May 30 th – 31 st, 2007 Chateau Laurier Ottawa. Getting it Done: Understanding the Security Features of Windows Vista Kai Axford, CISSP, MCSE-Security.

Slides:



Advertisements
Similar presentations
Ljubomir Ivaniš CPU d.o.o.
Advertisements

Microsoft Forefront Client Security
Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
Building on the Foundation of Windows Vista: Introduction to Windows 7: Security and Management Dan Stolts IT Pro Evangelist Microsoft
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
AVG Internet Security 7.5 Product presentation.
Secure Platform Data Protection Secure Access Malware Protection
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
Module 3 Windows Server 2008 Branch Office Scenario.
4/16/ :01 AM © 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
WCL313 Windows Vista Security Overview Mike Chan Sr. Product Manager.
Ronald Beekelaar Beekelaar Consultancy Forefront Overview.
Security and Policy Enforcement Mark Gibson Dave Northey
Mark Gibson Solution Specialist Microsoft. Microsoft Trustworthy Computing Addressing Security Threats with Microsoft Next Steps.
Optimizing Client Security by Using Windows Vista.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Ved Christian Stahl, Microsoft Enterprise Services Forefront Codenname ”Stirling”
SYSTEM CENTER: ENDPOINT PROTECTION FUNDAMENTALS Howard A. Carter III Senior Consultant Microsoft Consulting Services September 21, 2013 TechGate 2013 –
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Clinic Security and Policy Enforcement in Windows Server 2008.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Networks worms Denial of Service Phishing / Social Engineering BotnetsRootkits Technically-oriented social engineering attacks Cross-device attacks.
Small Business Edition 4 C707 – Technical overview.
A Holistic Approach to Malware Defense Bruce Cowper Senior Program Manager; Security Initiative Microsoft Canada.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features.
Using Windows Firewall and Windows Defender
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
Hands-On Microsoft Windows Server 2008
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Week #7 Objectives: Secure Windows 7 Desktop
POSITIONING STATEMENT For people who operate shared computers with Genuine Windows XP, the Shared Computer Toolkit is an affordable, integrated, and easy-to-use.
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
MANAGEMENT ANTIMALWARE PLATFORM Microsoft Malware Protection Center Dynamic Signature Svc Available only in Windows 8 Endpoint Protection Management.
MCTS Guide to Microsoft Windows Vista Chapter 7 Windows Vista Security Features.
Module 14: Configuring Server Security Compliance
Module 7 Planning Server and Network Security. Module Overview Overview of Defense-in-Depth Planning for Windows Firewall with Advanced Security Planning.
Windows Vista Inside Out Ch 10: Ch 10: Security Essentials Last modified
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Anti-Malware Protection: A Technical Dive into Forefront Client Security Ketil Pedersen Technology Specialist Manager Microsoft.
Future of the Server Room Tour. Future of Your Server Room Three Pillars of Windows Server 2008 Virtualization Today and Tomorrow Take Control of Your.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 7 Windows 7 Security Features.
Security Fundamentals in Windows Vista Jayesh Mowjee Technical Consultant
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
Yaniv Feldman Microsoft Security Regional Director Infrastructure & Security Lead Israel.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Understand Server Protection LESSON Security Fundamentals.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 7 Windows 7 Security Features.
Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.
Securing Tomorrow’s World Microsoft Security Roadmap Ed Gibson & Steve Lamb Microsoft Ltd.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Managing Network Access Protection. Introduction to NAP Issues  Although corporate networks are highly secured, no control over the configuration of.
Windows Vista Configuration MCTS : Network Security.
Configuring Windows Firewall with Advanced Security
Securing Windows 7 Lesson 10.
IT Management, Simplified
Presentation transcript:

May 30 th – 31 st, 2007 Chateau Laurier Ottawa

Getting it Done: Understanding the Security Features of Windows Vista Kai Axford, CISSP, MCSE-Security Sr. Security Strategist Microsoft Corporation

Guidance Developer Tools Systems Management Active Directory Federation Services (ADFS) Identity Management Service s Information Protection Encrypting File System (EFS) BitLocker™ Network Access Protection (NAP) Client and Server OS Server Applications Edge

