SlideShare a Scribd company logo
1 of 56
Download to read offline
www.ctesolutions.com




                        Welcome to CTE Solutions

                          Windows 8 in the Enterprise



Training with Impact.                                    1
Introduction




            Gérald F. Tessier

 Senior Trainer at CTE Solutions, Inc.
 Training for 16 years
 MCITP, MCTS, MCSE 2003/2000/NT,
  MCSA, MCP+I, MCT, ITIL V3 Foundations,
  ITIL OSA, ITIL RCV, CTT, Security+,
  Network+, A+, EIEIO+
                                           2
Windows 8 in the Enterprise

1. Overview of Windows 8

2. Deploying Windows 8

3. Navigating the Windows 8 Interface

4. Securing Windows 8

5. 10 Reasons to Upgrade to Windows 8
Part I: Overview of Windows 8


   Introducing Windows 8
   Windows 8 Editions
   Advantages of 64 bit
Introducing Windows 8

Windows 8 represents the largest change in the Windows
operating system since Windows 95

Key new features:
• Start Screen
• Cloud integration
• Reset and Refresh your PC
• Windows To Go
• Remote Desktop Services
• Hyper-V
• Support for multiple form factors
• Powershell v3.0
Understanding Windows 8 Editions


Windows 8 comes in three editions:
 • Windows 8
 • Windows 8 Pro
 • Windows 8 Enterprise

Windows RT is the ARM-specific version of Windows 8
designed for mobile devices that use the ARM processor
architecture
Understanding Windows 8 Editions (cont.)


Windows 8 Enterprise offers the following advantages:

o   BranchCache
o   Applocker
o   DirectAccess
o   Side-load Metro Apps
o   Virtualization through RemoteFX
o   Windows To Go
Advantages of 64-bit Windows 8 Versions

Advantages of 64-bit processors:
     • Improved performance
     • More memory
     • Improved device support
     • Improved security


Limitation:

     • Does not support the 16-bit Windows on
       Windows (WOW) environment
Part II: Deploying Windows 8


   Hardware Requirements for Installing Windows 8
   Determining Device Compatibility and Screen Resolution
   Common Application-Compatibility Problems
   Methods for Mitigating Common Application-
    Compatibility Issues
   Options for Installing Windows 8
   Imaging with MDT 2012 Update 1
   Windows 8 to Go
Hardware Requirements for Installing Windows 8

 Windows 8 minimum recommended hardware
 requirements:
   • 1 GHz or faster processor
   • 1 GB RAM (32-bit) or 2 GB RAM (64-bit)
   • 16 GB available hard disk space (32-bit)
     or 20 GB (64-bit)
   • DirectX 9 graphics device with WDDM 1.0 or
     higher driver
 Windows 8 feature-specific requirements:
  • UEFI-based BIOS for secured boot process
  • 64-bit processor with second level address
  translation support
  • TPM for full BitLocker support
Determining Device Compatibility and Screen
Resolution

Use the Compatibility Center for Windows 8 website to
check hardware compatibility
  • Processor
  • Memory
  • Network card
   • Hard disk
Metro-based apps require a screen resolution of 1024x768
or higher
Common Application-Compatibility Problems

Common application compatibility problems may relate to
the following areas:
   • Setup and installation of applications
   • User Account Control
   • Windows Resource Protection
   • Internet Explorer Protected Mode
   • 64-bit architecture
   • Windows Filtering Platform
   • Operating system version changes
   • Kernel-mode drivers
   • Deprecated components
Methods for Mitigating Common Application-
Compatibility Issues

You can use the ACT to determine whether your
applications are compatible with Windows 8

Other mitigation methods include:
 • Verify your application, device, and computer compatibility
   with a new version of the Windows operating system
 • Verify a Windows update's compatibility
 • Become involved in the ACT community and share your
   risk assessment with other ACT users
 • Test your web applications and websites for
   compatibility with new releases and security updates
   to Internet Explorer
Options for Installing Windows 8

 Clean installation
  • Install Windows 8 on a new partition
  • Replace an existing operating system on a partition

 Upgrade installation
  • Replace an existing version of Windows with Windows
    8
  • All users applications, files, and settings are retained
Migration
 • Move files and settings from an old operating system
   to Windows 8
 • Side-by-side or wipe and load
Part III: Navigating the Windows 8 Interface
Part III: Navigating the Windows 8 Interface
In the news…
                     Microsoft
                   Work Exposes
                   Magnitude of
                   Botnet Threat

                   Microsoft's Security
                   Intelligence Report
                    sheds light on the
                    expanding threat
                       that bots…

                 Researchers
                 Discover Link
                  Between a
                   Series of
                    Trojans
                 A difficult to remove
                    rootkit behind
                       numerous
                sophisticated attacks,
               appears to have helped
                 spread yet another
Computing and Societal Trends
Windows for the Enterprise



Devices &                    Enterprise-Grade
Experiences                  Solutions
Users Want
      Love
              Enterprise Scenarios
Microsoft Experience and Credentials




                           Trustworthy Computing            SAS-70
                               Initiative (TwC)            Certificati
                                                              on
                                                    Malware
                               BillG               Protection ISO 27001
                               Memo                 Center     Certification




