Future of the Server Room Tour. Future of Your Server Room Three Pillars of Windows Server 2008 Virtualization Today and Tomorrow Take Control of Your.

Slides:



Advertisements
Similar presentations
The System Center Family Microsoft. Mobile Device Manager 2008.
Advertisements

© 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Microsoft ® Exchange Online Advanced Security Name Title Microsoft Corporation.
Microsoft Forefront Client Security
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
MIX 09 4/15/ :14 PM © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
Providing 802.1X Enforcement For Network Access Protection Mudit Goel Development Manager Windows Enterprise Networking Microsoft Corporation.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Security and Policy Enforcement Mark Gibson Dave Northey
Jamie Sharp Security Architect Microsoft Corporation
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Cliff Evans Security and Privacy Lead Trustworthy Computing Group Microsoft UK.
 Alexander Malek Lead Program Manager SharePoint Microsoft Corporation BB47.
Wally Mead Senior Program Manager Microsoft Corporation.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Session 1.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Built by Developers for Developers…. © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
Using the WDK for Windows Logo and Signature Testing Craig Rowland Program Manager Windows Driver Kits Microsoft Corporation.
A Day in the Life of a SharePoint Administrator Amit Puri Senior Development Lead Microsoft India.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or.
Future of the Server Room Tour. Ottawa Montreal Calgary Vancouver Toronto Future of Your Server Room Three Pillars of Windows Server 2008 Virtualization.
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.
demo Instance AInstance B Read “7” Write “8”

Steve Lamb Technical Security Advisor Microsoft Ltd
customer.
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
demo © 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Virtual Machine Management Challenges What are Solution Accelerators? Offline Virtual Machine Servicing Tool Next Steps.
demo Demo.
May 30 th – 31 st, 2007 Chateau Laurier Ottawa. Getting it Done: Understanding the Security Features of Windows Vista Kai Axford, CISSP, MCSE-Security.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
demo QueryForeign KeyInstance /sm:body()/x:Order/x:Delivery/y:TrackingId1Z
projekt202 © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
Service Pack 2 System Center Configuration Manager 2007.
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks.
© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or.
Introducing Windows Intune
Connect with life Ravi Sankar Technology Evangelist | Microsoft Corporation Ravisankar.spaces.live.com/blog.
Delivering Assured Services John Weigelt National Technology Officer Microsoft Canada.

Securing Tomorrow’s World Microsoft Security Roadmap Ed Gibson & Steve Lamb Microsoft Ltd.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Provided Under NDA - Secure Access to Corporate Resources.
David B. Cross Product Unit Manager Microsoft Corporation Session Code: SIA303 Donny Rose Senior Program Manager.
Enterprise Security in Practice
Configuring Windows Firewall with Advanced Security
Threat Management Gateway
Information Protection
Automated Response with Windows Defender ATP
Cybersecurity Strategy
Building an Integrated Security System Microsoft Forefront code name “Stirling” Ravi Sankar Technology Evangelist | Microsoft
What’s new in the Fall Creators Update for Windows Defender ATP
Implementing Client Security on Windows 2000 and Windows XP Level 150
Enabling the hybrid cloud with remote access appliances
System Center Marketing
Microsoft Virtual Academy
Microsoft Data Insights Summit
Presentation transcript:

Future of the Server Room Tour

Future of Your Server Room Three Pillars of Windows Server 2008 Virtualization Today and Tomorrow Take Control of Your Network Bring Security to the Forefront Ottawa Montreal Calgary Vancouver Toronto

Security Challenges Security is still a key priority 73% of IT Pro’s fear losing their job due to security breach* 65% of attacks are initiated internally** Multiple servers, multiple different AV tools; different AV tool, different management tool Out of date AV definitions open the door to possible threats Management and monitoring of client security Ottawa Montreal Calgary Vancouver Toronto * King Research 2007 ** Gartner Report 2006

Defence In-Depth Ottawa Montreal Calgary Vancouver Toronto Policies, Procedures, & Awareness Physical Security Using a layered approach: Increases an attacker’s risk of detection Reduces an attacker’s chance of success OS hardening, authentication, patch management Firewalls, Network Access Quarantine Control Application hardening, antivirus ACLs, encryption, EFS Security documents, user education Perimeter Internal Network Host Application Data Guards, locks, tracking devices Network segments, IPSec, NIDS

3 Dimensions of Client Security Ottawa Montreal Calgary Vancouver Toronto User Account Control IE7 with Protected Mode Randomize Address Space Layout Advanced Desktop Firewall Kernel Patch Protection (64bit) Unified Virus & Spyware Protection Central Management Reporting, Alerting and State Assessment Infrastructure Software Integration Policy Based Network Segmentation Restrict-To-Trusted Net Communications Server and Domain Isolation (SD&I) Combined Solution Windows Vista™ Forefront™ Client Security

