Windows 7 Enhanced Security And Control

1,525 views

Published on

This is the Windows 7 launch IT Pro track session on Enhanced Security and Control.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,525
On SlideShare
0
From Embeds
0
Number of Embeds
9
Actions
Shares
0
Downloads
153
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Windows 7 Enhanced Security And Control

  1. 1. Windows® 7 Enhanced Security and Control<br />Presenter name<br />Title<br />date<br />
  2. 2. Addressing Security Challenges and Solutions <br />Protecting Users on their Desktops and Online<br />Extending Data Protection to Laptops and Removable Media<br />Agenda<br />
  3. 3. IT Security Challenges<br />Business<br />Infrastructure<br />Users<br /><ul><li>Flexible work styles
  4. 4. Digital natives
  5. 5. Cost versus agility
  6. 6. Compliance
  7. 7. Anywhere access
  8. 8. Desktop control</li></li></ul><li>WindowsOptimized DesktopEnhanced Security and Control with Windows 7<br />Manage risks through enhanced security and control<br />Reduce costs by streamlining PC management<br />Make peopleproductive anywhere<br />Enable more secure Web browsing<br />Protect desktop andmobile resources<br />Enforce compliance<br />• User Account Control<br />• AppLocker™<br />• Internet Explorer® 8<br />• BitLocker™<br />• BitLocker To Go™<br />
  9. 9. ProtectDataProtect Data from Unauthorized Viewing<br />Active Directory® Rights Management Services (RMS)<br /><ul><li>Policy definition and enforcement
  10. 10. Protection for information wherever it travels
  11. 11. Integrated RMS client</li></ul>BitLocker and BitLocker To Go<br /><ul><li>Ease of configuration and deployment
  12. 12. Ability to share data with coworkers, clients, partners, and others
  13. 13. Support for compliance and data security</li></ul>Encrypting File System (EFS)<br /><ul><li>User-based file and folder encryption
  14. 14. Ability to store EFS keys on a smart card</li></li></ul><li>BitLocker and BitLocker To Go<br />Increased Data Protection<br />Extend BitLocker drive encryption to removable devices<br />Create group policies to mandate the use of encryption and block unencrypted drives<br />Simplify BitLocker setup and configuration of primary hard drive<br />+<br />
  15. 15. BitLocker To Go<br />Overview<br />demo<br />
  16. 16. Internet Explorer 8 Security<br />Freedom from Intrusion<br />Protection from Harm<br />Control of Information<br /><ul><li>Safeguards against browser and Web server exploits
  17. 17. Protection from deceptive web sites, malicious code, online fraud, identity theft
  18. 18. Choice and control
  19. 19. Clear notice of information use—provide only what is needed
  20. 20. Limitation of social engineering and exploits
  21. 21. Reduction of unwanted communications</li></li></ul><li><ul><li>Introduction of UAC
  22. 22. All users, including administrators, run as standard user by default
  23. 23. Administrators use full privilege only for administrative tasks or applications
  24. 24. Ecosystem is influenced to write software requiring no admin rights
  25. 25. Challenges
  26. 26. User provides explicit consent
  27. 27. Disabling UAC removes protections
  28. 28. Simplified UAC
  29. 29. Reduce number of applications that require elevation
  30. 30. Re-factor applications into elevated and non-elevated pieces
  31. 31. Provide flexible, prompt behavior
  32. 32. Customer Value
  33. 33. Standard users can do more
  34. 34. Administrators see fewer UAC elevation prompts</li></ul>User Account Control<br />Windows Vista<br />Windows 7<br />
  35. 35. AppLocker<br />Challenges<br />Users can install and run non-standard applications<br />Even standard users can install some types of software<br />Solution<br />Eliminate unwanted, unknown applications in your network<br />Enforce application standardization within your organization<br />Easily create and manage flexible rules using Group Policy<br />
  36. 36. AppLocker<br />Overview<br />demo<br />
  37. 37. Session Summary<br />Provide a fundamentally secure platform<br />Protect desktop and mobile resources<br />Provide more secure Web browsing<br />Enforce compliance<br />
  38. 38. Learn More About Windows 7<br />Community Resources<br />Technical Resources<br />Get Hands on Training<br /><ul><li>Windows Team Blog
  39. 39. Talking About Windows
  40. 40. Windows Client Forums
  41. 41. The New Efficiency Virtual Launch Experience
  42. 42. Windows7 Springboard
  43. 43. Windows 7 Webcasts and Podcasts </li></ul>www.thenewefficiency.com<br />www.microsoft.com/springboard<br />http://go.microsoft.com/?linkid=9681312<br /><ul><li>Training Offers—Exclusive for Launch Attendees </li></ul>www.microsoft.com/learning/careeroffers<br />www.windowsteamblog.com<br />www.talkingaboutwindows.com<br />http://go.microsoft.com/?linkid=9681314.5<br />
  44. 44. © 2009 Microsoft Corporation. All rights reserved. <br />The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.<br />

×