                                           Microsoft
                           Global                                               FISMA
    Microsoft Security                      Security
                         Foundation                                            Certificati
    Response Center                       Engineering
                          Services                                                on
        (MSRC)                               Center/
                           (GFS)            Security
                                          Development
                                            Lifecycle
Security Landscape


          Private Cloud                  Public Cloud
                              APPS




           On-Premise                       Online

INFORMATION ACCESS   ANTI-          POLICY RESEARCH SECURE
 PROTECTIONCONTROL MALWARE        MANAGEMENTRESPONSE
                                           &       DEVELOPMENT


                             DEVICES
Microsoft End-to-End Client Protection
      Protect Against and                   Protect Sensitive Data                     Secure Access
       Manage Threats                                                                   to Resources



     Universal Extensible Firmware Interface                    Trusted Platform Model (TPM)
                     (UEFI)
      • Maintain software with a patch       • Secure data that is at rest with   • Manage the full identity lifecycle
            management solution                          encryption               • Validate user identity with strong
    • Deliver software that is secure by      • Protect data that is in motion               authentication
                   design                              with encryption             • Secured and always connected
  • Operate a malware resistant platform     • Protect data that is in use with              remote access
               and applications                       access controls                   • Protect resources as
     • Defend against malware threats                                                     environment changes
  Secured         Windows Standard User                Windows 7 BitLocker             Active Directory
    Boot                 Accounts             MDOP -BitLocker Administration and        Direct Access
  Measured      User Account Control, and                  Monitoring                  Network Access
    Boot                AppLocker            Office Information Rights Management         Protection
  Protected        Modern Applications                        (IRM)                Dynamic Access Control
    View                 Defender                 Office Encrypted File System
  IE Smart                                    Active Directory Rights Management
   Screen                                                  Services z
Microsoft Security Development Lifecycle




   Educati                   Proce              Accountabili
     on                       ss                    ty




             Ongoing Process Improvements – 12 month
                              cycle
Protection Starts with Patch Management



   • Setting the industry standard for
              threat response
    • Engaging with over 70 “Active
            Protection” partners
    • Further reducing the impact of
          zero-day vulnerabilities
        • Predictable IT patch cycle
    • Streamlined update process with
                    WSUS
     • Integration with System Center
 250%      Configuration Manager
                                           Patch Manage
 200%                                      with WSUS

 150%

 100%
        2H06 1H07 2H07 1H08 2H08 1H09 2H09 1H10
Protection Starts with Patch
Management
 Patch management is among the top 5 security priorities for
                         2010
       Based on Gartner Survey: Top 10 Security Technology Project Priorities for 2010, Dec 2009




                                                     240%           The number of
                                                                   enterprises with
                                                     220%            regular patch                     Patch Manag
                                                                                                       with WSUS
                                                     200%         management has
                                                     180%        significantly grown
                                                     160%
              ®
                                                     140%
                                                     120%
                                                     100%



                                                                Microsoft Security Intelligence Report Vol. 9, Oct
                                                                                                             2010
•    Establish a managed,                    • Set a security     • Manage security tasks
           common identity                       baseline with SCM         with System Center
          infrastructure with                 • Leverage Microsoft            Configuration
           Active Directory®                   security guidance for            Manager
    •     Easily enforce device                      compliance          • Ensure corporate
         and user policies with                 • Customize your         desktops comply with
         Active Directory Group                security configuration     desired configuration
                 Policies                        with settings packs      and security baseline
                                                                       • Monitor, control, and
•       Simplify identity, strong
           authentication, and
                                                                             gain visibility of
          access management                                                physical and virtual
        with Forefront Identity Manager and
        With Forefront® Identity                                         desktop environments
              Manager (FIM)
            Active Directory, we have the
         comprehensive identity and access
        management solution that we need to
          support our banking operations.”
•       Securing the Code     •   Mitigate exploits through the
                                                sandboxed Protected View
       •    Securing the Boot Process            which allows users to view
                                               untrusted files without harming
             •       Securing the Core                 their computer
                 •   Securing Sign-In     •    Reduce the attack surface by
                                               validating file schemas, limiting
   •       Securing while Desktop is in         file types, blocking embedded
                                                 code, and leveraging built-in
                            Use                 Windows security mechanisms
            •        Securing Access to   •   Improve the user experience
                                             with fewer security decisions that
                Resources
      “[With Windows 7 security            “We are using SharePointand more
                                                 need to be made Workspace
           enhancements],                 2010 to expand our security initiatives,
                                              instrumental instructions to pre-
we will save more than $10 for each of       which will help us ensure that our
                                                     empt helpdesk calls
                                           information is protected, correct, and
           our 16,000 PCs.
 That equals more than $160,000 in                      accessible.”
•       Securing the Code             •Protect from social

