SlideShare una empresa de Scribd logo
1 de 37
Descargar para leer sin conexión
Cryptography

IN THE REAL WORLD
Enhance Security and Control




     Narenda Wicaksono
IT Pro Advisor, Microsoft Indonesia
Windows 7 Enterprise Security
Building upon the security foundations of Windows Vista, Windows 7 provides IT
Professionals security features that are simple to use, manageable, and valuable.
A. Fundamentally Secure Platform


                 Windows Vista Foundation
                 Streamlined User Account
                 Control
                 Enhanced Auditing
B. Securing Anywhere Access

              Network Security
              Network Access Protection
              Direct AccessTM
C. Protect Users & Infrastructure

                 AppLockerTM
                 Internet Explorer
                 Data Recovery
D. Protect Data from Unauthorized
Viewing
                 RMS
                 EFS
                 BitLocker &
                 BitLocker To GoTM
A. Fundamentally Secure Platform


 Windows Vista   Streamlined User   Enhanced Auditing
  Foundation     Account Control
Streamlined User Account Control

                 Make the system work well for
                 standard users
                 Administrators use full privilege
                 only for administrative tasks
                 File and registry virtualization
                 helps applications that are not
                 UAC compliant
User Account Control – Windows 7


Reduce the number of OS applications and tasks that require elevation
Refactor applications into elevated/non-elevated pieces
Flexible prompt behavior for administrators




Users can do even more as a standard user
Administrators will see fewer UAC Elevation Prompts
B. Securing Anywhere Access


Network Security   Network Access   DirectAccess
                     Protection
Network Security

                   Policy based network
                   segmentation for more
                   secure and isolated logical
                   networks
                   Multi-Home Firewall
                   Profiles
                   DNSSec Support
Network Access Protection

                 Ensure that only “healthy”
                 machines can access
                 corporate data
                 Enable “unhealthy”
                 machines to get clean
                 before they gain access
DirectAccess

               Security protected,
               seamless, always on
               connection to corporate
               network
               Improved management of
               remote users
               Consistent security for all
               access scenarios
Network Access Protection
                                                     POLICY
                                                      SERVERS
                                                   such as: Patch, AV
Windows     DHCP, VPN
 Client    Switch/Router        NPS
                                      Not Policy                        Remediation
                                      Compliant                           Servers
                                                                        Example: Patch
                                                   Restricted
                                                   Network
 Health policy validation and
 remediation
 Helps keep mobile, desktop
 and server devices in                  Policy         CORPORATE NETWORK
 compliance                           Compliant

 Reduces risk from
 unauthorized systems on the
 network
Remote Access for Mobile Workers
Access Information Anywhere




  Difficult for users to access corporate resources from outside the office
  Challenging for IT to manage, update, patch mobile PCs while disconnected
  from company network
Remote Access for Mobile Workers
Access Information Anywhere




  Same experience accessing corporate resources inside and outside the office
  Seamless connection increases productivity of mobile users
  Easy to service mobile PCs and distribute updates and polices
C. Protect Users & Infrastructure



 AppLockerTM   Internet Explorer 8   Data Recovery
AppLockerTM

              Enables application
              standardization within an
              organization without
              increasing TCO
              Increase security to safeguard
              against data and privacy loss
              Support compliance
              enforcement
Internet Explorer 8

                  Protect users against social
                  engineering and privacy
                  exploits
                  Protect users against browser
                  based exploits
                  Protect users against web
                  server exploits
Data Recovery

                File back up and restore
                CompletePC™ image-based
                backup
                System Restore
                Volume Shadow Copies
                Volume Revert
Application Control




 Users can install and run non-standard applications
 Even standard users can install some types of software
 Unauthorized applications may:
     Introduce malware, Increase helpdesk calls, Reduce user productivity,
     Undermine compliance efforts
Application Control




 Eliminate unwanted/unknown applications in your network
 Enforce application standardization within your organization
 Easily create and manage flexible rules using Group Policy
AppLocker

 Simple Rule Structure: Allow, Exception & Deny
 Publisher Rules
     Product Publisher, Name, Filename & Version
 Multiple Policies
     Executables, installers, scripts & DLLs
 Rule creation tools & wizard
 Audit only mode
 SKU Availability
     AppLocker – Enterprise
     Legacy SRP – Business & Enterprise
D. Protect Data from Unauthorized Viewing




     RMS           EFS          BitLocker
RMS

      Policy definition
      and enforcement
      Protects information
      wherever it travels
      Integrated RMS Client
      Policy-based protection of
      document libraries in
      SharePoint
EFS

