Download presentation
Presentation is loading. Please wait.
Published byDaisy Holmes Modified over 8 years ago
2
Security Configuration Wizard - how to make your systems only do the things you need them to! Steve Lamb IT Pro Evangelist for Security Technologies Stephen.lamb@microsoft.com http://blogs.technet.com/steve_lamb
3
Our network is secure, right? Oh sure, Don’t worry. We have several firewalls
4
Your network is not secure! At best, it is protected Protected networks are well-designed, well-managed networks, with savvy users The Truth
5
If I just open a bunch of ports in the firewall my app will work. Say, we run a network too. How do you configure your firewalls? Bad Practices Spread Why You Need Policies I think I will wedge the computer room door open. Much easier. They have blocked my favorite Web site. Lucky I have a modem. I think I will use my first name as a password. Why do we need the door locked? Hey, nice modem. What's the number of that line? I can never think of a good password. What do you use?
6
People, Policies, and Process Defense In Depth Physical Security Perimeter Internal Network Host Application Data
7
The Security Management Problem Security management is about spending good money to have nothing happen
8
The Security Administrators Pledge I pledge commitment To the patches Issued for the systems I run And to the challenges That security presents One network Now protected With services and data for all
9
Use Some Hardening Guide
10
Rolling Back The Guide
11
Roles Your System Can Fill Now
12
Agenda Introduction to SCW Tool summary Server roles Operational coverage/scope SCW extensibility
13
We Can’t Provide Physical Security
14
Print Server Base Role SCW Targeting Configuration Guidance
15
Demo Why Talk About It When You Can Show It?
16
For More Information http://www.microsoft.com/SCW
17
© 2005 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. Steve Lamb IT Pro Evangelist for Security Technologies Stephen.lamb@microsoft.com http://blogs.technet.com/steve_lamb Thanks to Jesper Johansson for the slides
18
For Even More Information Jesper and Steve finally wrote a book! Order online: http://www.awprofessional.com/title/03213 36437 Use promo code JJSR6437
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.