Security Fundamentals in Windows Vista Jayesh Mowjee Technical Consultant

Slides:



Advertisements
Similar presentations
Ljubomir Ivaniš CPU d.o.o.
Advertisements

Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
The System Center Family Microsoft. Mobile Device Manager 2008.
Windows Vista Serious Challenges for Digital Investigators Authors: Darren Hayes Shareq Qureshi Presented By: Prerna Gupta.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Microsoft Forefront Client Security
Building on the Foundation of Windows Vista: Introduction to Windows 7: Security and Management Dan Stolts IT Pro Evangelist Microsoft
PETs and ID Management Privacy & Security Workshop JC Cannon Privacy Strategist Corporate Privacy Group Microsoft Corporation.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
Security Features in Windows Vista. What Will We Cover? Security fundamentals Protecting your company’s resources Anti-malware features.
4/16/ :01 AM © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
Unified Logs and Reporting for Hybrid Centralized Management
WCL313 Windows Vista Security Overview Mike Chan Sr. Product Manager.
Security and Policy Enforcement Mark Gibson Dave Northey
SEC316: BitLocker™ Drive Encryption
Optimizing Client Security by Using Windows Vista.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Smart Card Deployment David Gautrey IT Manager – Microsoft New Zealaand Microsoft Corporation.
Internet Explorer 7 Security Features Steve Lamb Technical Security Microsoft Ltd
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Security and Compliance Bruce Cowper Senior Program Manager; Security Initiative Microsoft Canada Rodney Buike IT Pro Advisor Microsoft Canada.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Clinic Security and Policy Enforcement in Windows Server 2008.
Networks worms Denial of Service Phishing / Social Engineering BotnetsRootkits Technically-oriented social engineering attacks Cross-device attacks.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
A Holistic Approach to Malware Defense Bruce Cowper Senior Program Manager; Security Initiative Microsoft Canada.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features.
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Hands-On Microsoft Windows Server 2008
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Week #7 Objectives: Secure Windows 7 Desktop
POSITIONING STATEMENT For people who operate shared computers with Genuine Windows XP, the Shared Computer Toolkit is an affordable, integrated, and easy-to-use.
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Troubleshooting Windows Vista Security Chapter 4.
Module 14: Configuring Server Security Compliance
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Windows Vista, 2007 Office system, and Exchange 2007 Better Together.
Windows XP Professional Features ©Richard L. Goldman February 5, 2003.
David Smith | Windows Client | Microsoft Canada Security Primer.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 7 Windows 7 Security Features.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Andrej Budja | Tehnološki svetovalec | Microsoft Slovenija.
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
May 30 th – 31 st, 2007 Chateau Laurier Ottawa. Getting it Done: Understanding the Security Features of Windows Vista Kai Axford, CISSP, MCSE-Security.
May 25 – June 15, Technical Overview Bruce Cowper IT Pro Advisor Microsoft Canada Damir Bersinic IT Pro Advisor Microsoft.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 7 Windows 7 Security Features.
Delivering Assured Services John Weigelt National Technology Officer Microsoft Canada.
What is BitLocker and How Does It Work? Steve Lamb IT Pro Evangelist, Microsoft Ltd
Securing Tomorrow’s World Microsoft Security Roadmap Ed Gibson & Steve Lamb Microsoft Ltd.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
ITMT Windows 7 Configuration Chapter 10 – Securing Windows 7
Configuring Windows Firewall with Advanced Security
Threat Management Gateway
Cybersecurity Strategy
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
{ Security Technologies}
Implementing Client Security on Windows 2000 and Windows XP Level 150
Securing Windows 7 Lesson 10.
Microsoft Data Insights Summit
Presentation transcript:

Security Fundamentals in Windows Vista Jayesh Mowjee Technical Consultant

User Account Control Plug and Play Smartcards Granular Auditing Security and Compliance BitLocker™ Drive Encryption EFS Smartcards RMS Client Security Development Lifecycle Threat Modeling and Code Reviews Windows Service Hardening Fundamentals Identity and Access Control Threat and Vulnerability Mitigation Information Protection IE Protected Mode Windows Defender Network Access Protection IPSec & Bi-Directional FW

Fundamentals Improved Security Development Lifecycle (SDL) process for Windows Vista Periodic mandatory security training Assignment of security advisors for all components Threat modeling a part of design phase Required security reviews and testing Security metrics for product teams Common Criteria (CC) Certification EAL 4+

Service Hardening Windows Service Hardening Defense in depth Services run with reduced privilege Windows services are profiled for allowed actions Designed to block attempts by malicious software to exploit a Windows service Active protection File system Registry Network

Threat And Vulnerability Mitigation Protect against malware and intrusions

Social Engineering Protections Phishing Filter and Colored Address Bar Dangerous Settings Notification Secure defaults for IDN Protection from Exploits Code quality improvements (SDLC) ActiveX Opt-in Protected Mode to prevent malicious software Internet Explorer 7

