SlideShare a Scribd company logo
WINDOWS 7 PRO
                   VS
              WINDOWS 7 ENT
A Presentation on the exceptional differences between the two Operating Systems
Extra Features In WIN 7 Ent
•   BitLocker
•   Bitlocker To Go
•   Applocker
•   Boot from VHD
•   BranchCache
•   DirectAccess
BitLocker
Available on Win 7 Enterprise and Ultimate. It is used in Encrypting the HDD with
128bit AES encryption. It is faster than other AES encryption and has low RAM
requirements since the CBC mode with a 128bit key is used for encryption.
Authentication Mechanism
 • Transparent mode: Uses TPM chip for key storage. Releases the Key to the
   OS loader only if the early bootfile appears to be unmodified. Vulnerable to
   a ‘coldboot’ attack.
 • User Authentication mode: Uses the bootloader. Requires authentication to
   the pre-boot environment in the form of a PIN. Vulnerable to the ‘bootkit’
   attack but not to ‘coldboot’ attack.
 • USB Key mode: Uses a USB dongle containing the startup key. BIOS must
   support portable USB devices at the Pre-boot OS stage. This mode is immune
   to ‘coldboot’ attack.
BitLocker
Recovery Modes
• Recovery Password: A numerical Key protector for recovery purposes.
• Recovery Key: An external Key for recovery purposes.
• Certificate: Adds a certificate-based public key protector for recovery.
The following Combination of Authentication modes are possible and all can be recovered
using the ‘Recovery Key’ method.
• TPM
• TPM+PIN
• TPM+PIN+USB key
• TPM+USB key
• USB Key
Requirements
1. Two NTFS formatted volumes(one for OS and a 100MB min from which the OS boots).
    This can be achived using the DISKPART util or the Bitlocker Drive Preparation Tool.
2. An optional Key can be stored on the AD for recovery purpose and can be used for
    recover using the ‘BitLocker Recovery Password Viewer for AD users’. For server
    versions before 2008 the ‘Schema’ must be updated.
BitLocker
                             Benefits to the Business
•   Good Degree of safety in case of Laptop theft.
•   Integrated with AD directly no extra application or Add-on required.
•   It encrypts more than the OS partition thus ensuring max security of data.
•   Works on Multiboot environments.
•   Flexible configuration as GP can be used.
                                      Limitations
•   Cool boot attack while using it in the TPM mode(transparent operation mode)
•   Only Supported on the NTFS partision and on NT based OS(but BITLOCKER TO GO
    Reader can run on NTFS, FAT 32 or exFAT).
•   Workaround possible without TPM.
•   BitLocker gives the End user local admin Rights. This gives them the opportunity to turn
    off the encryption if desired
AppLocker
This help to prevent the use of Unknown or Unwanted application within the Network.
Helps to boast security and compliance for the organisation. It is a rule based service,
with 3 main rules configurable( Exec rule, Windows Installer rule, Script rule).

                    Applocker Vs Other Solutions
Restriction policies can be applied to the following.
• Specific User or Group.
• Default Rule Action is Deny.
• Audit-only mode possible.
• Wizard to create multiple rules at once.
• Policy import or export.
• Rule Collection available.
• PowerShell Support.
• Custom Error Messages.
AppLocker
                                   Requirement
•   Windows Server 2008 R2. Windows 7 Ult, Windows 7 Ent(Win 7 pro can create rules but
    can’t enforce them.)
•   For GP deployment, at least one computer with the Group Policy Management
    Console(GPMC) or the Remote Server Administration Tools(RSAT) installed to host the
    Applocker rules.
•   Computers to enforce the Applocker rules created.
                                       Rule Conditions
Rules are created either by PUBLISHER, PATH or by FILE HASH.
                                            Benefits
•   Increased security.
•   Cost of Procuring third party apps lock down application eliminated.
Booting from VHD
VHD(Virtual Hard Drive)

                                          Benefits
•   It can be used as a simplified backup mechanism which is also portable.
•   Booting from VHD helps to test new configurations and applications before final role-out.
•   Any Malware infection only affects the VOS and does not spread to the Main OS.
•   Native image deployment using Windows Deployment Service for Workstation/ Server
    redeployment or recovery

                                        Limitations
•   VHD size limited to 2TB
•   EFS/NTFS compression not suported
•   Hibernating not supported.
•   OS can’t be upgraded.
•   Cannot be nested.
•   Can’t be booted from a USB.
BranchCache
Caching contents of files and webservers locally at branch office, increasing the
network responsiveness of centralized applications when accessed remotely.
Modes of Operation
•   Distributed Cache.
•   Hosted Cache.

