Windows XP Service Pack 2 Customer Awareness Workshop XP SP2 Technical Drilldown – Part 1 Craig Schofield Microsoft Ltd. UK September.

Slides:



Advertisements
Similar presentations
Desktop Value - Introducing Windows XP Service Pack 2 with Advanced Security Technologies Presenter: James K. Murray Title: Information Technologies Consultant.
Advertisements

Microsoft Windows XP SP2 Urs P. Küderli Strategic Security Advisor Microsoft Schweiz GmbH.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Windows Server 2003 SP1. Windows Server™ 2003 Service Pack 1 Technical Overview Jill Steinberg: Added TM Jill Steinberg: Added TM.
Windows XP Service Pack 2 Deployment Dave Lee West Campus.
Chapter 13 Securing Windows Server 2008
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Chapter 7 HARDENING SERVERS.
Windows XP Service Pack 2 Alex Balcanquall Senior Consultant Microsoft Services Organisation.
Changes in Windows XP Service Pack 2
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Information for Developers Windows XP Service Pack 2 Information for Developers.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Lesson 19: Configuring Windows Firewall
Windows XP Service Pack 2 and the Microsoft Virtual Machine: Developer Implications Rudi Larno Developer & Platform Group Microsoft BeLux.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Microsoft Windows XP SP2 for Developers Rafal Lukawiecki Strategic Consultant Project Botticelli Ltd This session is based.
2851A_C01. Microsoft Windows XP Service Pack 2 Security Technologies Bruce Cowper IT Pro Advisor Microsoft Canada.
Microsoft October 2004 Security Bulletins Briefing for Senior IT Managers updated October 20, 2004 Marcus H. Sachs, P.E. The SANS Institute October 12,
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Hands-On Microsoft Windows Server 2008 Chapter 10 Securing Windows Server 2008.
Windows Server 2008 Chapter 10 Last Update
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Chapter 4: Security Baselines Security+ Guide to Network Security Fundamentals Second Edition.
Information for Developers Windows XP Service Pack 2 Information for Developers Tony Goodhew Product manager Developer Division Microsoft Corp
Damian Leibaschoff Support Escalation Engineer Microsoft Becky Ochs Program Manager Microsoft.
Module 8: Managing Client Configuration and Connectivity.
Using Windows Firewall and Windows Defender
Module 4: Add Client Computers and Devices to the Network.
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
FEATURES & FUNCTIONALITY. Page 2 Agenda Main topics Packet Filter Firewall Application Control Other features.
Implementing Network Access Protection
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Troubleshooting Windows Vista Security Chapter 4.
Module 14: Configuring Server Security Compliance
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
DIT314 ~ Client Operating System & Administration CHAPTER 2 INTRODUCTION TO WINDOWS XP PROFESSIONAL Prepared By : Suraya Alias.
Windows 7 Firewall.
Module 8: Configuring Network Access Protection
Chapter 8: Configuring Networking. Exploring the Network and Sharing Center 2.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
Windows XP Professional Features ©Richard L. Goldman February 5, 2003.
C HAPTER 2 Introduction to Windows XP Professional.
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Windows XP Service Pack 2 Customer Awareness Workshop Trustworthy Computing – XP SP2 Technical Overview Craig Schofield Microsoft.
Module 5: Designing Security for Internal Networks.
Lesson 11: Configuring and Maintaining Network Security
Security fundamentals Topic 10 Securing the network perimeter.
Module 10: Windows Firewall and Caching Fundamentals.
Linux Operations and Administration
Lesson 6: Controlling Access to Local Hardware and Applications
Module 8 Implementing Security Using Group Policy.
Windows Server 2003 SP1 Technical Overview John Howard, IT Pro Evangelist, Microsoft UK
Windows Vista Configuration MCTS : Network Security.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
Security fundamentals
Lesson 6: Configuring Servers for Remote Management
{ Security Technologies}
Implementing Client Security on Windows 2000 and Windows XP Level 150
Windows Firewall Adem Enes POLAT
Designing IIS Security (IIS – Internet Information Service)
Windows XP SP2 & Windows Server 2003 SP1
Implementing Advanced Server and Client Security
Presentation transcript:

Windows XP Service Pack 2 Customer Awareness Workshop XP SP2 Technical Drilldown – Part 1 Craig Schofield Microsoft Ltd. UK September 2004

