Your SlideShare is downloading. ×
0
Windows 7 by microsoft
Windows 7 by microsoft
Windows 7 by microsoft
Windows 7 by microsoft
Windows 7 by microsoft
Windows 7 by microsoft
Windows 7 by microsoft
Windows 7 by microsoft
Windows 7 by microsoft
Windows 7 by microsoft
Windows 7 by microsoft
Windows 7 by microsoft
Windows 7 by microsoft
Windows 7 by microsoft
Windows 7 by microsoft
Windows 7 by microsoft
Windows 7 by microsoft
Windows 7 by microsoft
Windows 7 by microsoft
Windows 7 by microsoft
Windows 7 by microsoft
Windows 7 by microsoft
Windows 7 by microsoft
Windows 7 by microsoft
Windows 7 by microsoft
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Windows 7 by microsoft

646

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
646
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
14
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Windows 7 Partner Event © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
  • Microsoft Confiential: Preliminary Information: NDA Only
  • Microsoft Confiential: Preliminary Information: NDA Only
  • Microsoft Confiential: Preliminary Information: NDA Only
  • Transcript

    • 1. Microsoft Windows 7 Security Ronen Gottlib, CISSP Information Security Lead Microsoft
    • 2. Enhance Security & Control Protect Users & Infrastructure
        • AppLocker™ (Windows 7 Enterprise) controls what applications run
        • Internet Explorer 8 helps keep users safe online
      Protect Data on PCs & Devices
        • BitLocker To Go™ (Windows 7 Enterprise) protects data on removable drives
        • BitLocker™ simplifies encryptions and key management for all drives
      Build on Windows Vista Security Foundation
        • User Account Control prompts less
        • Security Development Lifecycle for defense in depth
    • 3. Data Protection
        • Protect data on internal and removable drives
        • Mandate the use of encryption with Group Policies
        • Store recovery information in Active Directory for manageability
        • Simplify BitLocker setup and configuration of primary hard drive
      • BitLocker To Go™ (Windows 7 Enterprise)
      • Worldwide Shipments (000s)
      Gartner “Forecast: USB Flash Drives, Worldwide, 2001-2011” 24 September 2007, Joseph Unsworth   Gartner “Dataquest Insight: PC Forecast Analysis, Worldwide, 1H08” 18 April 2008, Mikako Kitagawa, George Shiffler III 
      • +
    • 4. Application Control
        • Eliminate unwanted/unknown applications in your network
        • Enforce application standardization within your organization
        • Easily create and manage flexible rules using Group Policy
      • AppLocker™ (Windows 7 Enterprise)
        • Users can install and run unapproved applications
        • Even standard users can install some types of software
        • Unauthorized applications may:
          • Introduce malware
          • Increase helpdesk calls
          • Reduce user productivity
          • Undermine compliance efforts
    • 5. Advanced Group Policy Management
        • Enable group policy change management
        • Provides granular administrative control
        • Reduce risk of widespread failure
        • Versioning, history & rollback of group policy changes
        • Role-based administration & templates
        • Flexible delegation model
      What it Does Benefits
      • Enhancing group policy through change management
    • 6. Network Access Protection
          • Unprotected network taps within an organization’s buildings
          • Administrators have limited control over the health of systems joining the network
          • Result: hardware/network upgrades and increased operational costs, reduced productivity
      Today’s Challenges Solution: end-to-end, authenticated, tamper-resistant communication
          • Improved isolation using IPSec
          • Network access protection across IPSec, 802.1X, DHCP, VPN
          • Increased manageability
    • 7. Forefront UAG 2010 DirectAccess and RDG Idan Plotnik Security Engineer Forefront MVP
    • 8.
      • Help us to help you to help others …
    • 9. A word on wording
      • In Windows 7 / Windows Server 2008 R2, Terminal Service (TS) was renamed to Remote Desktop Services (RDS)
      • Other terminology changes:
          • Terminal Services Gateway (TSG)  Remote Desktop Gateway (RDG)
          • Terminal Services Server  Remote Desktop Session Host