    •    Securing the Boot Process            engineering and phishing

          •       Securing the Core      •Protect desktop from malicious
                                                      downloads
              •   Securing Sign-In
                                          •Enhance protection based the
•       Securing while Desktop is in
                                                   needs per Zone
                         Use
                                           •Protect system and IE from
         •        Securing Access to
                                               malicious applications
                      Resources          “Internet Explorer …is a definite
                                       positive step in terms of a protected
                                               •Protect from webpage
                                                      browser”
                                       –Neil MacDonald/Gartner, Network World,
                                                manipulation (XSS)
                                                                    6/21/2010
•Proactive protection against
       • Minimize impact of                          threats
    application vulnerabilities and
                                       •Dynamic updates through cloud
          exploits with integral                     service
    mechanisms developed from the
     Security Development Lifecycle    •Centralized security and firewall
                                                     policies
     •   Prevent unauthorized            •Security compliance alerts,
        operations by running in             tracking, and reporting
    “standard user” mode using User     •Builds on Microsoft industry-
            Account Control               leading anti-malware engine
•    Protect against network threats
          with built-in firewall
      • Restrict applications
      installation and usage with      •   Global threat intelligence and real-time
     Windows AppLocker policies            response backed by Microsoft Malware
                                                      Protection Center
•        Windows BitLocker®             • Data extraction        • Office Information
        protects data on hard-
                                        through USB devices         Rights Management
        drives with encryption
                                       is centrally controlled    (IRM) sets boundaries
      • Data cannot be                  • Protect data on             for sensitive data
    extracted in the event of          removable drives with •     Keep documents and
    loss or theft, complying             BitLocker To GoTM        email communication
       with FIPS 140-2 (in                   encryption                  to authorized
             process)
                                     • Restrict device types           corporate users
•        Hardware integration            and block writes to         • Mark content
        (TPM) prevents access            unprotected drives             manually or by
         on a tampered OS or          through Group Policies      automated inspection
            another device                                        in Microsoft Exchange
    •    Microsoft BitLocker                                          and SharePoint®
         Administration and
                 Replaced a third party solution
                                                                     Enforce password
                                                                 • Implemented BitLocker and
        Monitoring enhancesBitlocker
                         with                                        protection,To Go
                                                                          BitLocker digital
            provisioning, $100,000 in licensing
                and saved                                           signatures and limit
                                                                       for all mobile workers
        monitoring, and key
                       and maintenance                             data extraction from
Establish a managed,
                •                             •Add strong authentication with
                  common identity                          Windows 7
             infrastructure with Active
                                               •Use Windows 7 Biometric or
             Directory, enhanced with
                                                   Smart-card frameworks
            Forefront Identity Manager
                                               to authenticate users at logon,
•       Create a common, single sign              for admin access or drive
         on across on-premises and                         encryption
               cloud services                 •Simplify Enrollment and end to
                                                end lifecycle management of
    •   Manage access to resources
                                                               PKI
        with policy controlled groups
                                               certificates for both IT and end
             in Active Directory
                                                              users
           Enhance and automate
            •                                      •Extend remote access
             identity and access                  authentication with PKI
                                          
        provisioning / deprovisioning             certificates, smart-cards
        •    Empower users with self
                                                 or RSA One Time Password
            service tools for group and
vides various options for remote access




    •   Enable DirectAccess connectivity for continuous manageability of remote corporate
                                              laptops

                                 •     Apply OS patches, maintain anti-virus signatures,
                                          and keep applications updated at all times

                                 •     Keep configuration and security policies up to date

                            •        Set access policy based on device type and health

          •           Validate and remediate remote devices before granting access to corporate
                                                     resources

                             •       Support access from unmanaged PCs and phones

              •       Allow any device with a browser to access internal portals through Unified
                                                  Access Gateway

                  •     Provide asset and compliance reporting with System Center for devices
                                         connected via Exchange ActiveSync
•   Manual tagging by
         content owners
                                 • Expression based          • Automatic RMS
•   Automatic Classification      access conditions and       protection for Office
                                  auditing with support      documents based on
    •   Application based
                                 for user claims, device            file tags
             tagging
                                   claims and file tags       • Near real time
                               • Central access policies     protection soon after
                                  targeted based on file       the file is tagged
                                            tags           • Extensibility for non
                                    • Access denied          Office RMS protectors
                                        remediation
                                • Policy staging audits
                                     to simulate policy
                                     changes in a real
                                        environment
Modern Security
                  Touch     Thinner,    New
                            Lighter,    Form
                             Faster    Factors



                  Sensors               Long
                                       Battery
                                         Life
ffective IT investment for desktop security needs
Top 10 Reasons to Upgrade to Windows 8

1.   UEFI Fast boot
2.   Secure Boot
3.   Improved Authentication
4.   Client Hyper-V
5.   Live Performance Feedback
6.   Powershell v3.0
7.   Windows to GO
8.   DirectAccess
9.   Unified Experience
10. Who really likes the old start menu?

11. *Bonus: Cloud Integration!