      User-based file and folder
      encryption
      Ability to store EFS keys
      on a smart card
BitLocker

            Easier to configure and
            deploy
            Roam protected data
            between work and home
            Share protected data with
            co-workers, clients,
            partners, etc.
            Improve compliance and
            data security
BitLocker


              Worldwide Shipments (000s)
     1200                                                                 Removable Solid-
                                                                          State Storage
     1000
                                                                          Shipments
       800

       600

       400                                                                 PC
       200                                                                 Shipments
         0
                2007        2008        2009        2010        2011




• Gartner “Forecast: USB Flash Drives, Worldwide, 2001-2011” 24 September 2007, Joseph Unsworth
• Gartner “Dataquest Insight: PC Forecast Analysis, Worldwide, 1H08” 18 April 2008, Mikako Kitagawa,
  George Shiffler III
BitLocker



                                  +
 Extend BitLocker drive encryption to removable devices
 Create group policies to mandate the use of encryption and block
 unencrypted drives
 Simplify BitLocker setup and configuration of primary hard drive
BitLocker

 BitLocker Enhancements
    Automatic 200 Mb hidden boot partition
    New Key Protectors
        Domain Recovery Agent (DRA)
        Smart card – data volumes only


 BitLocker To Go
    Support for FAT*
    Protectors: DRA, passphrase, smart card and/or auto-unlock
    Management: protector configuration, encryption enforcement
    Read-only access on Vista & XP
    SKU Availability
        Encrypting – Enterprise
        Unlocking – All
Windows 7 Enterprise Security
    Building upon the security foundations of Windows Vista, Windows 7 provides IT
    Professionals security features that are simple to use, manageable, and valuable.




Windows Vista          Network Security         AppLocker                  RMS
Foundation
                       Network Access           Internet Explorer 8        EFS
Streamlined UAC        Protection
                                                Data Recovery              BitLocker
Enhanced Auditing      DirectAccess
Learning curriculum
eBooks in Bahasa
Indonesia Developer Portal
http://netindonesia.net
IT Professional Portal
http://wss-id.org
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.
The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market
    conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.
                                        MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Más contenido relacionado

La actualidad más candente

Nsa best practices for keeping your home network secure
Nsa   best practices for keeping your home network secureNsa   best practices for keeping your home network secure
Nsa best practices for keeping your home network secure
Fort Rucker FRSA
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security Enhancements
Presentologics
 
Security data sheet
Security data sheetSecurity data sheet
Security data sheet
INSZoom
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
Ariel Martin Beliera
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
HyTrust
 
KASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONKASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATION
GS CHO
 
Windows 7 And Windows Server 2008 R2 Combined Value
Windows 7 And Windows Server 2008 R2 Combined ValueWindows 7 And Windows Server 2008 R2 Combined Value
Windows 7 And Windows Server 2008 R2 Combined Value
Amit Gatenyo
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
David J Rosenthal
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
Kirill Kertsenbaum
 

La actualidad más candente (19)

Norton Zone File-Sharing Service
Norton Zone File-Sharing ServiceNorton Zone File-Sharing Service
Norton Zone File-Sharing Service
 
Nsa best practices for keeping your home network secure
Nsa   best practices for keeping your home network secureNsa   best practices for keeping your home network secure
Nsa best practices for keeping your home network secure
 
Windows Intune: Simplify Your PC Management
Windows Intune: Simplify Your PC ManagementWindows Intune: Simplify Your PC Management
Windows Intune: Simplify Your PC Management
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security Enhancements
 
Security data sheet
Security data sheetSecurity data sheet
Security data sheet
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
 
Session 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry TessierSession 1: Windows 8 with Gerry Tessier
Session 1: Windows 8 with Gerry Tessier
 
From Physical to Virtual to Cloud
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to Cloud
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
 
Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012
 
Cisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group TaggingCisco Trustsec & Security Group Tagging
Cisco Trustsec & Security Group Tagging
 
KASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATIONKASPERSKY SECURITY CENTER IMPLEMENTATION
KASPERSKY SECURITY CENTER IMPLEMENTATION
 
Windows 7 And Windows Server 2008 R2 Combined Value
Windows 7 And Windows Server 2008 R2 Combined ValueWindows 7 And Windows Server 2008 R2 Combined Value
Windows 7 And Windows Server 2008 R2 Combined Value
 
ESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large BusinessesESET: Delivering Benefits to Medium and Large Businesses
ESET: Delivering Benefits to Medium and Large Businesses
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
 
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
Microsoft Intune - Empowering Enterprise Mobility - Presented by Atidan
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
 
Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management
 

Destacado (10)

