Gradution Project

395 views
369 views

Published on

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
395
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Title: Microsoft’s Promises to ITTalking Points:Amplify the Impact of your People??[BUILD 1]Manage Complexity, Achieve Agility??[BUILD 2]Protect Information, Control Access??[BUILD 3]Advance the Business with IT Solutions??
  • Title: Microsoft’s Promises to ITTalking Points:Amplify the Impact of your People??[BUILD 1]Manage Complexity, Achieve Agility??[BUILD 2]Protect Information, Control Access??[BUILD 3]Advance the Business with IT Solutions??
  • Organizations face a confluence of factors that is driving the explosion of data.Data TypesThe proliferation of new data type is contributing to the explosion of data. Whether it is Digitization of existing information or sensor information like RFID, data is exploding. For Example, a patient going to get a MRI or CAT scan now generates 100’s of images along with his/her demographic or insurance information. Organizations need to manage this information holistically. Another Example is in the retail pace with the proliferation of RFID tags throughout the enterprise and getting slapped on every palette that a company may ship. Form FactorsWith the data growing, users want to consume their data where they want it – this may on their mobile devices or on the tools they use every day. Proliferation of smartphones has raised expectations that users on the road need to be able to consume the information from applications similar to their usage of e-mail. RegulationsBoth of these factors are balanced and compounded by increasing regulations. SOX, BASEL II, and HIPAA require organizations to store data more securely, for longer periods of time and with higher levels of privacy. InnovationsHW industry has helped lower the cost of storing this data but the management of this data explosion has always been a key area of focus for SQL Server.
  • Title: Network Access ProtectionTalking Points:What is Network Access Protection?One of the most time-consuming challenges that administrators face is ensuring that computers that connect to the private network are up to date and meet health policy requirements. Network Access Protection helps administrators enforce compliance with health policies for network access or communication. Developers and administrators can create solutions for validating computers that connect to their networks, can provide needed updates or access to needed resources (called health update resources), and can limit the access of noncompliant computers. Network Access Protection does not prevent an authorized user with a compliant computer from uploading a malicious program to the network or engaging in other inappropriate behavior. Network Access Protection has three important and distinct aspects: [BUILD 1] Health Policy Validation: When a user attempts to connect to the network, the computer’s health state is validated against the health policies as defined by the administrator. Administrators can then choose what to do if a computer is not compliant. In a restricted access environment, computers that comply with the health policies are allowed unlimited access to the network, but computers that do not comply with health policies or that are not compatible with Network Access Protection have their access limited to a restricted network.[BUILD 2] Health Policy Compliance: Administrators can help ensure compliance with health policies by choosing to automatically update noncompliant computers [BUILD 3] Ability to Provide Limited Access: Administrators can protect network assets by limiting the access of computers that do not comply with health policy requirements. Non-compliant computers will have their access limited as defined by the administrator. Network access limits can be based on a specific amount of time or whether the network access is limited to a restricted network, to a single resource, or to no internal resources at all. [BUILD 4] Enhanced Security: Network Access Protection for Windows Server 200x helps administrators enforce compliance with health policies for network access or communication. Network Access Protection verifies that all communications are authenticated, authorized and healthy. Administrators can use NAP for DHCP, VPN, IPsec, and 802.1x to set the security level that meets the needs of their organization. IT professionals can set policy-based access controls to define access to their systems. [BUILD 5] Increased Business Value: Network Access Protection helps extend the existing investments in Microsoft and third party infrastructure. It also preserves user productivity while protecting the system. The development of Network Access Protection is based on a broad industry partnership. [BUILD 6] Cisco and Microsoft Integration Story: Cisco and Microsoft worked on a Joint Architecture for NAC-NAP Interoperability. The new security architecture will enable customers and partners to deploy interoperable Cisco Network Admission Control and Microsoft Network Access Protection.In addition, the two companies have revealed a general road map for bringing Cisco NAC and Microsoft NAP interoperability to market, including a limited beta program set to start later this calendar year. Customers will be able to start deploying the Cisco NAC-Microsoft NAP interoperable solution once Windows Server 200x is available. Cisco and Microsoft have cross-licensed the Cisco NAC and Microsoft NAP protocols to help ensure interoperability and to enable both companies to respond to future market and customer requirements.
