Presentation is loading. Please wait.

Presentation is loading. Please wait.

May 25 – June 15, 2006. Technical Overview Bruce Cowper IT Pro Advisor Microsoft Canada Damir Bersinic IT Pro Advisor Microsoft.

Similar presentations


Presentation on theme: "May 25 – June 15, 2006. Technical Overview Bruce Cowper IT Pro Advisor Microsoft Canada Damir Bersinic IT Pro Advisor Microsoft."— Presentation transcript:

1 May 25 – June 15, 2006

2 Technical Overview Bruce Cowper IT Pro Advisor Microsoft Canada bcowper@microsoft.com Damir Bersinic IT Pro Advisor Microsoft Canada damirb@microsoft.com http://blogs.technet.com/canitpro

3 Session Goals: Provide insight into how Vista fits in your environmentProvide insight into how Vista fits in your environment Showcase Vista securityShowcase Vista security How To’s: configuration and management of Windows VistaHow To’s: configuration and management of Windows Vista Best Practices, Tools and TipsBest Practices, Tools and Tips

4 Agenda Key Vista User EnhancementsKey Vista User Enhancements Monitoring and Task SchedulingMonitoring and Task Scheduling Centralized Security ManagementCentralized Security Management Protecting the OSProtecting the OS

5 Empowered Professional –Breakthrough Windows Aero and Basic experiences –Desktop Search and Organization –Internet Explorer 7 –Windows Sidebar –Performance –XPS Documents –Better together with Office 2007

6 demonstration demonstration Windows Vista Features User Interface Enhancements Enhanced Search Internet Explorer 7 Family Safety Settings

7 Agenda Key Vista User EnhancementsKey Vista User Enhancements Monitoring and Task SchedulingMonitoring and Task Scheduling Centralized Security ManagementCentralized Security Management Protecting the OSProtecting the OS

8 Event Logging in Windows Vista Windows Vista Event Logging Infrastructure Enhanced New Event Reporting Standards More Components Producing Events Event Forwarding

9 Reusable Views

10 Cross Log Queries Cross Log Query

11 Forwarded Events SEA-WRK-001 SEA-WRK-002 SEA-DC-01

12 Task Scheduler Launch tasks at specific times Specific event occurs User logs on Computer is idle

13 demonstration demonstration Event Management and Task Scheduling Creating a cross log query and reusable view Event forwarding Attaching a Task to an event Creating a new Task

14 Agenda Key Vista User EnhancementsKey Vista User Enhancements Monitoring and Task SchedulingMonitoring and Task Scheduling Centralized Security ManagementCentralized Security Management Protecting the OSProtecting the OS

15 Security Pain Points Spyware and Viruses Users over-privileged Lost Productivity Administrative Cost Secure by Default

16 Foundational Protection

17 Security Enhancements Version 7.0 Windows Defender Wireless and Wired Configuration Network Access Protection Public Key Policy Configuration Integrated IE 7.0 Policy Settings

18 Windows Firewall IPsec

19 Getting The Right Set Of Policy Settings In Windows Vista Power Management Globalization Troubleshooting and Diagnostics TabletPCPrinting Windows Defender Terminal ServicesiSCSIInternet Explorer Windows Error Reporting Remote Assistance User Account Control USB Device Installation Shell IPSEC and Windows Firewall Policy Settings Highlights Power savings potential via GP control of power management Granular control over USB devices Integration of the Firewall and IPSec* IE Settings controlled via Group Policy More Control and Flexibility GPMC Integration Support for multiple local GPOs Search/Sort/ Filter and Templates (SP1) Language- and network-aware

20 demonstration demonstration Securing Windows Vista Using Group Policy USB and Device Locks User Account Controls IE7 Settings Windows Firewall

21 Agenda Key Vista User EnhancementsKey Vista User Enhancements Monitoring and Task SchedulingMonitoring and Task Scheduling Centralized Security ManagementCentralized Security Management Protecting the OSProtecting the OS

22 Information Leakage Is Top-of-mind With Business Decision Makers “After virus infections, businesses report unintended forwarding of e-mails and loss of mobile devices more frequently than they do any other security breach” Jupiter Research Report, 2004 0%10%20%30%40%50%60%70% Loss of digital assets, restored Email piracy Password compromise Loss of mobile devices Unintended forwarding of emails 20% 22% 35% 36% 63% Virus infection

23 Windows Vista Data Protection Policy Definition & Enforcement Rights Management Services User-Based File System Encryption Encrypted File System Hardware-Based Disk Encryption Full Volume Encryption

24 BitLocker ™ Drive Encryption Designed specifically to prevent a thief who boots another Operating System or runs a hacking tool from breaking Windows file and system protections Provides data protection on your Windows client systems, even when the system is in unauthorized hands or is running a different or exploiting Operating Ssystem Uses a v1.2 TPM or USB flash drive for key storage BitLocker BitLocker

25 TPM Chip and USB Dongle USB Dongle TPM Chip and Pin TPM Chip Different BitLocker Configurations*******

26 demonstration demonstration Protecting the OS Administrative tasks to protect the OS Enabling BitLocker™ Drive Encryption

27 Windows Vista’s user interface provides a cleaner environment to work in Windows Vista is Secure by Design Group Policy enhancements allow you to more easily and completely control desktops BitLocker™ Drive Encryption secures the hard disk Session Summary

28 For More Information… Main TechNet Canada Web site atMain TechNet Canada Web site at www.microsoft.ca/technet Windows Vista Main Web SiteWindows Vista Main Web Site http://www.microsoft.com/windowsvista Canadian IT Pro BlogCanadian IT Pro Blog http://blogs.technet.com/canitpro

29 Join us for the next session on: Microsoft Office 2007 – Working Together Better


Download ppt "May 25 – June 15, 2006. Technical Overview Bruce Cowper IT Pro Advisor Microsoft Canada Damir Bersinic IT Pro Advisor Microsoft."

Similar presentations


Ads by Google