Bill Jensen Bashar Kachachi Session Code: SIA309.

Slides:



Advertisements
Similar presentations
Microsoft Forefront Client Security
Advertisements

Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
System Center 2012 Configuration Manager Concepts & Administration
Adwait JoshiJim Harrison Sr. Product ManagerProgram Manager Microsoft Corporation SESSION CODE: SIA308.
What's new in Threat Management Gateway (TMG) 2010 Ronald Beekelaar
David B. Cross Product Unit Manager Microsoft Corporation Session Code: SIA403 Donny Rose Senior Program Manager.
Faith Allington Program Manager Microsoft Corporation Session Code: WSV304.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Christophe Fiessinger & Jan Kalis Senior Technical Product Manager Microsoft Corporation Session Code: OFS214.
Tech·Ed North America /19/2017 7:21 AM
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Jayesh Mowjee Security Consultant Microsoft Session Code: SIA203.
Cliff Evans Security and Privacy Lead Trustworthy Computing Group Microsoft UK.
Srinivas L Technology Specialist – Security | Microsoft
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
MANAGEMENT ANTIMALWARE PLATFORM Microsoft Malware Protection Center Dynamic Signature Svc Available only in Windows 8 Endpoint Protection Management.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
John “JG” Chirapurath Director, Identity & Security BG Microsoft SIA-205 Business Ready Security.
Virtual techdays INDIA │ august 2010 Threat Management Gateway 2010 – A Deep Dive Anirudh Singh Rautela │ TSP – Security, Microsoft Corporation.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Feature: Customer Combiner and Modifier © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are.
Jim Harrison Program Manager, Forefront TMG Microsoft Corporation SESSION CODE: SIA325.
Alan Schmarr Consultant BUI Session Code: 303 Agenda Forefront Overview TMG Value Proposition The deep dip Deployment and Management Web client protection.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
Paul Cooke - CISSP Director Microsoft Session Code: CLI322.
demo Demo.
Adwait Joshi Randy Treit Sr. Product ManagerSr. Program Manager SESSION CODE: SIA 320.
Windows Azure SQL Data Sync Name Title Microsoft Corporation.
Service Pack 2 System Center Configuration Manager 2007.
Connect with life Ravi Sankar Technology Evangelist | Microsoft Corporation Ravisankar.spaces.live.com/blog.
Tim Rains Group Product Manager Microsoft Session Code: SIA101.
Delivering Assured Services John Weigelt National Technology Officer Microsoft Canada.
Patrick Ortiz Global SQL Solution Architect Dell Inc. BIN209.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
David B. Cross Product Unit Manager Microsoft Corporation Session Code: SIA303 Donny Rose Senior Program Manager.
Microsoft Virtual Academy. Microsoft Virtual Academy First HalfSecond Half (01) Introduction to Microsoft Virtualization(05) Hyper-V Management (02) Hyper-V.
Deployment Planning Services
Hybrid Management and Security
Hybrid Management and Security
Microsoft Operations Management Suite Insight and Analytics
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
Threat Management Gateway
The utility belt for managing security and compliance in Office 365
Tech·Ed North America /15/2018 3:31 AM
Prevent Costly Data Leaks from Microsoft Office 365
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
11/21/2018 4:57 AM SIA303 Advanced Persistent Threats (APT): Understanding the New Era of Attacks! Marcus Murray Security Team Manager, Microsoft MVP –
Ed oms team OMS: Log Analytics Ed oms team.
Jason Zander Unplugged
Twenty Windows Tools You Never Knew Existed
Tech Ed North America /4/2018 8:15 AM Required Slide
TechEd /7/ :16 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Secure once, run anywhere Simplify your security with Sophos
Building an Integrated Security System Microsoft Forefront code name “Stirling” Ravi Sankar Technology Evangelist | Microsoft
What’s new in the Fall Creators Update for Windows Defender ATP
TechEd /11/ :54 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Microsoft Virtual Academy
2/22/2019 7:48 AM © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Tech·Ed North America /28/ :49 PM
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Service Template Creation from the Ground Up
5/24/ :22 AM © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
Microsoft Virtual Academy
Microsoft Data Insights Summit
TechEd /18/ :51 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Presentation transcript:

Bill Jensen Bashar Kachachi Session Code: SIA309

Secure Messaging Secure Endpoint Secure Collaboration Business Ready Security Solutions Information Protection Identity and Access Management

Advanced Protection Against Web-based Exploits PHISHING / MALWARE SITES VIRUSES / SPYWARE SAFE TRAFFIC Advanced URL filtering for safe web browsing Reputation services for enhanced accuracy Integrated Anti-Malware protection at the edge Inspects encrypted and unencrypted web traffic Prevents exploits against browser- based vulnerabilities “ “

Threat Management Gateway- Secure Web Gateway Features Download scanning of files Integrated Microsoft AV/AM engine Inspection settings per rule Malware inspection URL filtering HTTPS inspection New log fields with URL/Malware info SQL Server Reporting Services Customizable reports Logging & Reporting URL category sets and exclusions Integrated with forward proxy URL filtering, malware scanning and IPS protection Firewall Client notification to end users