  • Title: Key Pillars & Features OverviewTalking Points:Microsoft Windows Server 2008, with built-in web and virtualization technologies, enables you to increase the reliability and flexibility of your server infrastructure. New virtualization tools, web resources, and security enhancements help you save time, reduce costs, and provide a platform for a dynamic and optimized datacenter. Powerful new tools like IIS7, Windows Server Manager, and Windows PowerShell, allow you to have more control over your servers and streamline web, configuration, and management tasks. Advanced security and reliability enhancements like Network Access Protection and the Read-Only Domain Controller harden the operating system and protect your server environment to ensure you have a solid foundation on which to build your business.[BUILD 1]ManagementServer Manager – Role-based configuration, management, and reportingWindows PowerShell™ – Command shell and scripting language for task automationWindows Deployment Services – Bare metal remote installation of Operating Systems such as Windows Vista[BUILD 2]ReliabilityServer Core – Minimal installation option for better reliability and securityNext Generation Networking – New TCP/IP stack for improved scalability and performanceHigh Availability Clustering[BUILD 3]WebInternet Information Services (IIS) 7.0Efficient management and deployment toolsEnhanced reliability, security, and failure recoveryCustomizable platform with .NET extensibility Windows SharePoint Services Windows Media ServicesAdvanced streaming experience with caching and proxy plug-ins[BUILD 4]VirtualizationWindows Server VirtualizationHypervisor-based platform for increased reliabilityHigh availability through Failover ClusteringResource optimization with server consolidation Terminal Services Remote App™Access and run remote applications locally with presentation virtualization Terminal Services Gateway[BUILD 5]SecurityNetwork Access Protection (NAP)Health validation and compliance checking for client devices Read-Only Domain ControllerIncreased security and delegated management for branch offices Federated Rights Management
  • Organizations face a confluence of factors that is driving the explosion of data.Data TypesThe proliferation of new data type is contributing to the explosion of data. Whether it is Digitization of existing information or sensor information like RFID, data is exploding. For Example, a patient going to get a MRI or CAT scan now generates 100’s of images along with his/her demographic or insurance information. Organizations need to manage this information holistically. Another Example is in the retail pace with the proliferation of RFID tags throughout the enterprise and getting slapped on every palette that a company may ship. Form FactorsWith the data growing, users want to consume their data where they want it – this may on their mobile devices or on the tools they use every day. Proliferation of smartphones has raised expectations that users on the road need to be able to consume the information from applications similar to their usage of e-mail. RegulationsBoth of these factors are balanced and compounded by increasing regulations. SOX, BASEL II, and HIPAA require organizations to store data more securely, for longer periods of time and with higher levels of privacy. InnovationsHW industry has helped lower the cost of storing this data but the management of this data explosion has always been a key area of focus for SQL Server.
  • Title: Scalable Networking Roadmap Talking Points:Let’s start by talking about Scalable Networking Roadmap and what scalable networking is[BUILD 1] We are at the stage of networking where the applications on the network are ever increasing.The bandwidth is increasing, the number of users on the network has started to increaseacross office networks, branch networks, WANs, LANsThe number of access mechanisms on the network are increasing. You have wide access, wireless access, VPN access, Terminal Services access. So, the challenges on the network for an IT administrator is ever increasing.And the requirements of faster access to information and also enabling a rich end user experience is becoming more and more omnipresent. Having the ability to cost effectively scale ideal solutions is becoming very critical for IT Admins and IT professionals.If they are balancing these business critical demands with the capabilities of their existing IT infrastructure investments, they face lots of challenges like increasing processor roles because of high speeds and high packet processing capabilities on the network. Significant amounts of CPUs , memory and bandwidth can be consumed. This is a huge bottleneckThere’s a lack of effective scaling on the network, there are memory, overhead and latency issues on the network, costly trade offs to improve performance.So there are a lot of issues that an IT Admin would face on the network.With Windows Server 2008,we’ve tried to tackle most of those issues by providing various aspects. Various built in capabilities as a solution.One of these solutions is TCP Chimney Offload, which basically provides seamless integrated support for the network adapters with TCP offload enginesThere’s also something called Receive-Side Scaling (RSS) which dynamically balances inbound network connections to share traffic load across multiple processorsThe architectural innovations that are provided in the scalable networking pack basically optimizes your server performance and your network throughput and also realize the advantages of high speed networks.So, when you combine this with a compatible network adapter along with the scalable networking pack can help you to remove existing operating system bottlenecks such as CPU, overhead or memory bandwidth related issues or other network packet processing issues.Generally, even within Microsoft we have noticed that overhead is reached from 20% to as high as 100% when using the scalable networking pack.In Windows Server 2008, we will also be integrating the scalable networking pack with the new TCP/IP stack.