More Related Content

What's hot

Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2JD Sherry
 
Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeemu Tiainen
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012Agora Group
 
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec
 
Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionWebroot
 
Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02frank4dd
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Amazon Web Services
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Acrodex
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceUNIT4 IT Solutions
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012Symantec
 
IBM Storwize V7000 Unified: Safeguarding your critical data
IBM Storwize V7000 Unified: Safeguarding your critical dataIBM Storwize V7000 Unified: Safeguarding your critical data
IBM Storwize V7000 Unified: Safeguarding your critical dataIBM India Smarter Computing
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancementsNarenda Wicaksono
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationAriel Martin Beliera
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesHyTrust
 
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonIBM Danmark
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationGraeme Wood
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
Product overview-eset-file-security
Product overview-eset-file-securityProduct overview-eset-file-security
Product overview-eset-file-securityÜstün Koruma
 
IT Security Risk Mitigation Report: Virtualization Security
IT Security Risk Mitigation Report: Virtualization SecurityIT Security Risk Mitigation Report: Virtualization Security
IT Security Risk Mitigation Report: Virtualization SecurityBooz Allen Hamilton
 

What's hot (20)

Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2
 
Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012Symantec Virtualization Launch VMworld 2012
Symantec Virtualization Launch VMworld 2012
 
Teknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimuksetTeknisen tietoturvan minimivaatimukset
Teknisen tietoturvan minimivaatimukset
 
Trend Micro - 13martie2012
Trend Micro - 13martie2012Trend Micro - 13martie2012
Trend Micro - 13martie2012
 
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
Symantec Introduces New Security Solutions to Counter Advanced Persistent Thr...
 
Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware Infection
 
Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02Frank Migge It Security Patch Monitoring With Nagios 02
Frank Migge It Security Patch Monitoring With Nagios 02
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
 
RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012RSA 2012 Virtualization Security February 2012
RSA 2012 Virtualization Security February 2012
 
IBM Storwize V7000 Unified: Safeguarding your critical data
IBM Storwize V7000 Unified: Safeguarding your critical dataIBM Storwize V7000 Unified: Safeguarding your critical data
IBM Storwize V7000 Unified: Safeguarding your critical data
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
 
Introducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for VirtualizationIntroducing Kaspersky Security for Virtualization
Introducing Kaspersky Security for Virtualization
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
 
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael AnderssonPCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
PCTY 2012, Threat landscape and Security Intelligence v. Michael Andersson
 
Trend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning PresentationTrend Micro VForum Agentless Scanning Presentation
Trend Micro VForum Agentless Scanning Presentation
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Product overview-eset-file-security
Product overview-eset-file-securityProduct overview-eset-file-security
Product overview-eset-file-security
 
IT Security Risk Mitigation Report: Virtualization Security
IT Security Risk Mitigation Report: Virtualization SecurityIT Security Risk Mitigation Report: Virtualization Security
IT Security Risk Mitigation Report: Virtualization Security
 

Similar to Session 1: Windows 8 with Gerry Tessier

Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaMicrosoft Singapore
 
IT Pros and The Cloud
IT Pros and The CloudIT Pros and The Cloud
IT Pros and The CloudStephen Rose
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for BusinessRobert Crane
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyMicrosoft Österreich
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefingtechnext1
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)José Ferreiro
 
Windows Accelerate IT Pro Bootcamp: Security (Module 4 of 8)
Windows Accelerate IT Pro Bootcamp: Security (Module 4 of 8)Windows Accelerate IT Pro Bootcamp: Security (Module 4 of 8)
Windows Accelerate IT Pro Bootcamp: Security (Module 4 of 8)Intergen
 
HCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgHCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgDNUG e.V.
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudAlert Logic
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alAlert Logic
 
New Horizons for End-User Computing Event - Trend
New Horizons for End-User Computing Event - TrendNew Horizons for End-User Computing Event - Trend
New Horizons for End-User Computing Event - TrendArrow ECS UK
 
Migrate from BigFix to Ivanti
Migrate from BigFix to IvantiMigrate from BigFix to Ivanti
Migrate from BigFix to IvantiIvanti
 
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...Alexander Benoit
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012Nicolai Henriksen
 

Similar to Session 1: Windows 8 with Gerry Tessier (20)

Sccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estoninaSccm 2012 overview - chris_estonina
Sccm 2012 overview - chris_estonina
 
IT Pros and The Cloud
IT Pros and The CloudIT Pros and The Cloud
IT Pros and The Cloud
 
An introduction to Defender for Business
An introduction to Defender for BusinessAn introduction to Defender for Business
An introduction to Defender for Business
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)
 
Windows Accelerate IT Pro Bootcamp: Security (Module 4 of 8)
Windows Accelerate IT Pro Bootcamp: Security (Module 4 of 8)Windows Accelerate IT Pro Bootcamp: Security (Module 4 of 8)
Windows Accelerate IT Pro Bootcamp: Security (Module 4 of 8)
 
HCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch SalzburgHCL BigFix - DNUG Stammtisch Salzburg
HCL BigFix - DNUG Stammtisch Salzburg
 
Five years of Persistent Threats
Five years of Persistent ThreatsFive years of Persistent Threats
Five years of Persistent Threats
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the Cloud
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
New Horizons for End-User Computing Event - Trend
New Horizons for End-User Computing Event - TrendNew Horizons for End-User Computing Event - Trend
New Horizons for End-User Computing Event - Trend
 
Migrate from BigFix to Ivanti
Migrate from BigFix to IvantiMigrate from BigFix to Ivanti
Migrate from BigFix to Ivanti
 
Windows 7
Windows 7Windows 7
Windows 7
 
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
 
NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012NIC2012 - System Center Endpoint Protection 2012
NIC2012 - System Center Endpoint Protection 2012
 
Secure the modern Enterprise
Secure the modern EnterpriseSecure the modern Enterprise
Secure the modern Enterprise
 

More from CTE Solutions Inc.

