIN/code Getting the Most from OneNote 2007.
Michelle Macfarlane September 24, 2009 For audio call Toll Free and use PIN/code Engaging Millennial Students with Fun Tech: Jing.
Donald E. Hester July 23, 2008 For audio call Toll Free and use PIN/code Get up to Speed with 2007 Office Part 2: PowerPoint, Outlook,
Micah Orloff May 5, 2011 For audio call Toll Free and use PIN/code
Donald Hester October 14, 2009 For audio call Toll Free and use PIN/code Getting the Most from Word 2007, Part 1: Creating and.
Blaine Morrow 3/2/2010 For audio call Toll Free and use PIN/code New Video Collboration with Elluminate.
Donald Hester October 7, 2010 For audio call Toll Free and use PIN/code
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
Donald E. Hester 19-Mar-2010 For audio call Toll Free and use PIN/code
Donald E. Hester October 30, 2009 For audio call Toll Free and use PIN/code Windows 7: The View Beyond Vista is Great.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
Chapter 6: Configuring Security. Options for Managing Security Configurations LGPO (Local Group Policy Object) –Used if Computer is not part of a domain.
Chapter 7 Installing and Using Windows XP Professional.
Microsoft ® Official Course Module 9 Configuring Applications.
Joan Van Duzer April 13, 2011 For audio call Toll Free and use PIN/code
Module 6 Securing Windows 7 Desktops. Module Overview Overview of Security Management in Windows 7 Securing a Windows 7 Client Computer by Using Local.
Micah Orloff and Donna Eyestone October 19, 2010 For audio call Toll Free and use PIN/code
Troubleshoot Access, Authentication, and User Account Control Issues Lesson 8.
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features.
Hands-On Microsoft Windows Server 2008
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
Tutorial 11 Installing, Updating, and Configuring Software
Using Windows Firewall and Windows Defender
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Managing User Accounts, Passwords and Logon Chapter 5 powered by dj.
Week #7 Objectives: Secure Windows 7 Desktop
Donna Eyestone February For audio call Toll Free and use PIN/code
Troubleshooting Windows Vista Security Chapter 4.
Eric Wilson July 30, 2010 For audio call Toll Free and use PIN/code
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 7 Windows 7 Security Features.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
Lesson 18: Configuring Security for Mobile Devices MOAC : Configuring Windows 8.1.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 7 Windows 7 Security Features.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
Chapter 1 Objectives Understand the History of Windows Over the Last 20-Plus Years. Compare and Contrast the Available Editions of Windows 7. Understand.
IT Best Practices for Community Colleges Part 3: Configuration Management Donald Hester March 30, 2010 For audio call Toll Free and use.
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Presentation transcript:

Donald Hester May 4, 2010 For audio call Toll Free and use PIN/code Windows 7 for IT Professionals Part 1: Security and Control

Maximize your CCC Confer window. Phone audio will be in presenter-only mode. Ask questions and make comments using the chat window. Housekeeping

Adjusting Audio 1)If youre listening on your computer, adjust your volume using the speaker slider. 2)If youre listening over the phone, click on phone headset. Do not listen on both computer and phone.

Saving Files & Open/close Captions 1.Save chat window with floppy disc icon 2.Open/close captioning window with CC icon

Emoticons and Polling 1)Raise hand and Emoticons 2)Polling options

Donald Hester Windows 7 for IT Professionals Part 1: Security and Control

User Account Control Windows BitLocker and Windows BitLocker To Go Windows AppLocker Windows Defender

User Groups UAC Security Settings Modify User Account Control Settings

User Groups Standard Users Administrators Standard Users Administrators Type of Elevation PromptDescription Consent Prompt Displayed to administrators in Admin Approval Mode when they attempt to perform an administrative task. It requests approval to continue from the user. Credential Prompt Displayed to standard users when they attempt to perform an administrative task.

Admin Approval Mode for the Built-in Administrator account Allow UIAccess applications to prompt for elevation without using the secure desktop Behavior of the elevation prompt for administrators in Admin Approval Mode Behavior of the elevation prompt for standard users Detect application installations and prompt for elevation Only elevate executables that are signed and validated Only elevate UIAccess applications that are installed in secure locations Run all administrators in Admin Approval Mode Virtualize file and registry write failures to per-user locations Admin Approval Mode for the Built-in Administrator account Allow UIAccess applications to prompt for elevation without using the secure desktop Behavior of the elevation prompt for administrators in Admin Approval Mode Behavior of the elevation prompt for standard users Detect application installations and prompt for elevation Only elevate executables that are signed and validated Only elevate UIAccess applications that are installed in secure locations Run all administrators in Admin Approval Mode Virtualize file and registry write failures to per-user locations

Elevation PromptDescription Never notify meUAC is off. Notify me only when programs try to make changes to my computer (do not dim my desktop) When a program makes a change, a prompt appears, but the desktop is not dimmed. Otherwise, no prompt appears. Notify me only when programs try to make changes to my computer When a program makes a change, a prompt appears, and the desktop is dimmed to provide a visual cue that installation is being attempted. Otherwise, no prompt appears. Always notify me The user is always prompted when changes are made to the computer.

Hardware Requirements for BitLocker Drive Encryption BitLocker Functionality BitLocker To Go Locate a Recovery Password

Encryption and decryption key Hard drive Encryption and decryption key Hard drive A computer with Trusted Platform Module (TPM) A removable USB memory device. A computer with Trusted Platform Module (TPM) A removable USB memory device. Have at least two partitions Have a BIOS that is compatible with TPM and supports USB devices during computer startup. Have at least two partitions Have a BIOS that is compatible with TPM and supports USB devices during computer startup.