ActiveX Opt-in And Protected Mode Defending systems from malicious attack ActiveX Opt-in puts users in control Reduces attack surface Previously unused controls disabled Retain ActiveX benefits, increase user security Protected Mode reduces severity of threats Eliminates silent malware install IE process ‘sandboxed’ to protect OS Designed for security and compatibility ActiveX Opt-in Enabled Controls Windows Disabled Controls User Action Protected Mode User Action IE Cache My Computer (C:) Broker Process Low Rights

Windows Defender Improved Detection and Removal Redesigned and Simplified User Interface Protection for all users

One solution for spyware and virus protection Built on protection technology used by millions worldwide Effective threat response Complements other Microsoft security products One console for simplified security administration Define one policy to manage protection agent settings Deploy signatures and software faster Integrates with your existing infrastructure One dashboard for visibility into threats and vulnerabilities View insightful reports Stay informed with state assessment scans and security alerts Unified malware protection for business desktops, laptops and server operating systems that is easier to manage and control

ActiveX Opt-in Internet Explorer Protected Mode with Windows Defender

Windows Vista Firewall Combined firewall and IPsec management Firewall rules become more intelligent Outbound filtering Simplified protection policy reduces management overhead

Windows Firewall

Network Access Protection 1 RestrictedNetwork MSFTNetwork Policy Server 3 Policy Servers e.g. MSFT Security Center, SMS, Antigen or 3 rd party Policy compliant DHCP, VPN Switch/Router 2 Windows Vista Client Fix Up Servers e.g. MSFT WSUS, SMS & 3 rd party Corporate Network 5 Not policy compliant 4 Enhanced Security All communications are authenticated, authorized & healthy Defense-in-depth on your terms with DHCP, VPN, IPsec, 802.1X Policy-based access that IT Pros can set and control Increased Business Value Preserves user productivity Extends existing investments in Microsoft and 3rd party infrastructure Broad industry partnership Customer Benefits

Identity And Access Control Enable Secure Access to Information

Challenges Users running as admin = unmanaged desktops Viruses and Spyware Enterprise users can compromise the corporation Users can make changes that require re-imaging Line of Business (LoB) applications System security must be relaxed to run the LoB app IT Administrators must reevaluate the LoB applications for each OS Common OS tasks require elevated privilege Balance usability with security Can’t change time zone as standard user Users can’t manage non-sensitive account info

Businesses can move to a better-managed desktop and parental controls for consumers Make the system work well for standard users Allow standard users to change relevant settings High application compatibility with file/registry virtualization Make it clear when elevation is required Administrators use full privilege only for admin tasks User provides explicit consent before using elevated privilege User Account Control

Improved Auditing More Granularity Support for many auditing subcategories New Logging Infrastructure Filter out the “noise” Search and filtering with new XML format Tasks tied to events Send an on an event

Authentication Improvements Plug and Play Smart Cards Drivers and Certificate Service Provider (CSP) included in Windows Vista Login and credential prompts for User Account Control all support Smart Cards New logon architecture GINA (the old Windows logon model) is gone. Third parties can add biometrics, one-time password tokens, and other authentication methods to Windows with much less coding

Information Protection Protect Corporate Intellectual Property and Customer Data

Group Policy Control of Devices Control whether or not device drivers can install Control what types of devices are allowed (or not) Control what specific devices are allowed (or not) Block CD/DVD Burning

Information Leakage Is Top-of-mind With Business Decision Makers “After virus infections, businesses report unintended forwarding of s and loss of mobile devices more frequently than they do any other security breach” Jupiter Research Report, %10%20%30%40%50%60%70% Loss of digital assets, restored piracy Password compromise Loss of mobile devices Unintended forwarding of s 20% 22% 35% 36% 63% Virus infection

BitLocker ™ Drive Encryption Designed to prevent a thief from breaking OS Provides data protection on your Windows client systems, even when the system is in unauthorized hands Uses a v1.2 TPM or USB flash drive for key storage BitLocker BitLocker

BitLocker offers a spectrum of protection allowing customers to balance ease-of-use against the threats they are most concerned with. Spectrum Of Protection*****

Recovery Options BitLocker™ setup will automatically escrow keys and passwords into AD Centralized storage/management keys Setup may also try (based on policy) to backup keys and passwords onto a USB dongle or to a file location Default for non-domain-joined users Exploring options for web service-based key escrow Recovery password known by the user/administrator Recovery can occur “in the field” Windows operation can continue as normal

Windows Vista Information Protection Who are you protecting against? Other users or administrators on the machine? EFS Unauthorized users with physical access? BitLocker™ ScenariosBitLockerEFSRMS Laptops Branch office server Local single-user file & folder protection Local multi-user file & folder protection Remote file & folder protection Untrusted network admin Remote document policy enforcement Some cases can result in overlap. (e.g. Multi-user roaming laptops with untrusted network admins)

User Account Control Plug and Play Smartcards Granular Auditing Security and Compliance BitLocker™ Drive Encryption EFS Smartcards RMS Client Security Development Lifecycle Threat Modeling and Code Reviews Windows Service Hardening Fundamentals Identity and Access Control Threat and Vulnerability Mitigation Information Protection IE Protected Mode Windows Defender Network Access Protection IPSec & Bi-Directional FW

© 2006 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

Thank you to our Partners for their support of TechDays 2007