Java 8 - New Updates and Why It Matters?
Java 8 - New Updates and Why It Matters?Java 8 - New Updates and Why It Matters?
Java 8 - New Updates and Why It Matters?CTE Solutions Inc.
 
Exchange @ The Core with CTE Solutions
Exchange @ The Core with CTE SolutionsExchange @ The Core with CTE Solutions
Exchange @ The Core with CTE SolutionsCTE Solutions Inc.
 
Microsoft SharePoint in the Workplace
Microsoft SharePoint in the WorkplaceMicrosoft SharePoint in the Workplace
Microsoft SharePoint in the WorkplaceCTE Solutions Inc.
 
Ba why development projects fail
Ba   why development projects failBa   why development projects fail
Ba why development projects failCTE Solutions Inc.
 
Prince2 & PMBOK Comparison Demystified
Prince2 & PMBOK Comparison DemystifiedPrince2 & PMBOK Comparison Demystified
Prince2 & PMBOK Comparison DemystifiedCTE Solutions Inc.
 
Development Projects Failing? What can the Business Analyst Do?
Development Projects Failing?  What can the Business Analyst Do?Development Projects Failing?  What can the Business Analyst Do?
Development Projects Failing? What can the Business Analyst Do?CTE Solutions Inc.
 
Project Management Essentials: Stakeholder Management
Project Management Essentials: Stakeholder ManagementProject Management Essentials: Stakeholder Management
Project Management Essentials: Stakeholder ManagementCTE Solutions Inc.
 
Canadian Cloud Webcast from CTE Solutions part of Smarter Everyday Project
Canadian Cloud Webcast from CTE Solutions part of Smarter Everyday ProjectCanadian Cloud Webcast from CTE Solutions part of Smarter Everyday Project
Canadian Cloud Webcast from CTE Solutions part of Smarter Everyday ProjectCTE Solutions Inc.
 
Top 5 Mistakes during ITIL implementations by CTE Solutions
Top 5 Mistakes during ITIL implementations by CTE SolutionsTop 5 Mistakes during ITIL implementations by CTE Solutions
Top 5 Mistakes during ITIL implementations by CTE SolutionsCTE Solutions Inc.
 
Business and ITSM on the same page at last! ITIL, TOGAF and COBIT working to...
Business and ITSM on the same page at last!  ITIL, TOGAF and COBIT working to...Business and ITSM on the same page at last!  ITIL, TOGAF and COBIT working to...
Business and ITSM on the same page at last! ITIL, TOGAF and COBIT working to...CTE Solutions Inc.
 
What's New for Developers in SharePoint 2013
What's New for Developers in SharePoint 2013What's New for Developers in SharePoint 2013
What's New for Developers in SharePoint 2013CTE Solutions Inc.
 
What's New for IT Professionals in SharePoint Server 2013
What's New for IT Professionals in SharePoint Server 2013What's New for IT Professionals in SharePoint Server 2013
What's New for IT Professionals in SharePoint Server 2013CTE Solutions Inc.
 
The Many A's in Entperise Architecture: Archaeology, Anthropology, Analysis a...
The Many A's in Entperise Architecture: Archaeology, Anthropology, Analysis a...The Many A's in Entperise Architecture: Archaeology, Anthropology, Analysis a...
The Many A's in Entperise Architecture: Archaeology, Anthropology, Analysis a...CTE Solutions Inc.
 
Hyper-v for Windows Server 2012 Live Migration
Hyper-v for Windows Server 2012 Live MigrationHyper-v for Windows Server 2012 Live Migration
Hyper-v for Windows Server 2012 Live MigrationCTE Solutions Inc.
 
The future of agile in organizations
The future of agile in organizationsThe future of agile in organizations
The future of agile in organizationsCTE Solutions Inc.
 
IIBA Ottawa Kick-Off Meeting: Change Management with Sandee Vincent
IIBA Ottawa Kick-Off Meeting: Change Management with Sandee VincentIIBA Ottawa Kick-Off Meeting: Change Management with Sandee Vincent
IIBA Ottawa Kick-Off Meeting: Change Management with Sandee VincentCTE Solutions Inc.
 
Session 3 - Windows Server 2012 with Jared Thibodeau
Session 3 - Windows Server 2012 with Jared ThibodeauSession 3 - Windows Server 2012 with Jared Thibodeau
Session 3 - Windows Server 2012 with Jared ThibodeauCTE Solutions Inc.
 

More from CTE Solutions Inc. (20)

Java 8 - New Updates and Why It Matters?
Java 8 - New Updates and Why It Matters?Java 8 - New Updates and Why It Matters?
Java 8 - New Updates and Why It Matters?
 
Understanding Lean IT
Understanding Lean ITUnderstanding Lean IT
Understanding Lean IT
 
Understanding Lean IT
Understanding Lean IT Understanding Lean IT
Understanding Lean IT
 
Exchange @ The Core with CTE Solutions
Exchange @ The Core with CTE SolutionsExchange @ The Core with CTE Solutions
Exchange @ The Core with CTE Solutions
 
Microsoft SharePoint in the Workplace
Microsoft SharePoint in the WorkplaceMicrosoft SharePoint in the Workplace
Microsoft SharePoint in the Workplace
 
Ba why development projects fail
Ba   why development projects failBa   why development projects fail
Ba why development projects fail
 
Prince2 & PMBOK Comparison Demystified
Prince2 & PMBOK Comparison DemystifiedPrince2 & PMBOK Comparison Demystified
Prince2 & PMBOK Comparison Demystified
 
Development Projects Failing? What can the Business Analyst Do?
Development Projects Failing?  What can the Business Analyst Do?Development Projects Failing?  What can the Business Analyst Do?
Development Projects Failing? What can the Business Analyst Do?
 