  • Title: Scalable Networking Roadmap Talking Points:Let’s start by talking about Scalable Networking Roadmap and what scalable networking is[BUILD 1] We are at the stage of networking where the applications on the network are ever increasing.The bandwidth is increasing, the number of users on the network has started to increaseacross office networks, branch networks, WANs, LANsThe number of access mechanisms on the network are increasing. You have wide access, wireless access, VPN access, Terminal Services access. So, the challenges on the network for an IT administrator is ever increasing.And the requirements of faster access to information and also enabling a rich end user experience is becoming more and more omnipresent. Having the ability to cost effectively scale ideal solutions is becoming very critical for IT Admins and IT professionals.If they are balancing these business critical demands with the capabilities of their existing IT infrastructure investments, they face lots of challenges like increasing processor roles because of high speeds and high packet processing capabilities on the network. Significant amounts of CPUs , memory and bandwidth can be consumed. This is a huge bottleneckThere’s a lack of effective scaling on the network, there are memory, overhead and latency issues on the network, costly trade offs to improve performance.So there are a lot of issues that an IT Admin would face on the network.With Windows Server 2008,we’ve tried to tackle most of those issues by providing various aspects. Various built in capabilities as a solution.One of these solutions is TCP Chimney Offload, which basically provides seamless integrated support for the network adapters with TCP offload enginesThere’s also something called Receive-Side Scaling (RSS) which dynamically balances inbound network connections to share traffic load across multiple processorsThe architectural innovations that are provided in the scalable networking pack basically optimizes your server performance and your network throughput and also realize the advantages of high speed networks.So, when you combine this with a compatible network adapter along with the scalable networking pack can help you to remove existing operating system bottlenecks such as CPU, overhead or memory bandwidth related issues or other network packet processing issues.Generally, even within Microsoft we have noticed that overhead is reached from 20% to as high as 100% when using the scalable networking pack.In Windows Server 2008, we will also be integrating the scalable networking pack with the new TCP/IP stack.
  • Gradution Project

    1. 1. Implementing Network <br />Security Mechanisms<br />Cisco Router Security Strategies<br />The Four Planes Security Mechanisms<br />Firewalls<br />Intrusion Detection Systems<br />Cisco<br />Windows Server Security<br />IPSec and Certificate<br />User Permissions<br />Group Policy<br />ISA<br />Microsoft<br />Wireless Security Mechanisms<br />Encryption<br />Mutual Authentication<br />Segmentation<br />Wi-Fi<br />
    2. 2. Network Security Basics<br />1.Secure: Firewall, Encryption, <br />Authentication<br />4.Manage and Improve<br />Corporate security policy<br />2.Monitor:<br />Intrusion Detection<br />(NetRanger)<br />3.Test:<br />Vulnerability Scanning<br />
    3. 3. Router Security Strategies<br />1.Data Plane Security Mechanisms<br />2.Control Plane Security Mechanisms<br />3.ManagementPlane Security Mechanisms<br />4.Service Plane Security Mechanisms<br />
    4. 4. The Placement of Security Planes<br />Development of connected systemsremains costly and frustrating <br />
    5. 5.
    6. 6. Router Security Strategies<br />Management Plane<br />Service Plane<br />Data Plane <br />Control Plane<br />Neighbor authentication (MD5)<br />Disabling unnecessary services:<br />CDP<br />HTTP<br />DNS<br />Configuration auto-loading<br />Interface ACL<br />Unicast RPF<br />VPN:<br />Confidentiality of information<br />Integrity of data<br />Authentication of users<br />Password security<br />Disabling idle user sessions<br />Secure IOS file systems<br />AutoSecure<br />Network support and managed services<br />
    7. 7. MCSE<br />
    8. 8. Implementing Windows Server Security<br /><ul><li>Centralized User/Group authentication.
    9. 9. Centralized security.
    10. 10. Searchable database of resources.
    11. 11. Scalability.</li></li></ul><li>SERVERS<br /><ul><li>DNS Server
    12. 12. DHCP & Relay agent Server
    13. 13. FTP Server
    14. 14. VPN Server
    15. 15. WINS Server
    16. 16. ISA Server</li></li></ul><li>SIMPLE SERVERS EXPLAINATION<br />DNS infrastructure<br />DHCP<br />FTP Server<br />DHCP reduces the complexity and amount of administrative work by using automatic TCP/IP configuration <br />A scope is a range of valid IP addresses that are available for lease or assignment to client computers on a particular subnet.<br /><ul><li>Managers group.
    17. 17. Doctors group.
    18. 18. Secretary group.
    19. 19. Student group.
    20. 20. Workers group.</li></ul>Resolving Name :IP addresses are more difficult for users to work with than names, but they are necessary for TCP/IP<br />A query is a request for name resolution to a DNS server<br />ISA Server<br />VPN Server<br /><ul><li>Control all trafic coming from internet to domain from domain to internet.