BDE offers a spectrum of protection allowing customers to balance ease- of-use against the threats they are most concerned with. ****** *

17

Save recovery information in one of these formats A 48-digit number divided into eight groups. A Recovery Key in a format that can be read directly by the BitLocker recovery console. A 48-digit number divided into eight groups. A Recovery Key in a format that can be read directly by the BitLocker recovery console. Configure how to access an encrypted drive Use the Set BitLocker startup preferences window. Select an access option: USB Enter the Passphrase by using function keys No key Select an access option: USB Enter the Passphrase by using function keys No key

4 levels of AES encryption 128 & 256 bit the diffuser is a new unproven algorithm diffuser runs in about 10 clock cycles/byte Combination with AES- CBC for performance & security

Extends BitLocker Drive Encryption to portable devices Manageable through Group Policy Users choose to encrypt portable devices and use them to their fullest capabilities or leave them unencrypted and have them be read-only Enable BitLocker Drive Encryption by right-clicking the device and then clicking Turn On BitLocker Data on e ncrypted portable devices can be accessed from computers that do not have BitLocker enabled BitLocker can be configured to unlock with one of the following: Recovery Password or passphrase Smart Card Always auto-unlock this device on this PC BitLocker can be configured to unlock with one of the following: Recovery Password or passphrase Smart Card Always auto-unlock this device on this PC

22

23

24

Conditions that must be true: Before providing a password to a user: Conditions that must be true: Before providing a password to a user: Confirm the person is the account owner and is authorized to access data on the computer in question Examine the returned Recovery Password to make sure that it matches the Password ID that was provided by the user Confirm the person is the account owner and is authorized to access data on the computer in question Examine the returned Recovery Password to make sure that it matches the Password ID that was provided by the user Be a domain administrator or have delegated permissions The clients BitLocker recovery information is configured to be stored in AD The clients computer has been joined to the domain BitLocker Drive Encryption must be enabled on the clients computer

AppLocker Definition and Setup Application Rules Enforce and Validate AppLocker Rules

AppLocker Default rules AppLocker Default rules Enables IT professionals to specify exactly what is allowed to run on user desktops Allows users to run the applications, installation programs, and scripts that they need to be productive Make sure key operating system files run for all users Make sure key operating system files run for all users Prevent non-administrator users from running programs installed in their user profile directory Can be recreated at anytime

TypeDescriptionMerge rule Hash Uses the file hash of a file If two path rules have the same paths, they are merged into a single rule. Path Uses a folder path or file path If two publisher rules have the exact same publisher and product fields, they are merged. Publisher Uses the attributes of a digitally signed file, like publisher or version No optimizations are possible because each hash is unique.

Enforcement In Local Security Policy, Configure Rule Enforcement area Refresh computers policy with gpupdate /force In Local Security Policy, Configure Rule Enforcement area Refresh computers policy with gpupdate /force OptionDescription Enforce rules, but allow setting to be overridden Default setting. If linked GPOs contain a different setting, that setting is used. If any rules are present in the corresponding rule collection, they are enforced. Enforce rulesRules are enforced. Audit only Rules are audited, but not enforced.

Overview Alert Levels Windows Defender Tasks

Three ways to help protect the computer: Definitions Three ways to help protect the computer: Definitions Used to determine if software that it detects is spyware or other potentially unwanted software, and then to alert you to potential risks. Works with Windows Update to automatically install new definitions as they are released. Set Windows Defender to check online for updated definitions before scanning. Used to determine if software that it detects is spyware or other potentially unwanted software, and then to alert you to potential risks. Works with Windows Update to automatically install new definitions as they are released. Set Windows Defender to check online for updated definitions before scanning. Real-time protection (RTP) The SpyNet community Scanning options

Help you choose how to respond to spyware and potentially unwanted software Severe - remove this software immediately. High - remove this software immediately. Medium - review the alert details, consider blocking the software. Low - review the alert details to see if you trust the publisher. Severe - remove this software immediately. High - remove this software immediately. Medium - review the alert details, consider blocking the software. Low - review the alert details to see if you trust the publisher. Actions Quarantine – software is moved to another location on the computer; prevents the software from running until you choose to restore or remove it from the computer. Remove - permanently deletes the software from the computer. Allow - adds the software to the Windows Defender allowed list and allows it to run on the computer. Add software to the allowed list only if you trust the software and the software publisher. Quarantine – software is moved to another location on the computer; prevents the software from running until you choose to restore or remove it from the computer. Remove - permanently deletes the software from the computer. Allow - adds the software to the Windows Defender allowed list and allows it to run on the computer. Add software to the allowed list only if you trust the software and the software publisher.

Turn on Windows Defender Enable real-time protection Automatically check for new definitions Schedule a scan Manually scan for new definitions Windows Defender helps automatically remove malicious software.

Performance enhancement Removed the Software Explorer tool

Security and User Productivity Enhancements Customizable UAC requires fewer instances of elevation prompts Manageable through Group Policy BitLocker and BitLocker To Go BitLocker To Go extends BitLocker Drive Encryption to password-protected portable media Users choose to encrypt drive or leave read-only Manageable through Group Policy AppLocker Provides a rule-based structure to specify which applications are available to which end users Create default rules first View rule event information in the Event Viewer Windows Defender Integrated with Action Center Provides an improved user experience when scanning for spyware or manually checking for updates.

Donald E. Hester CISSP, CISA, CAP, MCT, MCITP, MCTS, MCSE Security, Security+ Maze & / San Diego City College Q&A

Evaluation Survey Link Help us improve our seminars by filing out a short online evaluation survey at:

Thanks for attending For upcoming events and links to recently archived seminars, check Web site at: Windows 7 for IT Professionals Part 1: Security and Control