Risk Management using ITSG-33
Risk Management using ITSG-33Risk Management using ITSG-33
Risk Management using ITSG-33
 
Project Management Essentials: Stakeholder Management
Project Management Essentials: Stakeholder ManagementProject Management Essentials: Stakeholder Management
Project Management Essentials: Stakeholder Management
 
Canadian Cloud Webcast from CTE Solutions part of Smarter Everyday Project
Canadian Cloud Webcast from CTE Solutions part of Smarter Everyday ProjectCanadian Cloud Webcast from CTE Solutions part of Smarter Everyday Project
Canadian Cloud Webcast from CTE Solutions part of Smarter Everyday Project
 
Top 5 Mistakes during ITIL implementations by CTE Solutions
Top 5 Mistakes during ITIL implementations by CTE SolutionsTop 5 Mistakes during ITIL implementations by CTE Solutions
Top 5 Mistakes during ITIL implementations by CTE Solutions
 
Business and ITSM on the same page at last! ITIL, TOGAF and COBIT working to...
Business and ITSM on the same page at last!  ITIL, TOGAF and COBIT working to...Business and ITSM on the same page at last!  ITIL, TOGAF and COBIT working to...
Business and ITSM on the same page at last! ITIL, TOGAF and COBIT working to...
 
What's New for Developers in SharePoint 2013
What's New for Developers in SharePoint 2013What's New for Developers in SharePoint 2013
What's New for Developers in SharePoint 2013
 
What's New for IT Professionals in SharePoint Server 2013
What's New for IT Professionals in SharePoint Server 2013What's New for IT Professionals in SharePoint Server 2013
What's New for IT Professionals in SharePoint Server 2013
 
The Many A's in Entperise Architecture: Archaeology, Anthropology, Analysis a...
The Many A's in Entperise Architecture: Archaeology, Anthropology, Analysis a...The Many A's in Entperise Architecture: Archaeology, Anthropology, Analysis a...
The Many A's in Entperise Architecture: Archaeology, Anthropology, Analysis a...
 
Hyper-v for Windows Server 2012 Live Migration
Hyper-v for Windows Server 2012 Live MigrationHyper-v for Windows Server 2012 Live Migration
Hyper-v for Windows Server 2012 Live Migration
 
The future of agile in organizations
The future of agile in organizationsThe future of agile in organizations
The future of agile in organizations
 
IIBA Ottawa Kick-Off Meeting: Change Management with Sandee Vincent
IIBA Ottawa Kick-Off Meeting: Change Management with Sandee VincentIIBA Ottawa Kick-Off Meeting: Change Management with Sandee Vincent
IIBA Ottawa Kick-Off Meeting: Change Management with Sandee Vincent
 
Session 3 - Windows Server 2012 with Jared Thibodeau
Session 3 - Windows Server 2012 with Jared ThibodeauSession 3 - Windows Server 2012 with Jared Thibodeau
Session 3 - Windows Server 2012 with Jared Thibodeau
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