    21. 21. Manage the VPN clients.</li></ul>Allow clients to log into the domain through the internet connection from a remote location<br />Built on Microsoft Server Technology<br />
    22. 22. Managing to access resources in the network Using user permissions<br /> Permissions are:<br />defining the type of access granted to a user, group, or computer for an object<br /><ul><li>Permissions are cumulative
    23. 23. Deny permissions override all other permissions
    24. 24. Object owners can always change permissions
    25. 25. Retrieving effective permissions</li></li></ul><li>Implementing Group Policy <br /><ul><li>With group policy we can control of how can users in the whole domain can work on their computers and their privilege on their computers.
    26. 26. Helps to prevent from software damage by controlling the user applications
    27. 27. With group policy we can deploy software to all user computers in one time and very easy way.</li></li></ul><li> Microsoft ISA Server 2004<br />-Overview of Microsoft ISA Server 2004 <br />-Versions of Microsoft ISA Server<br />ESG considers Microsoft to be years ahead of Oracle and MySQL in producing secure and reliable database products. <br />
    28. 28. Connecting to the Internet<br />Users<br />Access Rule Elements<br />Rule Action<br />Rule Source & <br />Destination<br />Protocols<br />
    29. 29. Caching with ISA Server<br /><ul><li>Overview of Caching
    30. 30. Configuring Cache Rule
    31. 31. HTTP Caching
    32. 32. FTP Caching</li></li></ul><li>Monitoring and Reporting<br />Dashboard: <br />Sessions<br />Services<br />Alerts<br /> Reports<br />Logging<br />
    33. 33. FTP Server<br />Types of FTP Permissions:<br />1.Standard permissions<br />2. Special permissions<br />FTP Server: <br />Responsible for exchange files and folders and controlled it in the network .<br />
    34. 34. What Are Shared Folders<br /><ul><li>A shared folder:
    35. 35. Is afolder that is Published to all user in the network .
    36. 36. Copy a shared folder
    37. 37. The original shared folder is still shared, but the copy of the folder is not shared
    38. 38. Move a shared folder
    39. 39. The folder is no longer shared
    40. 40. Hide a shared folder
    41. 41. Include a $ can access a hidden shared folder
    42. 42. Userscan access a hidden shared folder by typing the</li></ul>UNC of the folder .<br />
    43. 43. Managing Access to Shared Folders<br />Permission Read: View data in files and attributes and run program files.<br />Permission Change: Add files and subfolders and Change data in files and delete subfolders and files.<br />Full control: Includesall Read and Change permissions & Enables you to change NTFS files and folders permissions<br />
    44. 44. Wireless<br />
    45. 45. Standards Organizations Overview<br />International Organization for Standardization<br />Wi-Fi Alliance<br />Institute of Electrical and Electronics Engineers<br />International Telecommunication Union Radio communication Sector<br />Federal Communications Commission<br />Standards Organizations<br />ESG considers Microsoft to be years ahead of Oracle and MySQL in producing secure and reliable database products. <br />
    46. 46. Wireless Wide Area Network (WWAN)<br />Wireless Personal Area Network (WPAN)<br />Wireless LAN Topologies<br />Wireless Metropolitan Area Network (WMAN)<br />Wireless Local Area Network (WLAN)<br />
    47. 47. 802.11 Topologies<br />Access Point<br />Client Station<br />Distribution System (DS)<br />Wireless Distribution System (WDS)<br />Service Set Identifier (SSID)<br />Basic Service Set (BSS)<br />
    48. 48. 802.11 Topologies<br />Basic Service Set Identifier (BSSID)<br />Independent Basic Service Set (IBSS)<br />Continue<br />Basic Service Area (BSA)<br />Extended Service Set (ESS)<br />
    49. 49. Wireless Devices<br />Radio Card Formats<br />
    50. 50. Wireless Network Security Architecture<br />Encryption<br />Mutual authentication<br />
    51. 51. Wireless Attacks , Intrusion Monitoring ,and Policy<br />Rogue Access Point<br />Peer-to-Peer Attacks<br />Encryption Cracking<br />Denial of Service (DoS)<br />
    52. 52. Wireless Security<br />WEP<br />WPA<br />WPA2/802.11i<br />Provide weak security<br />Was a fast solution implemented by the Wi-Fi vendors to overcome the WEP security problem<br />Standard security mechanism applied by the IEEE 802.11 group.<br />WPA2 is a subset of the abilities of IEEE 802.11i.<br />USES 802.1x for authentication.<br />Authenticate Uses via radius server. <br />4 Way hand shaking for key generation.<br />AES for encryption .<br />

    ×