Visual studio 2010 alm & tfs surabaya
Visual studio 2010 alm & tfs   surabayaVisual studio 2010 alm & tfs   surabaya
Visual studio 2010 alm & tfs surabaya
 
Menjadi Mahasiswa Super
Menjadi Mahasiswa  SuperMenjadi Mahasiswa  Super
Menjadi Mahasiswa Super
 
Intro to Hyper-V R2 and SCVMM 2008 R2
Intro to Hyper-V R2 and SCVMM 2008 R2Intro to Hyper-V R2 and SCVMM 2008 R2
Intro to Hyper-V R2 and SCVMM 2008 R2
 
Building a next generation web application
Building a next generation web applicationBuilding a next generation web application
Building a next generation web application
 
Momotaro
MomotaroMomotaro
Momotaro
 
Kako privući mlade da pišu za vas - Dragana Petkovic
Kako privući mlade da pišu za vas - Dragana Petkovic Kako privući mlade da pišu za vas - Dragana Petkovic
Kako privući mlade da pišu za vas - Dragana Petkovic
 
Promo Example 2
Promo Example 2Promo Example 2
Promo Example 2
 
Neki Novi Novinari - Mali vodič kroz svet medija i novinarstva
Neki Novi Novinari - Mali vodič kroz svet medija i novinarstvaNeki Novi Novinari - Mali vodič kroz svet medija i novinarstva
Neki Novi Novinari - Mali vodič kroz svet medija i novinarstva
 
Microsoft Robotics Studio
Microsoft Robotics StudioMicrosoft Robotics Studio
Microsoft Robotics Studio
 
React Webinar With CodePolitan
React Webinar With CodePolitanReact Webinar With CodePolitan
React Webinar With CodePolitan
 

Similar a Windows 7 security enhancements

Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security Enhancements
Presentologics
 
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The GiantsVirtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giants
eblake
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
technext1
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
Microsoft Singapore
 

Similar a Windows 7 security enhancements (20)

Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security Enhancements
 
Windows 7
Windows 7Windows 7
Windows 7
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
Windows 7 by microsoft
Windows 7 by microsoft Windows 7 by microsoft
Windows 7 by microsoft
 
Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)
 
Core Trace PCI DSS Compliance
Core Trace PCI DSS ComplianceCore Trace PCI DSS Compliance
Core Trace PCI DSS Compliance
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Mobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen SinhaMobility & security Microsoft SPE5 By Bipeen Sinha
Mobility & security Microsoft SPE5 By Bipeen Sinha
 
Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
 
Windows 7 Enhanced Security And Control
Windows 7 Enhanced Security And ControlWindows 7 Enhanced Security And Control
Windows 7 Enhanced Security And Control
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
Consumerization
ConsumerizationConsumerization
Consumerization
 
Internet Explorer 8
Internet Explorer 8Internet Explorer 8
Internet Explorer 8
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
Virtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The GiantsVirtual Desktop Battle Of The Giants
Virtual Desktop Battle Of The Giants
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
 
Windows 7 Feature Overview It Academic Day 2009
Windows 7 Feature Overview   It Academic Day 2009Windows 7 Feature Overview   It Academic Day 2009
Windows 7 Feature Overview It Academic Day 2009
 
Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
AlertBoot Datasheet
AlertBoot DatasheetAlertBoot Datasheet
AlertBoot Datasheet
 
Microsoft Windows 7 Enhanced Security And Control
Microsoft Windows 7 Enhanced Security And ControlMicrosoft Windows 7 Enhanced Security And Control
Microsoft Windows 7 Enhanced Security And Control
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Windows 7 security enhancements

