Windows 7 Session 2 Dan Stolts Security and Management

advertisement
Building on the Foundation of
Windows Vista:
Introduction to Windows 7:
Security and Management
Dan Stolts
IT Pro Evangelist
Microsoft
http://blogs.technet.com/DanStolts
Windows 7 Enterprise Security
Building upon the security foundations of Windows Vista, Windows 7 provides IT
Professionals security features that are simple to use, manageable, and valuable.
Fundamentally
Secure
Platform
Windows Vista
Foundation
User Account
Control
Enhanced Auditing
Securing
Anywhere
Access
Network Security
Network Access
Protection
DirectAccessTM
Protect Users
&
Infrastructure
AppLockerTM
Internet Explorer 8
Data Recovery
Protect Data
from
Unauthorized
Viewing
RMS
EFS
BitLockerTM
Fundamentally Secure Platform
Windows Vista
Foundation
Security Development
Lifecycle process
Kernel Patch Protection
Windows Service Hardening
DEP & ASLR
IE 8 inclusive
Mandatory Integrity Controls
User Account
Control
Make the system work well for
standard users
Administrators use full privilege
only for administrative tasks
File and registry virtualization
helps applications that are not
UAC compliant
Enhanced Auditing
XML based
Granular audit categories
Detailed collection of audit
results
Simplified compliance
management
User Account Control
Securing Anywhere Access
Network Security
Windows Firewall can
coexist with 3rd party
products
Multi-Home Profiles
DNSSec (RFCs 4033, 4034 and 4035)
Network Access
Protection
Ensure that only “healthy”
machines can access
corporate data
Enable “unhealthy”
machines to get clean
before they gain access
DirectAccessTM
Security protected,
seamless, always on
connection to corporate
network
Improved management
of remote users
Consistent security for all
access scenarios
Protect Users & Infrastructure
AppLockerTM
Enables application
standardization within an
organization without
increasing TCO
Increase security to
safeguard against data
and privacy loss
Support compliance
enforcement
Internet Explorer 8
Protect users against
social engineering and
privacy exploits
Protect users against
browser based exploits
Protect users against web
server exploits
Data Recovery
File back up and restore
CompletePC™
image-based backup
System Restore
Volume Shadow Copies
Volume Revert
AppLocker vs Software Restriction Policy
Feature
Rule scope
Software Restriction
Policies
AppLocker
All users
File hash, path, certificate,
registry path, and Internet zone
rules
Specific user or group
Rule types provided
Allow and deny
Allow and deny
Default rule action
Allow or deny
Deny
Audit-only mode
No
Yes
Wizard to create
multiple rules at one
time
No
Yes
Policy import or export
No
Yes
Rule collection
No
Yes
PowerShell support
No
Yes
Custom error messages No
Yes
Rule conditions
provided
File hash, path, and publisher rules
7
Protect Data from Unauthorized Viewing
RMS
Policy definition
and enforcement
Protects information
wherever it travels
Integrated RMS Client
Policy-based protection of
document libraries in
SharePoint
EFS
User-based file and folder
encryption
Ability to store EFS keys on
a smart card
BitLockerTM
Easier to configure
and deploy
Roam protected data
between work and home
Share protected data with
co-workers, clients,
partners, etc.
Improve compliance and
data security
TM
BitLocker-to-go
Windows 7: Manageability
Reduce Help Desk
Calls and Keep
Users Productive
Increased
Automation
to Reduce Costs
Flexible
Administrative
Control
Enterprise-scale
Scripting Engine with
PowerShell
Scripting
Richer Support Tools
Customized
Troubleshooting
Enhanced Group Policy
Scenarios
Group Policy Preferences
Keep Users Productive
Reliability Monitor
Reliability data is exposed via APIs for remote collection
Integration of Reliability Monitor and Problem Reports and Solutions
to better correlate system changes and events
Resource Monitor
SysInternals Process Explorer features integrated into Resource Monitor
for clearer identification of process issues
Windows Recovery Environment
Windows Recovery Environment (WinRE)
Restore to OEM or IT image without data loss or reimage with recent system
backup
System Restore
Users will now be able to view the list of software changes before rolling
their PC back
Restore points will be available from system backups allowing users to
roll-back to a point further back in time
Problem Steps Recorder
Users record steps taken when an issue occurs, giving help desk screen
shots and comments to help resolve issues
Summary
Building upon the security foundations of Windows Vista, Windows 7 provides IT
Professionals security features that are simple to use, manageable, and valuable.
Fundamentally
Secure
Platform
Windows Vista
Foundation
User Account
Control
Enhanced Auditing
Securing
Anywhere
Access
Network Security
Network Access
Protection
DirectAccessTM
Protect Users
&
Infrastructure
AppLockerTM
Internet Explorer 8
Data Recovery
Protect Data
from
Unauthorized
Viewing
RMS
EFS
BitLockerTM
Problem Step Recorder
15
Download