BitLocker Protects data when it is at rest Available in Vista and Server 2008 Provides for cost effective decommissioning Capable of almost instant disk sanitation Significantly reduces cost of PC asset decommissioning Ottawa Montreal Calgary Vancouver Toronto

Network Access Requests Not Compliant Policy Compliant How NAP Works Corporate Network Restricted Network Windows Client Network Access Devices NPS Active Directory Remediation Servers Health Statements QA SHA EC QS SHV Ottawa Montreal Calgary Vancouver Toronto

Demo DHCP Based NAP

Security Landscape Ottawa Montreal Calgary Vancouver Toronto

ForeFront Server Security Centralized management of all the ForeFront Security tools Content filtering for SharePoint Spam protection for Exchange 2007 Rapid updating of AV engines Multiple engines to better protect your servers and clients Ottawa Montreal Calgary Vancouver Toronto

Multiple Engine Advantage Rapid response to new threats Fail-safe protection through redundancy Diversity of anti- virus engines and heuristics Small footprint on servers Response Time (hours) Forefront Set 1 Forefront Set 2 Forefront Set 3 Vendor A Vendor B Vendor C Spybot!04C Nugache.a Numuen.F Numuen.H Numuen.G Rbot!E , Bagle.EG Feebs.EU Virut.A 0.0 1,317.0 > 24 hrs 4 to 24 hrs < 4 hrs 1 AVTest.org, 2006 Ottawa Montreal Calgary Vancouver Toronto

Unified malware protection for business desktop computers, mobile computers, and server operating systems that is easier to manage and control One solution for spyware and virus protection Built on protection technology used by millions worldwide Effective threat response Complements other Microsoft security products One console for simplified security administration Define policy to manage client protection agent settings Deploy signatures and software faster Integrates with your existing infrastructure One dashboard for visibility into threats and vulnerabilities View insightful reports Stay informed with state assessment scans and security alerts Client Security Ottawa Montreal Calgary Vancouver Toronto

FCS Architecture Ottawa Montreal Calgary Vancouver Toronto November

ForeFront Update Distribution WSUS WSUS helper (if WSUS 2.0) Force WSUS 2.0 to sync up with Microsoft Update hourly Auto-approval rules for FCS definition updates Subscribe to FCS product category and definition update classification Failover to Microsoft Update Ottawa Montreal Calgary Vancouver Toronto

ForeFront Client Policies FCS policy manages the following Antimalware and Security State Assessment scan settings Signature override settings Alert levels and reporting Advanced settings Signature check frequency Path and file extension exclusions Client UI options Ottawa Montreal Calgary Vancouver Toronto

Demo FCS Administration

Deploying Policies via File Ability to deploy and report on a policy distributed outside of Group Policy Exports the policy to a.reg file Import on the client using the included “FCSLocalPolicyTool.exe” Q: Why can’t I just double-click the.reg file and import? A1: Service is listening for an update via GP, and this won’t raise the proper event – policy won’t be picked up until you stop/start the service A2: The tool creates the proper LGPO object, which is the prescribed method to update policy Can be used to distribute policy to non-AD machines (via scripts or other distribution tool) Ottawa Montreal Calgary Vancouver Toronto

Demo Deploying FCS

ForeFront Reporting Ottawa Montreal Calgary Vancouver Toronto Security Summary Alert SummaryThreat Summary State Assessment Deployment Summary

Ottawa Montreal Calgary Vancouver Toronto Visibility Is my environment compliant with outlined policies? Have I been exposed to and potential security threats? Are any of my clients or servers at risk?

Guidance Developer Tools Systems Management Active Directory Federation Services (ADFS) Identity Management Services Information Protection Encrypting File System (EFS) BitLocker™ Network Access Protection (NAP) Client and Server OS Server Applications Edge Ottawa Montreal Calgary Vancouver Toronto Putting the Puzzle Together

Key Points So Far.... Ottawa Montreal Calgary Vancouver Toronto Mitigate internal threats NAP/NPS to determine health of PCs Defence Deploy policies with or without AD Report on the state of AV In Centralize management MOM 2005 Built in Depth

Today’s Highlights Ottawa Montreal Calgary Vancouver Toronto More Control Greater Flexibility Increased Security Three Pillars Licensing Changes Familiar management tools Virtualization Monitor – not just Microsoft products Report – State of network, security auditing Act – Be proactive about maintenance Management Defence In Depth Mitigate internal threats Leverage FCS reporting to determine state of network Security

Resources Microsoft.ca/technet/fosr/resources Blogs.technet.com/canitpro Blogs.technet.com/cdnitmanagers Ottawa Montreal Calgary Vancouver Toronto

Thanks! Please Submit Your Evaluations! 9 is good, 1 is bad! Please tell us how we can do better!

Winners! Ottawa Montreal Calgary Vancouver Toronto

Questions

Ottawa Montreal Calgary Vancouver Toronto © 2007 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.