A More Intelligent Security Solution for URL Filtering Protects against “long tail” of Web threats Continuously updated Combines local cache and cloud-based queries Aggregates information from: Multiple URL filtering partners Reputation-based protection against phishing and malware sites

Protection with Multiple Layers Content Files and Streaming Traffic VirusesWormsProtocol Exploits HTTP and HTTPS Inspection Coverage for Streaming and Content-based traffic Zero-day and Variant Protection Generic and Specific Signatures Protocol Analysis Heuristic Granular control of Web traffic Extensible as new threats appear Scripts Threat Vector Inspection Technology Encrypted Web Microsoft Antimalware Network Inspection System Application Layer Proxy

Network Inspection System for Intrusion Prevention 7 Detect and prevent known vulnerability-based attack attempts at the Edge of the network or in datacenter Same day availability of the patch and NIS signature Closes the vulnerability window which is needed for patch testing\deployment: Patches need to be tested more thoroughly Customer acceptance (similar to AV updates) Vulnerability found Signature authoring team TMG

Simplified Management Enables single, unified policy for: All integrated security functions All distributed locations Reduces management burden with: Consistent management interface for administrators Easy-to-use wizards for complex tasks Simple wizards to configure complex tasks Unified management for consistent policy and less administrative overheard

URL Filtering & Malware Protection -Deny Access to Malicious Site -Detect and prevent malware downloads at the edge Microsoft Confidential

Comprehensive Malware Protection For Endpoints Management Console Malicious Threats Integrated anti-virus/anti-spyware agent for real-time protection Advanced detection technologies for complex malware Unique vulnerability assessments Rapid response through global threat research team “ “

Strong malware detection Multiple technologies for malware protection Stable in client environment Fast malware scanning conducted in real-time Visibility into both threats and vulnerabilities Advanced Protection Technologies in FCS Integrated anti-virus/anti-spyware agent delivering real-time protection Uses Windows Filter Manager Maintains stable operation Scans viruses and spyware in real-time Dynamic Translation Unique to Microsoft agent Maximizes scanning speed: Decryption and code emulation of malware with speed of native code execution State assessment scans Unique to Microsoft agent Scan for vulnerabilities and improperly configured machines Other features: Tunneling signatures for detecting & removing rooktits Advanced system cleaning: Customized remediation (recreating registry entries, restoring settings) Event Flood Protection: Shields reporting infrastructure during outbreak from infected clients Heuristics for classifying programs based on behavior

The FCS agent efficiently uses system resources, scans quickly, and detects malware effectively 60%+ less CPU usage 14x faster at boot time 2x faster in quick scans 5x faster in full scans Sources: West Coast Labs, AVTest.org Performance benchmarking study with West Coast Labs. 7% less CPU 2x faster Efficient Anti-Malware Solution

Leverage Existing Infrastructure Integration with Existing Infrastructure Automated Deployment Compliance-based Access Update Services Integrated Solution “ “

Integration With Infrastructure Architecture

Simplify Security Management Easy-to-use wizards for security and policy configuration Enterprise-wide client state visibility Insightful reports to ensure compliance “ “

Real-time reporting Enabled by embedded Operations Manager technology Access to real-time data and trends “At-a-glance” view of threats & vulnerabilities across organization Machines reporting security issues (malware not cleaned, critical vulnerabilities present) Machines not reporting issues Machines not reporting 30-day trend history Drill down into detail as required Notification of machines reporting alerts FCS Reporting Capabilities

“Is my environment compliant with security best practices?” “Has my level of vulnerability exposure changed over time?” “What portion of my environment is at high risk?” Security State Assessment Reporting

Forefront Client Security Demo -Detect and prevent malware downloads Microsoft Confidential

PROTECT everywhere, ACCESS anywhere SIMPLIFY security, MANAGE compliance INTEGRATE and EXTEND security Summary Advanced malware protection Protect sensitive information Secure, always-on access Simplified management Enterprise-wide visibility Integrated with OS security Leverages existing infrastructure Protect client and server operating systems from emerging threats and information loss, while enabling more secure access from virtually anywhere

Sessions On-Demand & Community Resources for IT Professionals Resources for Developers Microsoft Certification & Training Resources Resources

Related Content SIA 303 SIA 303 Managing Threats in a Dynamic and Evolving Security Environment through Microsoft Forefront Threat Management Gateway SIA 403 SIA 403 A Deep Dive on the New Microsoft Forefront Threat Management Gateway SIA01-DEMO Securing Enterprise-Wide Endpoints from Emerging Threats: How to Secure Endpoints from Malware and Web-Based Attacks SIA28-HOL Microsoft Forefront Threat Management Gateway Overview SIA20-HOL Forefront Client Security: Protect Endpoints with Forefront Client Security

Complete an evaluation on CommNet and enter to win an Xbox 360 Elite!

© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. Required Slide