  • 2. Enhance Security and Control Narenda Wicaksono IT Pro Advisor, Microsoft Indonesia
  • 3. Windows 7 Enterprise Security Building upon the security foundations of Windows Vista, Windows 7 provides IT Professionals security features that are simple to use, manageable, and valuable.
  • 4. A. Fundamentally Secure Platform Windows Vista Foundation Streamlined User Account Control Enhanced Auditing
  • 5. B. Securing Anywhere Access Network Security Network Access Protection Direct AccessTM
  • 6. C. Protect Users & Infrastructure AppLockerTM Internet Explorer Data Recovery
  • 7. D. Protect Data from Unauthorized Viewing RMS EFS BitLocker & BitLocker To GoTM
  • 8. A. Fundamentally Secure Platform Windows Vista Streamlined User Enhanced Auditing Foundation Account Control
  • 9. Streamlined User Account Control Make the system work well for standard users Administrators use full privilege only for administrative tasks File and registry virtualization helps applications that are not UAC compliant
  • 10. User Account Control – Windows 7 Reduce the number of OS applications and tasks that require elevation Refactor applications into elevated/non-elevated pieces Flexible prompt behavior for administrators Users can do even more as a standard user Administrators will see fewer UAC Elevation Prompts
  • 11. B. Securing Anywhere Access Network Security Network Access DirectAccess Protection
  • 12. Network Security Policy based network segmentation for more secure and isolated logical networks Multi-Home Firewall Profiles DNSSec Support
  • 13. Network Access Protection Ensure that only “healthy” machines can access corporate data Enable “unhealthy” machines to get clean before they gain access
  • 14. DirectAccess Security protected, seamless, always on connection to corporate network Improved management of remote users Consistent security for all access scenarios
  • 15. Network Access Protection POLICY SERVERS such as: Patch, AV Windows DHCP, VPN Client Switch/Router NPS Not Policy Remediation Compliant Servers Example: Patch Restricted Network Health policy validation and remediation Helps keep mobile, desktop and server devices in Policy CORPORATE NETWORK compliance Compliant Reduces risk from unauthorized systems on the network
  • 16. Remote Access for Mobile Workers Access Information Anywhere Difficult for users to access corporate resources from outside the office Challenging for IT to manage, update, patch mobile PCs while disconnected from company network
  • 17. Remote Access for Mobile Workers Access Information Anywhere Same experience accessing corporate resources inside and outside the office Seamless connection increases productivity of mobile users Easy to service mobile PCs and distribute updates and polices
  • 18. C. Protect Users & Infrastructure AppLockerTM Internet Explorer 8 Data Recovery
  • 19. AppLockerTM Enables application standardization within an organization without increasing TCO Increase security to safeguard against data and privacy loss Support compliance enforcement
  • 20. Internet Explorer 8 Protect users against social engineering and privacy exploits Protect users against browser based exploits Protect users against web server exploits
  • 21. Data Recovery File back up and restore CompletePC™ image-based backup System Restore Volume Shadow Copies Volume Revert
  • 22. Application Control Users can install and run non-standard applications Even standard users can install some types of software Unauthorized applications may: Introduce malware, Increase helpdesk calls, Reduce user productivity, Undermine compliance efforts
  • 23. Application Control Eliminate unwanted/unknown applications in your network Enforce application standardization within your organization Easily create and manage flexible rules using Group Policy
  • 24. AppLocker Simple Rule Structure: Allow, Exception & Deny Publisher Rules Product Publisher, Name, Filename & Version Multiple Policies Executables, installers, scripts & DLLs Rule creation tools & wizard Audit only mode SKU Availability AppLocker – Enterprise Legacy SRP – Business & Enterprise
  • 25. D. Protect Data from Unauthorized Viewing RMS EFS BitLocker
  • 26. RMS Policy definition and enforcement Protects information wherever it travels Integrated RMS Client Policy-based protection of document libraries in SharePoint
  • 27. EFS User-based file and folder encryption Ability to store EFS keys on a smart card
  • 28. BitLocker Easier to configure and deploy Roam protected data between work and home Share protected data with co-workers, clients, partners, etc. Improve compliance and data security
  • 29. BitLocker Worldwide Shipments (000s) 1200 Removable Solid- State Storage 1000 Shipments 800 600 400 PC 200 Shipments 0 2007 2008 2009 2010 2011 • Gartner “Forecast: USB Flash Drives, Worldwide, 2001-2011” 24 September 2007, Joseph Unsworth • Gartner “Dataquest Insight: PC Forecast Analysis, Worldwide, 1H08” 18 April 2008, Mikako Kitagawa, George Shiffler III
  • 30. BitLocker + Extend BitLocker drive encryption to removable devices Create group policies to mandate the use of encryption and block unencrypted drives Simplify BitLocker setup and configuration of primary hard drive
  • 31. BitLocker BitLocker Enhancements Automatic 200 Mb hidden boot partition New Key Protectors Domain Recovery Agent (DRA) Smart card – data volumes only BitLocker To Go Support for FAT* Protectors: DRA, passphrase, smart card and/or auto-unlock Management: protector configuration, encryption enforcement Read-only access on Vista & XP SKU Availability Encrypting – Enterprise Unlocking – All
  • 32. Windows 7 Enterprise Security Building upon the security foundations of Windows Vista, Windows 7 provides IT Professionals security features that are simple to use, manageable, and valuable. Windows Vista Network Security AppLocker RMS Foundation Network Access Internet Explorer 8 EFS Streamlined UAC Protection Data Recovery BitLocker Enhanced Auditing DirectAccess
  • 37. © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.