Lesson 18: Configuring Security for Mobile Devices MOAC 70-687: Configuring Windows 8.1.

Slides:



Advertisements
Similar presentations
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
Advertisements

Lesson 17: Configuring Security Policies
Lesson 16: Configuring Domain Controllers
MOAC : Installing and Configuring Windows Server 2012
ACCOUNTING INFORMATION SYSTEMS
Lesson 4: Configuring File and Share Access
Lesson 14: Creating and Managing Active Directory Users and Computers
Lesson 1: Configuring Network Load Balancing
Lesson 5: Configuring Print and Document Services
Lesson 19: Configuring Windows Firewall
Lesson 16: Creating Group Policy Objects
Lesson 2: Configuring Servers
Lesson 18: Configuring Application Restriction Policies
Chapter 3: Data Modeling
Lesson 9: Creating and Configuring Virtual Networks
Lesson 9: Fine-Tuning Your Workflow Introduction to Adobe Dreamweaver CS6 Adobe Certified Associate: Web Communication using Adobe Dreamweaver CS6.
Lesson 10: Adding Flash, Video, and Sound Content Introduction to Adobe Dreamweaver CS6 Adobe Certified Associate: Web Communication using Adobe Dreamweaver.
Lesson 11: Maximizing Site Design Introduction to Adobe Dreamweaver CS6 Adobe Certified Associate: Web Communication using Adobe Dreamweaver CS6.
Lesson 13: Building Web Forms Introduction to Adobe Dreamweaver CS6 Adobe Certified Associate: Web Communication using Adobe Dreamweaver CS6.
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Week #7 Objectives: Secure Windows 7 Desktop
Chapter 2 Information Technology and AISs
John Wiley & Sons, Inc. © 2005 Chapter 2 The Recording Process Prepared by Naomi Karolinski Monroe Community College and and Marianne Bradford Bryant.
3 - 1 Chapter 3: Basic Excel Skills Management Science: The Art of Modeling With Spreadsheets, 2e PowerPoint Slides Prepared By: Alan Olinsky Bryant University.
Lesson 12: Working with Code-editing Features Introduction to Adobe Dreamweaver CS6 Adobe Certified Associate: Web Communication using Adobe Dreamweaver.
PowerPoint Presentation for Dennis & Haley Wixom, Systems Analysis and Design Copyright 2000 © John Wiley & Sons, Inc. All rights reserved. Slide 1 Systems.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
Chapter 111 Information Technology For Management 6 th Edition Turban, Leidner, McLean, Wetherbe Lecture Slides by L. Beaubien, Providence College John.
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Slide 1-1 Chapter 1 Information Systems Overview Introduction to Information Systems Judith C. Simon.
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Lesson 3: Migrating and Configuring User Data
Lesson 11: Configuring and Maintaining Network Security
Lesson 23: Configure File Recovery
Lesson 13: Configuring Shared Resources
Lesson 12: Configuring Remote Management
2-1 COBOL for the 21 st Century Nancy Stern Hofstra University Robert A. Stern Nassau Community College James P. Ley University of Wisconsin-Stout (Emeritus)
Lesson 2: Installing Windows 8.1
5 Lesson 5: Installing and Configuring Desktop Applications and Windows Store Apps MOAC : Configuring Windows 8.1.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Lesson 20: Managing Local Storage MOAC : Configuring Windows 8.1.
Managing Applications, Services, Folders, and Libraries Lesson 4.
Slide 1 Systems Analysis and Design with UML Version 2.0 An Object-Oriented Approach, Second Edition Chapter 3: Project Initiation Alan Dennis, Barbara.
Understand Encryption LESSON 2.5_A Security Fundamentals.
Introduction to Drafting and Design
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Copyright 2006 John Wiley & Sons, Inc. Beni Asllani University of Tennessee at Chattanooga Operations Management - 5 th Edition Chapter 10 Supplement Roberta.
Lesson 6: Controlling Access to Local Hardware and Applications
A- 1. A- 2 Appendix B Standards of Ethical Conduct for Management Accountants The Institute of Management Accountants has published and promoted the following.
K-1. K-2 Appendix K Standards of Ethical Conduct for Management Accountants The Institute of Management Accountants has published and promoted the following.
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Slide 11-1 Chapter 11 Terms Information Resource Management Strategies Introduction to Information Systems Judith C. Simon.
I-1. I-2 I ACCOUNTING FOR SOLE PROPRIETORSHIPS Accounting, Fifth Edition.
H-1 Prepared by Coby Harmon University of California, Santa Barbara Westmont College.
Slide 6-1 Chapter 6 Terms System Software Considerations Introduction to Information Systems Judith C. Simon.
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
Lesson 14: Configuring File and Folder Access MOAC : Configuring Windows 8.1.
Lesson 19: Configuring and Managing Updates
Lesson 22: Configuring System Recovery
Lesson 6: Configuring Servers for Remote Management
Lesson 4: Configuring File and Share Access
liquidation of a partnership.
Transportation and Transshipment Models
Systems Analysis and Design with UML Version 2
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved
MACROECONOMICS AND THE GLOBAL BUSINESS ENVIRONMENT
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved
Presentation transcript:

Lesson 18: Configuring Security for Mobile Devices MOAC : Configuring Windows 8.1