          • TS Broker  RD Connection Broker
    • 10. How SSLVPN works …
      • RD/TS is published by tunneling its
      • traffic without IAG or any other SSLVPN being
      • able to control the traffic.
      IAG RD/TS Client (MSTSC) RD Session Host (TS Server) HTTPS Tunnel RDP
    • 11. What’s new in UAG
      • In UAG RD/TS client traffic goes over HTTPS.
      • The HTTPS tunnel is terminated at UAG,
      • therefore, we can inspect the traffic.
      • The traffic is then passed to the backend RD
      • Session Host using the RDP protocol.
      UAG + RDG RD/TS Client (MSTSC) RDP over HTTPS RDP RD Session Host (TS Server)
    • 12. New functionality
    • 13. DirectAccess
      • Providing seamless, secure access to enterprise resources from anywhere
    • 14. Always On
      • Always connected
      • No user action required
      • Adapts to changing networks
    • 15. Secure
      • Encrypted by default
      • 2 Factor AuthN
      • Strong Authentication!
        • Computer AuthN
        • User AuthN
      • Granular access control
      • Coexists with existing edge, health, and access policies
    • 16. Manageable
      • Reach out to previously untouchable machines
      • Allows remote clients to process Group Policies
      • Ongoing updates (AV/WSUS etc …) from the internal infrastructure
      • NAP integration for health compliance
      • Consolidate Edge Infrastructure
    • 17. VPN vs. DirectAccess - Value
    • 18. Forefront UAG DirectAccess DirectAccess Client (Windows 7) Internet Native IPv6 6to4 Teredo IP-HTTPS Tunnel over IPv4 UDP, HTTPS, etc. Encrypted IPsec+ESP
    • 19. Enterprise Network Forefront UAG DirectAccess Line of Business Applications No IPsec IPsec Integrity Only (Auth) IPsec Integrity + Encryption Windows Server 2003 Windows Server 2008 Non-Windows Server
    • 20. 3 Deployment Models
    • 21. End-to- Edge encryption
      • No overhead of encryption on application servers
      • Edge enforces machine/user authentication and data encryption
      • Least change from existing edge deployments
      Trusted, compliant, healthy machine Windows 7 client Applications & Data (non-IPsec enabled) DC & DNS (Server 2008 SP2/R2) Forefront UAG DirectAccess IPsec ESP tunnel encryption using machine cert (DC/DNS access) Clear Text traffic from client flows through encrypted tunnel to Corporate network resources IPsec ESP tunnel encryption using UserKerb/Health Cert/Smartcard for broad network access Corporate Network Internet
    • 22. End-to- Edge Encryption + End to End IPsec
      • No overhead of encryption on application servers (just authentication)
      • DirectAccess Edge Encryption combined with End to End IPsec Server and Domain Isolation
      Trusted, compliant, healthy machine Windows 7 client Corporate Network Applications & Data IPsec-enabled IPsec ESP-Null AuthIP Transport Traffic flows through encrypted tunnel to Corporate network resources Forefront UAG DirectAccess IPsec ESP tunnel encryption using UserKerb/Health Cert/Smartcard for broad network access IPsec ESP tunnel encryption using machine cert (DC/DNS access) DC & DNS (Server 2008 SP2/R2) Internet
    • 23. End-To-End IPsec Transport Encryption
      • Thin edge solution using IPsec
      • Denial of Service Protection (DoSP) Service only allows IPSec & ICMP traffic
      • Full End to End IPsec Encryption
      • IP-HTTPS tunnel used for proxy scenarios only
      Trusted, compliant, healthy machine Windows 7 client Corporate Network Applications & Data IPsec-enabled IPsec ESP-encrypted transport to access Corporate network resources Forefront UAG DirectAccess DC & DNS (Server 2008 SP2/R2) Internet
    • 24. IPv6 IPv6 Always On Windows7 IPv4 IPv4 IPv4 Forefront UAG DirectAccess Extend support to IPv4 servers UAG improves adoption and extends access to existing infrastructure Extends access to LOB servers with IPv4 support Access for down level and non Windows clients Enhances scalability and management Simplifies deployment and administration Hardened Edge Solution MANAGED Vista XP UNMANAGED Non Windows PDA DirectAccess SSL VPN UAG provides access for down level and non Windows clients UAG enhances scale and management with integrated LB and array capabilities. UAG uses wizards and tools to simplify deployments and ongoing management. UAG is a hardened edge appliance available in HW and virtual options Windows7
    • 25. DEMO

    ×