Service Pack 2 Drill Down Memory Attachments Web Network

Networking

Windows Firewall  Windows Firewall (formerly ICF) is on by default  Enabled on all interfaces (LAN, Dial-Up, VPN)  Supports both IPv4 and IPv6  Windows Firewall is “stateful”  Automatically match inbound traffic with outgoing requests  Restricts only unsolicited in-bound traffic  Three operational modes  On (default) – no unsolicited inbound traffic allowed Can be configured to allow specific unsolicited inbound traffic  Don’t Allow Exceptions – no unsolicited inbound traffic allowed Ignores other settings and blocks all unsolicited inbound traffic  Off – no protection  Boot-time security  Runs in highly secure mode until run-time policy can be applied Protection from network-based attacks

Windows Firewall  Default configuration is by machine  Can still configure interfaces separately if necessary  Exception list for applications & services requiring open ports  Enables listening on whichever ports are required  Per-port or per- application subnet and IP address restrictions  Can allow inbound traffic from specific subnets, IP addresses  Two operating profiles: Domain & Standard  Domain profile used when attached to network with same DNS suffix as domain  Standard profile used when not attached to network with the same DNS suffix as domain Configuration Options

Windows Firewall  Most applications will work with no adjustments  Stateful firewall matches incoming traffic with outgoing requests  Only applications or services that need to listen for unsolicited incoming traffic affected  e.g. File and print sharing, Web server, Voice or video conversations, remote management tools  Pre-built options will open correct port or program exceptions without requiring manual entries  File & Print service, UPnP framework, Remote Administration, ICMP options, Remote Desktop  IPSec authenticated bypass  Traffic is allowed through firewall for specified systems that successfully authenticate with IPSec Application and Standards Compatibility

Windows Firewall  User notifications help automatically configure firewall  Only for applications running in user context  Through Security Center  All configuration options available through new Group Policy Objects  Group Policy settings override local settings  Updated NETSH command line interface can control all settings  APIs (NetFwPublicTypeLib) can be used for scripting or registering applications with the firewall  Security Event Log entry when listening application detected  Customize settings at deployment with SP2 configuration files  netfw.inf and unattend.txt  Can also use Group Policy Objects  Registry settings  HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\ WindowsFirewall\DomainProfile \EnableFirewall Manageability Improvements

RPC & DCOM Changes  RPCSS architecture enhanced  Network facing functionality runs with reduced privilege – network service account privilege only  Functionality that requires local system privilege has limited exposure  Block unauthenticated calls to DCOM and RPC services  Includes blocking unauthenticated calls to the RPC Endpoint Mapper  Only administrators are granted remote activation and launch permissions  Easier to restrict RPC interfaces to local machine only  Fine-grained DCOM security  Machine-wide lockdown ACL for DCOM launch activation access  DCOM infrastructure access restricted to TCP and RPC over HTTP  RPC over HTTP not installed by default  New permissions configured through group policy, UI and logon scripting  New central location to set authentication policy.

DCOM Default Security PermissionAdministratorEveryoneAnonymous LaunchLocal (Launch) Local Activate Remote (Launch) Remote Activate Local (Launch) Local Activate AccessLocal (Call) Remote (Call) Local (Call)

Bluetooth  “Bluetooth Devices” is a new Control Panel item.  Client includes support for the latest version of Bluetooth (v1.2) allowing customers to take advantage of the latest wireless devices  Bluetooth support is enabled if approved device, and no existing driver.  Windows Hardware Quality Labs (WHQL)  Includes selective suspend (power)  Boot-mode keyboards supported  Bluetooth File Transfer Wizard

Alerter and Messenger  Services disabled by default.  Any applications or services that use the Alerter or Messenger services to communicate with the user will not be successfull.

Attachments  Security model relies on users to make good trust decisions  However, users are ill-equipped to make informed decisions  Lack needed information  Lack technical understanding  And users easily tricked into making poor choices  Example: “myphoto.jpg.exe”  Employing a static list of dangerous file types isn’t enough  Hackers find exploits using files not on the list of dangerous file types Example: MyDoom packages malicious payload in a ZIP  Users can’t share file types on the dangerous list - diminishes functionality

Attachment Manager  New public API for handling safe attachments  IAttachmentExecute  Used by Outlook Express, Windows Messenger and Internet Explorer, and third-parties soon  Unsafe attachments not trusted by default  Block/Prompt/Allow determined by combination of file type & zone  Dangerous file type + Restricted Zone = Block  Dangerous file type + Internet Zone = Prompt  AM marks the zone when it saves a file  Enables AES to block/prompt files in a ZIP  Safer message “preview” in OE Consistent experience for “trust” decisions

Windows Messenger  Block unsafe file transfers  Leverages Attachment Manager  Require user display name  Firewall Impacts

Summary  Networking  Windows Firewall – On by default, highly configurable  RPC & DCOM - Security enhancements   Attachment Manager – Protect user from malicious attachments through consistent interface

© 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.