Download presentation
Presentation is loading. Please wait.
Published byBrian Thompson Modified over 9 years ago
1
May 25 – June 15, 2006
2
Technical Overview Bruce Cowper IT Pro Advisor Microsoft Canada bcowper@microsoft.com Damir Bersinic IT Pro Advisor Microsoft Canada damirb@microsoft.com http://blogs.technet.com/canitpro
3
Session Goals: Provide insight into how Vista fits in your environmentProvide insight into how Vista fits in your environment Showcase Vista securityShowcase Vista security How To’s: configuration and management of Windows VistaHow To’s: configuration and management of Windows Vista Best Practices, Tools and TipsBest Practices, Tools and Tips
4
Agenda Key Vista User EnhancementsKey Vista User Enhancements Monitoring and Task SchedulingMonitoring and Task Scheduling Centralized Security ManagementCentralized Security Management Protecting the OSProtecting the OS
5
Empowered Professional –Breakthrough Windows Aero and Basic experiences –Desktop Search and Organization –Internet Explorer 7 –Windows Sidebar –Performance –XPS Documents –Better together with Office 2007
6
demonstration demonstration Windows Vista Features User Interface Enhancements Enhanced Search Internet Explorer 7 Family Safety Settings
7
Agenda Key Vista User EnhancementsKey Vista User Enhancements Monitoring and Task SchedulingMonitoring and Task Scheduling Centralized Security ManagementCentralized Security Management Protecting the OSProtecting the OS
8
Event Logging in Windows Vista Windows Vista Event Logging Infrastructure Enhanced New Event Reporting Standards More Components Producing Events Event Forwarding
9
Reusable Views
10
Cross Log Queries Cross Log Query
11
Forwarded Events SEA-WRK-001 SEA-WRK-002 SEA-DC-01
12
Task Scheduler Launch tasks at specific times Specific event occurs User logs on Computer is idle
13
demonstration demonstration Event Management and Task Scheduling Creating a cross log query and reusable view Event forwarding Attaching a Task to an event Creating a new Task
14
Agenda Key Vista User EnhancementsKey Vista User Enhancements Monitoring and Task SchedulingMonitoring and Task Scheduling Centralized Security ManagementCentralized Security Management Protecting the OSProtecting the OS
15
Security Pain Points Spyware and Viruses Users over-privileged Lost Productivity Administrative Cost Secure by Default
16
Foundational Protection
17
Security Enhancements Version 7.0 Windows Defender Wireless and Wired Configuration Network Access Protection Public Key Policy Configuration Integrated IE 7.0 Policy Settings
18
Windows Firewall IPsec
19
Getting The Right Set Of Policy Settings In Windows Vista Power Management Globalization Troubleshooting and Diagnostics TabletPCPrinting Windows Defender Terminal ServicesiSCSIInternet Explorer Windows Error Reporting Remote Assistance User Account Control USB Device Installation Shell IPSEC and Windows Firewall Policy Settings Highlights Power savings potential via GP control of power management Granular control over USB devices Integration of the Firewall and IPSec* IE Settings controlled via Group Policy More Control and Flexibility GPMC Integration Support for multiple local GPOs Search/Sort/ Filter and Templates (SP1) Language- and network-aware
20
demonstration demonstration Securing Windows Vista Using Group Policy USB and Device Locks User Account Controls IE7 Settings Windows Firewall
21
Agenda Key Vista User EnhancementsKey Vista User Enhancements Monitoring and Task SchedulingMonitoring and Task Scheduling Centralized Security ManagementCentralized Security Management Protecting the OSProtecting the OS
22
Information Leakage Is Top-of-mind With Business Decision Makers “After virus infections, businesses report unintended forwarding of e-mails and loss of mobile devices more frequently than they do any other security breach” Jupiter Research Report, 2004 0%10%20%30%40%50%60%70% Loss of digital assets, restored Email piracy Password compromise Loss of mobile devices Unintended forwarding of emails 20% 22% 35% 36% 63% Virus infection
23
Windows Vista Data Protection Policy Definition & Enforcement Rights Management Services User-Based File System Encryption Encrypted File System Hardware-Based Disk Encryption Full Volume Encryption
24
BitLocker ™ Drive Encryption Designed specifically to prevent a thief who boots another Operating System or runs a hacking tool from breaking Windows file and system protections Provides data protection on your Windows client systems, even when the system is in unauthorized hands or is running a different or exploiting Operating Ssystem Uses a v1.2 TPM or USB flash drive for key storage BitLocker BitLocker
25
TPM Chip and USB Dongle USB Dongle TPM Chip and Pin TPM Chip Different BitLocker Configurations*******
26
demonstration demonstration Protecting the OS Administrative tasks to protect the OS Enabling BitLocker™ Drive Encryption
27
Windows Vista’s user interface provides a cleaner environment to work in Windows Vista is Secure by Design Group Policy enhancements allow you to more easily and completely control desktops BitLocker™ Drive Encryption secures the hard disk Session Summary
28
For More Information… Main TechNet Canada Web site atMain TechNet Canada Web site at www.microsoft.ca/technet Windows Vista Main Web SiteWindows Vista Main Web Site http://www.microsoft.com/windowsvista Canadian IT Pro BlogCanadian IT Pro Blog http://blogs.technet.com/canitpro
29
Join us for the next session on: Microsoft Office 2007 – Working Together Better
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.