Service Hardening Windows services are profiled for allowed actions to the network, file system, and registry Services run with reduced privilege compared to Windows XP Designed to block attempts by malware to make a Windows service write to an area of the network, file system, or registry that isn’t part of that service’s profile Address Space Location Randomization (ASLR) Activeprotection File system Registry Network Windows Service Hardening

Authentication User Account Control Network Access Protection New Logon Architecture replacing GINA Strong authentication including support for: Smart Cards, Biometrics, and One-time passwords Easier to run as standard user Helps protect against infection Prevents unauthorized installation of software Ensure that only “healthy” machines can access corporate data Enable “unhealthy” machines to get clean before they gain access Enable Secure Access

Shows status of security software and settings Monitor multiple vendors’ security solutions running on a PC Security health platform used by third parties Bi-directional; on by default Key component to enforce service hardening IPSec integration Can be disabled by 3 rd party firewall applications Detection and removal of spyware and other potentially unwanted software Protection of OS extensibility points Protect against damage caused by malware install IE process ‘sandboxed’ to protect OS Designed for security and compatibility IE Protected Mode Windows Defender Windows Firewall Windows Security Center Malware Protection

Windows Vista Firewall Combined firewall and IPSec management New management tools – Windows Firewall with Advanced Security MMC snap-in Reduces conflicts and coordination overhead between technologies Firewall rules become more intelligent Specify security requirements such as authentication and encryption Specify Active Directory computer or user groups Outbound filtering Enterprise management feature – not for consumers Simplified protection policy reduces management overhead

Protecting Data from Unauthorized Viewing Policy definition and enforcement Integrated RMS Client Policy-based protection of document libraries in MOSS2007 User-based file and folder encryption Ability to store EFS keys on a smart card Ability to store EFS keys on a smart card Hardware-enabled data protection Provides full volume encryption Laptop and server scenarios In Windows Vista

How BitLocker Appears in Windows XP

1 2 How BitLocker Appears in Linux 3

Demo Title The 50¢ Vista Security Tour

Guidance Developer Tools Systems Management Active Directory Federation Services (ADFS) Identity Management Service s Information Protection Encrypting File System (EFS) BitLocker™ Network Access Protection (NAP) Client and Server OS Server Applications Edge

One solution for spyware and virus protection Built on protection technology used by millions worldwide Effective threat response One console for simplified security administration Define one policy to manage client protection agent settings Integrates with your existing infrastructure One dashboard for visibility into threats and vulnerabilities View insightful reports Stay informed with state assessment scans and security alerts Unified malware protection for business desktops, laptops and server operating systems that is easy to manage and control

14 Remove most prevalent viruses Remove all known viruses Real-time antivirus Remove all known spyware Real-time antispyware Central reporting and alerting Customization Microsoft Forefront Client Security MSRT Windows Defender Windows Live OneCare Safety Scanner Windows Live OneCare FOR INDIVIDUAL USERS FOR BUSINESSES

November The 50 ¢ Vista Security Tour

Demo Title Microsoft Forefront Client Security

One console for simplified security administration One policy to manage client protection agent settings, e.g.: Choice of 3 integrated policy profile deployment methods: Microsoft Forefront Client Security Console (uses AD/GP) ADM file (uses AD/GP) Export to a file then use existing software distribution system Anti-spyware unknown action Alert level Event and logging settings SpyNet reporting on/off Level of end-user UI shown Scan schedule Real time protection on/off Signature update frequency Anti-spyware signature overrides Security state assessment settings

Signature deployment optimized for Windows Server Update Services (WSUS) Can use any software distribution system Auto and manual approval of definitions Client Security installs an Update Assistant service to: Increase sync frequency between WSUS and Microsoft Update (MU) for definitions Support for roaming users Failover from WSUS to Microsoft Update Malware Research Microsoft Update WSUS + Update Assistant Sync Sync ® Desktops, Laptops and Servers Failover

User Account Control IE7 with Protected Mode Randomize Address Space Layout Windows Advanced Firewall Kernel Patch Protection (64bit) Unified Virus & Spyware Protection Central Management Reporting, Alerting and State Assessment Infrastructure Software Integration Policy Based Network Segmentation Restrict-To-Trusted Net Communications Server and Domain Isolation (SD&I) Combined Solution Windows Vista™ Forefront™ Client Security

Questions?Questions? Kai Axford, CISSP, MCSE-Security Sr. Security Strategist Microsoft Corporation