Session 1: Windows 8 with Gerry Tessier

  • 1. www.ctesolutions.com Welcome to CTE Solutions Windows 8 in the Enterprise Training with Impact. 1
  • 2. Introduction Gérald F. Tessier  Senior Trainer at CTE Solutions, Inc.  Training for 16 years  MCITP, MCTS, MCSE 2003/2000/NT, MCSA, MCP+I, MCT, ITIL V3 Foundations, ITIL OSA, ITIL RCV, CTT, Security+, Network+, A+, EIEIO+ 2
  • 3. Windows 8 in the Enterprise 1. Overview of Windows 8 2. Deploying Windows 8 3. Navigating the Windows 8 Interface 4. Securing Windows 8 5. 10 Reasons to Upgrade to Windows 8
  • 4. Part I: Overview of Windows 8  Introducing Windows 8  Windows 8 Editions  Advantages of 64 bit
  • 5. Introducing Windows 8 Windows 8 represents the largest change in the Windows operating system since Windows 95 Key new features: • Start Screen • Cloud integration • Reset and Refresh your PC • Windows To Go • Remote Desktop Services • Hyper-V • Support for multiple form factors • Powershell v3.0
  • 6. Understanding Windows 8 Editions Windows 8 comes in three editions: • Windows 8 • Windows 8 Pro • Windows 8 Enterprise Windows RT is the ARM-specific version of Windows 8 designed for mobile devices that use the ARM processor architecture
  • 7. Understanding Windows 8 Editions (cont.) Windows 8 Enterprise offers the following advantages: o BranchCache o Applocker o DirectAccess o Side-load Metro Apps o Virtualization through RemoteFX o Windows To Go
  • 8. Advantages of 64-bit Windows 8 Versions Advantages of 64-bit processors: • Improved performance • More memory • Improved device support • Improved security Limitation: • Does not support the 16-bit Windows on Windows (WOW) environment
  • 9. Part II: Deploying Windows 8  Hardware Requirements for Installing Windows 8  Determining Device Compatibility and Screen Resolution  Common Application-Compatibility Problems  Methods for Mitigating Common Application- Compatibility Issues  Options for Installing Windows 8  Imaging with MDT 2012 Update 1  Windows 8 to Go
  • 10. Hardware Requirements for Installing Windows 8 Windows 8 minimum recommended hardware requirements: • 1 GHz or faster processor • 1 GB RAM (32-bit) or 2 GB RAM (64-bit) • 16 GB available hard disk space (32-bit) or 20 GB (64-bit) • DirectX 9 graphics device with WDDM 1.0 or higher driver Windows 8 feature-specific requirements: • UEFI-based BIOS for secured boot process • 64-bit processor with second level address translation support • TPM for full BitLocker support
  • 11. Determining Device Compatibility and Screen Resolution Use the Compatibility Center for Windows 8 website to check hardware compatibility • Processor • Memory • Network card • Hard disk Metro-based apps require a screen resolution of 1024x768 or higher
  • 12. Common Application-Compatibility Problems Common application compatibility problems may relate to the following areas: • Setup and installation of applications • User Account Control • Windows Resource Protection • Internet Explorer Protected Mode • 64-bit architecture • Windows Filtering Platform • Operating system version changes • Kernel-mode drivers • Deprecated components
  • 13. Methods for Mitigating Common Application- Compatibility Issues You can use the ACT to determine whether your applications are compatible with Windows 8 Other mitigation methods include: • Verify your application, device, and computer compatibility with a new version of the Windows operating system • Verify a Windows update's compatibility • Become involved in the ACT community and share your risk assessment with other ACT users • Test your web applications and websites for compatibility with new releases and security updates to Internet Explorer
  • 14. Options for Installing Windows 8 Clean installation • Install Windows 8 on a new partition • Replace an existing operating system on a partition Upgrade installation • Replace an existing version of Windows with Windows 8 • All users applications, files, and settings are retained Migration • Move files and settings from an old operating system to Windows 8 • Side-by-side or wipe and load
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. Part III: Navigating the Windows 8 Interface
  • 36. Part III: Navigating the Windows 8 Interface
  • 37. In the news… Microsoft Work Exposes Magnitude of Botnet Threat Microsoft's Security Intelligence Report sheds light on the expanding threat that bots… Researchers Discover Link Between a Series of Trojans A difficult to remove rootkit behind numerous sophisticated attacks, appears to have helped spread yet another
  • 39. Windows for the Enterprise Devices & Enterprise-Grade Experiences Solutions Users Want Love Enterprise Scenarios
  • 40. Microsoft Experience and Credentials Trustworthy Computing SAS-70 Initiative (TwC) Certificati on Malware BillG Protection ISO 27001 Memo Center Certification Microsoft Global FISMA Microsoft Security Security Foundation Certificati Response Center Engineering Services on (MSRC) Center/ (GFS) Security Development Lifecycle
  • 41. Security Landscape Private Cloud Public Cloud APPS On-Premise Online INFORMATION ACCESS ANTI- POLICY RESEARCH SECURE PROTECTIONCONTROL MALWARE MANAGEMENTRESPONSE & DEVELOPMENT DEVICES
  • 42. Microsoft End-to-End Client Protection Protect Against and Protect Sensitive Data Secure Access Manage Threats to Resources Universal Extensible Firmware Interface Trusted Platform Model (TPM) (UEFI) • Maintain software with a patch • Secure data that is at rest with • Manage the full identity lifecycle management solution encryption • Validate user identity with strong • Deliver software that is secure by • Protect data that is in motion authentication design with encryption • Secured and always connected • Operate a malware resistant platform • Protect data that is in use with remote access and applications access controls • Protect resources as • Defend against malware threats environment changes Secured Windows Standard User Windows 7 BitLocker Active Directory Boot Accounts MDOP -BitLocker Administration and Direct Access Measured User Account Control, and Monitoring Network Access Boot AppLocker Office Information Rights Management Protection Protected Modern Applications (IRM) Dynamic Access Control View Defender Office Encrypted File System IE Smart Active Directory Rights Management Screen Services z
  • 43. Microsoft Security Development Lifecycle Educati Proce Accountabili on ss ty Ongoing Process Improvements – 12 month cycle
  • 44. Protection Starts with Patch Management • Setting the industry standard for threat response • Engaging with over 70 “Active Protection” partners • Further reducing the impact of zero-day vulnerabilities • Predictable IT patch cycle • Streamlined update process with WSUS • Integration with System Center 250% Configuration Manager Patch Manage 200% with WSUS 150% 100% 2H06 1H07 2H07 1H08 2H08 1H09 2H09 1H10
