Building on the Foundation of Windows Vista: Introduction to Windows 7: Security and Management Dan Stolts IT Pro Evangelist Microsoft http://blogs.technet.com/DanStolts Windows 7 Enterprise Security Building upon the security foundations of Windows Vista, Windows 7 provides IT Professionals security features that are simple to use, manageable, and valuable. Fundamentally Secure Platform Windows Vista Foundation User Account Control Enhanced Auditing Securing Anywhere Access Network Security Network Access Protection DirectAccessTM Protect Users & Infrastructure AppLockerTM Internet Explorer 8 Data Recovery Protect Data from Unauthorized Viewing RMS EFS BitLockerTM Fundamentally Secure Platform Windows Vista Foundation Security Development Lifecycle process Kernel Patch Protection Windows Service Hardening DEP & ASLR IE 8 inclusive Mandatory Integrity Controls User Account Control Make the system work well for standard users Administrators use full privilege only for administrative tasks File and registry virtualization helps applications that are not UAC compliant Enhanced Auditing XML based Granular audit categories Detailed collection of audit results Simplified compliance management User Account Control Securing Anywhere Access Network Security Windows Firewall can coexist with 3rd party products Multi-Home Profiles DNSSec (RFCs 4033, 4034 and 4035) Network Access Protection Ensure that only “healthy” machines can access corporate data Enable “unhealthy” machines to get clean before they gain access DirectAccessTM Security protected, seamless, always on connection to corporate network Improved management of remote users Consistent security for all access scenarios Protect Users & Infrastructure AppLockerTM Enables application standardization within an organization without increasing TCO Increase security to safeguard against data and privacy loss Support compliance enforcement Internet Explorer 8 Protect users against social engineering and privacy exploits Protect users against browser based exploits Protect users against web server exploits Data Recovery File back up and restore CompletePC™ image-based backup System Restore Volume Shadow Copies Volume Revert AppLocker vs Software Restriction Policy Feature Rule scope Software Restriction Policies AppLocker All users File hash, path, certificate, registry path, and Internet zone rules Specific user or group Rule types provided Allow and deny Allow and deny Default rule action Allow or deny Deny Audit-only mode No Yes Wizard to create multiple rules at one time No Yes Policy import or export No Yes Rule collection No Yes PowerShell support No Yes Custom error messages No Yes Rule conditions provided File hash, path, and publisher rules 7 Protect Data from Unauthorized Viewing RMS Policy definition and enforcement Protects information wherever it travels Integrated RMS Client Policy-based protection of document libraries in SharePoint EFS User-based file and folder encryption Ability to store EFS keys on a smart card BitLockerTM Easier to configure and deploy Roam protected data between work and home Share protected data with co-workers, clients, partners, etc. Improve compliance and data security TM BitLocker-to-go Windows 7: Manageability Reduce Help Desk Calls and Keep Users Productive Increased Automation to Reduce Costs Flexible Administrative Control Enterprise-scale Scripting Engine with PowerShell Scripting Richer Support Tools Customized Troubleshooting Enhanced Group Policy Scenarios Group Policy Preferences Keep Users Productive Reliability Monitor Reliability data is exposed via APIs for remote collection Integration of Reliability Monitor and Problem Reports and Solutions to better correlate system changes and events Resource Monitor SysInternals Process Explorer features integrated into Resource Monitor for clearer identification of process issues Windows Recovery Environment Windows Recovery Environment (WinRE) Restore to OEM or IT image without data loss or reimage with recent system backup System Restore Users will now be able to view the list of software changes before rolling their PC back Restore points will be available from system backups allowing users to roll-back to a point further back in time Problem Steps Recorder Users record steps taken when an issue occurs, giving help desk screen shots and comments to help resolve issues Summary Building upon the security foundations of Windows Vista, Windows 7 provides IT Professionals security features that are simple to use, manageable, and valuable. Fundamentally Secure Platform Windows Vista Foundation User Account Control Enhanced Auditing Securing Anywhere Access Network Security Network Access Protection DirectAccessTM Protect Users & Infrastructure AppLockerTM Internet Explorer 8 Data Recovery Protect Data from Unauthorized Viewing RMS EFS BitLockerTM Problem Step Recorder 15