Download presentation
Presentation is loading. Please wait.
Published byGavin Henderson Modified over 9 years ago
1
Building on the Foundation of Windows Vista: Introduction to Windows 7: Security and Management Dan Stolts IT Pro Evangelist Microsoft http://blogs.technet.com/DanStolts
2
Fundamentally Secure Platform Protect Users & Infrastructure Windows Vista Foundation User Account Control Enhanced Auditing Securing Anywhere Access Windows 7 Enterprise Security Building upon the security foundations of Windows Vista, Windows 7 provides IT Professionals security features that are simple to use, manageable, and valuable. Protect Data from Unauthorized Viewing Network Security Network Access Protection DirectAccess TM AppLocker TM Internet Explorer 8 Data Recovery RMS EFS BitLocker TM
3
Windows Vista Foundation Enhanced Auditing Make the system work well for standard users Administrators use full privilege only for administrative tasks File and registry virtualization helps applications that are not UAC compliant User Account Control XML based Granular audit categories Detailed collection of audit results Simplified compliance management Fundamentally Secure Platform Security Development Lifecycle process Kernel Patch Protection Windows Service Hardening DEP & ASLR IE 8 inclusive Mandatory Integrity Controls
4
User Account Control
5
Network Security DirectAccess TM Ensure that only “healthy” machines can access corporate data Enable “unhealthy” machines to get clean before they gain access Network Access Protection Security protected, seamless, always on connection to corporate network Improved management of remote users Consistent security for all access scenarios Securing Anywhere Access Windows Firewall can coexist with 3rd party products Multi-Home Profiles DNSSec (RFCs 4033, 4034 and 4035)
6
AppLocker TM Data Recovery Protect users against social engineering and privacy exploits Protect users against browser based exploits Protect users against web server exploits Internet Explorer 8 File back up and restore CompletePC™ image-based backup System Restore Volume Shadow Copies Volume Revert Protect Users & Infrastructure Enables application standardization within an organization without increasing TCO Increase security to safeguard against data and privacy loss Support compliance enforcement
7
AppLocker vs Software Restriction Policy 7 Feature Software Restriction Policies AppLocker Rule scopeAll usersSpecific user or group Rule conditions provided File hash, path, certificate, registry path, and Internet zone rules File hash, path, and publisher rules Rule types providedAllow and deny Default rule actionAllow or denyDeny Audit-only modeNoYes Wizard to create multiple rules at one time NoYes Policy import or exportNoYes Rule collectionNoYes PowerShell supportNoYes Custom error messagesNoYes
8
AppLocker TM
9
RMS BitLocker TM User-based file and folder encryption Ability to store EFS keys on a smart card EFS Easier to configure and deploy Roam protected data between work and home Share protected data with co-workers, clients, partners, etc. Improve compliance and data security Protect Data from Unauthorized Viewing Policy definition and enforcement Protects information wherever it travels Integrated RMS Client Policy-based protection of document libraries in SharePoint
10
BitLocker-to-go TM
11
Windows 7: Manageability Enterprise-scale Scripting Engine with PowerShell Scripting Richer Support Tools Customized Troubleshooting Enhanced Group Policy Scenarios Group Policy Preferences Reduce Help Desk Calls and Keep Users Productive Flexible Administrative Control Increased Automation to Reduce Costs
12
Reliability Monitor Reliability data is exposed via APIs for remote collection Integration of Reliability Monitor and Problem Reports and Solutions to better correlate system changes and events Resource Monitor SysInternals Process Explorer features integrated into Resource Monitor for clearer identification of process issues Windows Recovery Environment Windows Recovery Environment (WinRE) Restore to OEM or IT image without data loss or reimage with recent system backup System Restore Users will now be able to view the list of software changes before rolling their PC back Restore points will be available from system backups allowing users to roll-back to a point further back in time Problem Steps Recorder Users record steps taken when an issue occurs, giving help desk screen shots and comments to help resolve issues Keep Users Productive
13
Fundamentally Secure Platform Protect Users & Infrastructure Windows Vista Foundation User Account Control Enhanced Auditing Securing Anywhere Access Summary Building upon the security foundations of Windows Vista, Windows 7 provides IT Professionals security features that are simple to use, manageable, and valuable. Protect Data from Unauthorized Viewing Network Security Network Access Protection DirectAccess TM AppLocker TM Internet Explorer 8 Data Recovery RMS EFS BitLocker TM
14
Problem Step Recorder
15
15
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.