  • 45. Protection Starts with Patch Management Patch management is among the top 5 security priorities for 2010 Based on Gartner Survey: Top 10 Security Technology Project Priorities for 2010, Dec 2009 240% The number of enterprises with 220% regular patch Patch Manag with WSUS 200% management has 180% significantly grown 160% ® 140% 120% 100% Microsoft Security Intelligence Report Vol. 9, Oct 2010
  • 46. Establish a managed, • Set a security • Manage security tasks common identity baseline with SCM with System Center infrastructure with • Leverage Microsoft Configuration Active Directory® security guidance for Manager • Easily enforce device compliance • Ensure corporate and user policies with • Customize your desktops comply with Active Directory Group security configuration desired configuration Policies with settings packs and security baseline • Monitor, control, and • Simplify identity, strong authentication, and gain visibility of access management physical and virtual with Forefront Identity Manager and With Forefront® Identity desktop environments Manager (FIM) Active Directory, we have the comprehensive identity and access management solution that we need to support our banking operations.”
  • 47. Securing the Code • Mitigate exploits through the sandboxed Protected View • Securing the Boot Process which allows users to view untrusted files without harming • Securing the Core their computer • Securing Sign-In • Reduce the attack surface by validating file schemas, limiting • Securing while Desktop is in file types, blocking embedded code, and leveraging built-in Use Windows security mechanisms • Securing Access to • Improve the user experience with fewer security decisions that Resources “[With Windows 7 security “We are using SharePointand more need to be made Workspace enhancements], 2010 to expand our security initiatives, instrumental instructions to pre- we will save more than $10 for each of which will help us ensure that our empt helpdesk calls information is protected, correct, and our 16,000 PCs. That equals more than $160,000 in accessible.”
  • 48. Securing the Code •Protect from social • Securing the Boot Process engineering and phishing • Securing the Core •Protect desktop from malicious downloads • Securing Sign-In •Enhance protection based the • Securing while Desktop is in needs per Zone Use •Protect system and IE from • Securing Access to malicious applications Resources “Internet Explorer …is a definite positive step in terms of a protected •Protect from webpage browser” –Neil MacDonald/Gartner, Network World, manipulation (XSS) 6/21/2010
  • 49. •Proactive protection against • Minimize impact of threats application vulnerabilities and •Dynamic updates through cloud exploits with integral service mechanisms developed from the Security Development Lifecycle •Centralized security and firewall policies • Prevent unauthorized •Security compliance alerts, operations by running in tracking, and reporting “standard user” mode using User •Builds on Microsoft industry- Account Control leading anti-malware engine • Protect against network threats with built-in firewall • Restrict applications installation and usage with • Global threat intelligence and real-time Windows AppLocker policies response backed by Microsoft Malware Protection Center
  • 50. Windows BitLocker® • Data extraction • Office Information protects data on hard- through USB devices Rights Management drives with encryption is centrally controlled (IRM) sets boundaries • Data cannot be • Protect data on for sensitive data extracted in the event of removable drives with • Keep documents and loss or theft, complying BitLocker To GoTM email communication with FIPS 140-2 (in encryption to authorized process) • Restrict device types corporate users • Hardware integration and block writes to • Mark content (TPM) prevents access unprotected drives manually or by on a tampered OS or through Group Policies automated inspection another device in Microsoft Exchange • Microsoft BitLocker and SharePoint® Administration and Replaced a third party solution Enforce password • Implemented BitLocker and Monitoring enhancesBitlocker with protection,To Go BitLocker digital provisioning, $100,000 in licensing and saved signatures and limit for all mobile workers monitoring, and key and maintenance data extraction from
  • 51. Establish a managed, • •Add strong authentication with common identity Windows 7 infrastructure with Active •Use Windows 7 Biometric or Directory, enhanced with Smart-card frameworks Forefront Identity Manager to authenticate users at logon, • Create a common, single sign for admin access or drive on across on-premises and encryption cloud services •Simplify Enrollment and end to end lifecycle management of • Manage access to resources PKI with policy controlled groups certificates for both IT and end in Active Directory users Enhance and automate • •Extend remote access identity and access  authentication with PKI  provisioning / deprovisioning  certificates, smart-cards • Empower users with self or RSA One Time Password service tools for group and
  • 52. vides various options for remote access • Enable DirectAccess connectivity for continuous manageability of remote corporate laptops • Apply OS patches, maintain anti-virus signatures, and keep applications updated at all times • Keep configuration and security policies up to date • Set access policy based on device type and health • Validate and remediate remote devices before granting access to corporate resources • Support access from unmanaged PCs and phones • Allow any device with a browser to access internal portals through Unified Access Gateway • Provide asset and compliance reporting with System Center for devices connected via Exchange ActiveSync
  • 53. Manual tagging by content owners • Expression based • Automatic RMS • Automatic Classification access conditions and protection for Office auditing with support documents based on • Application based for user claims, device file tags tagging claims and file tags • Near real time • Central access policies protection soon after targeted based on file the file is tagged tags • Extensibility for non • Access denied Office RMS protectors remediation • Policy staging audits to simulate policy changes in a real environment
  • 54. Modern Security Touch Thinner, New Lighter, Form Faster Factors Sensors Long Battery Life
  • 55. ffective IT investment for desktop security needs
  • 56. Top 10 Reasons to Upgrade to Windows 8 1. UEFI Fast boot 2. Secure Boot 3. Improved Authentication 4. Client Hyper-V 5. Live Performance Feedback 6. Powershell v3.0 7. Windows to GO 8. DirectAccess 9. Unified Experience 10. Who really likes the old start menu? 11. *Bonus: Cloud Integration!