Overview Exam Objective 5.3: Configure security for mobile devices Configure BitLocker and BitLocker To Go Configure startup key storage © 2013 John Wiley & Sons, Inc. 2

Securing Your Mobile Devices Lesson 18: Configuring Security for Mobile Devices © 2013 John Wiley & Sons, Inc.3

Configuring BitLocker Although Windows 7 required you to configure BitLocker after the operating system was installed, Windows 8/8.1 supports the ability to enable BitLocker before you deploy the operating system. It also introduces two new options for encrypting your disk: o Encrypt used disk space only o Encrypt the entire drive © 2013 John Wiley & Sons, Inc. 4

Configuring BitLocker In Windows 8.1, you must be a member of the administrators group to configure BitLocker. Non-administrative users can change the BitLocker Personal Identification Number (PIN) or password for the operating system and fixed data volumes by default. The PIN is any 4–20 digit number you choose that is stored on your computer and must be entered each time you start the system. © 2013 John Wiley & Sons, Inc. 5

Understanding BitLocker Requirements To use BitLocker, you need to understand: o How startup and recovery keys are used o What to do if you lose them © 2013 John Wiley & Sons, Inc. 6

BitLocker Startup Key The first time you enable BitLocker on a drive, you create a startup key. The startup key is used to encrypt/decrypt the drive. It can be stored on a USB drive or on a TPM chip. An alternative to the startup key is to use a PIN. © 2013 John Wiley & Sons, Inc. 7

BitLocker Recovery Key If you lose the startup key: o Move the drive to another system. o If the system is compromised, use a recovery key to gain access to the drive. The recovery key is a 48-digit number that can be stored on a USB drive, a folder on another drive, or be printed out. © 2013 John Wiley & Sons, Inc. 8

Enabling BitLocker on Operating System Drives To support BitLocker Drive Encryption on the drive that contains your operating system, you need the following: o Two partitions o New Technology File System (NTFS) o TPM Compatible BIOS © 2013 John Wiley & Sons, Inc. 9

Enabling BitLocker on Operating System Drives Configuring BitLocker to run a startup key and a startup PIN © 2013 John Wiley & Sons, Inc.10

Turn on BitLocker and Encrypt the Operating System Drive Reviewing the BitLocker Drive Encryption control panel © 2013 John Wiley & Sons, Inc.11

Turn on BitLocker and Encrypt the Operating System Drive Reviewing the status of the encryption process © 2013 John Wiley & Sons, Inc.12

Turn on BitLocker and Encrypt the Operating System Drive Confirming the drive has been encrypted and reviewing additional options © 2013 John Wiley & Sons, Inc.13

Configuring BitLocker to Go BitLocker to Go is BitLocker Drive Encryption on removable data drives. Once encrypted, you need to use a password or a smart card with PIN to unlock the drive. To use BitLocker to Go, insert the removable drive and open the BitLocker Drive Encryption control panel application. © 2013 John Wiley & Sons, Inc. 14

Configuring BitLocker to Go Reviewing removable data drives © 2013 John Wiley & Sons, Inc.15

Controlling BitLocker to Go Behavior To control BitLocker to Go behavior for Windows 8.1 computers in a domain: o Use the Group Policy Management console to create a policy. o Link it to the appropriate organizational unit (OU) in the Active Directory domain. o Edit the Removable Data Drives section of the policy. © 2013 John Wiley & Sons, Inc. 16

Controlling BitLocker to Go Behavior Policy settings: o Control use of BitLocker on removable drives o Configure use of smart cards on removable data drives o Deny write access to removable drives not protected by BitLocker o Configure use of hardware-based encryption for removable data drives o Allow Access To BitLocker-Protected Removable Data Drives From Earlier Versions of Windows o Configure Use Of Passwords For Removable Data Drives o Choose How BitLocker-Protected Removable Drives Can Be Recovered © 2013 John Wiley & Sons, Inc. 17

Lesson Summary BitLocker Drive Encryption and BitLocker to Go are features available in Windows 8.1 to protect your drive and volumes using encryption. BitLocker Drive Encryption can be used to encrypt used disk space only or the entire drive. BitLocker Drive Encryption can be used with fixed data drives, operating system drives, and removable drives. There are five authentication methods that can be used to provide additional protection for your encrypted drive: TPM+startup PIN+startup key, TPM+startup key, TPM+startup PIN, startup key only, and TPM only. © 2013 John Wiley & Sons, Inc. 18

Lesson Summary To support BitLocker Drive Encryption on the drive that contains the operating system, you need two partitions, formatted with NTFS, a TPM compatible BIOS or BIOS firmware that supports booting from a USB flash drive. The Local Group Policy editor can be used to manage BitLocker policies on a local machine whereas the Group Policy Management console is used to create policies that are enforced across the entire organization. BitLocker to Go is BitLocker Drive Encryption for removable data drives. To unlock removable data drives, you need to use either a password or a smart card with a PIN. © 2013 John Wiley & Sons, Inc. 19

Copyright 2013 John Wiley & Sons, Inc.. All rights reserved. Reproduction or translation of this work beyond that named in Section 117 of the 1976 United States Copyright Act without the express written consent of the copyright owner is unlawful. Requests for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc.. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.