                                        Benefits
•   Reduced WAN link Utilisation in Branch offices(intranet based HTTP and SMB traffic).
•   Accelerates delivery of encrypted contents(HTTPS and IPSec).
•   Does not require additional equipment at the branch office and can be managed using GP.
•   Caching done by default when round trip lattency time exceeds 80ms.


                                     Limitations
•   Depends on the caching mode(distr requires more processing power from work stations thus
    performance may be affected. Hosted however combats this but requires extra hardware
    investment.
DirectAccess
Enables connection to the office securely through the internet without the need for a
VPN.
                                     Advantages
•   Working outside the office is easier as there is no need for traditional VPN.
•   Remote Management possible(Update deployment and GP settings over the internet).
•   Enhanced Security and Access control.
•   Communicates using IPv6 over IPsec.

More Related Content

What's hot

Deploying Microsoft BitLocker
Deploying Microsoft BitLockerDeploying Microsoft BitLocker
Deploying Microsoft BitLocker
utahmisfit
 
Qh 2010 Presentation
Qh 2010 PresentationQh 2010 Presentation
Qh 2010 Presentationmak_hiro
 
Security
SecuritySecurity
Security
Pooja Talreja
 
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Jan Ketil Skanke
 
Windows vs linuxe
Windows vs linuxeWindows vs linuxe
Windows vs linuxe
Hùssâîn Mîrzã
 
ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3
Irsandi Hasan
 
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
FFRI, Inc.
 
How Endpoint Encryption Works
How Endpoint Encryption WorksHow Endpoint Encryption Works
How Endpoint Encryption Works
Symantec
 
Stuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackStuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attack
Ajinkya Nikam
 
Hardening Database Server
Hardening Database ServerHardening Database Server
Hardening Database Server
Fahri Firdausillah
 
Telehack: May the Command Line Live Forever
Telehack: May the Command Line Live ForeverTelehack: May the Command Line Live Forever
Telehack: May the Command Line Live Forever
Gregory Hanis
 
I Heart Stuxnet
I Heart StuxnetI Heart Stuxnet
I Heart Stuxnet
Gil Megidish
 
ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5
Irsandi Hasan
 
A Stuxnet for Mainframes
A Stuxnet for MainframesA Stuxnet for Mainframes
A Stuxnet for Mainframes
Cheryl Biswas
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9
Javier Arrospide
 
Bitlockerflow
BitlockerflowBitlockerflow
Bitlockerflow
khaihuynhit
 
Mengenal Fitur Keamanan Dasar pada Windows 7
Mengenal Fitur Keamanan Dasar pada Windows 7Mengenal Fitur Keamanan Dasar pada Windows 7
Mengenal Fitur Keamanan Dasar pada Windows 7
Aris Lesmana
 
Taishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun Owens
 

What's hot (20)

Deploying Microsoft BitLocker
Deploying Microsoft BitLockerDeploying Microsoft BitLocker
Deploying Microsoft BitLocker
 
Qh 2010 Presentation
Qh 2010 PresentationQh 2010 Presentation
Qh 2010 Presentation
 
Security
SecuritySecurity
Security
 
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
Windows vs linuxe
Windows vs linuxeWindows vs linuxe
Windows vs linuxe
 
ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3
 
Qualys Threads
Qualys ThreadsQualys Threads
Qualys Threads
 
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
 
How Endpoint Encryption Works
How Endpoint Encryption WorksHow Endpoint Encryption Works
How Endpoint Encryption Works
 
Stuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackStuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attack
 
Hardening Database Server
Hardening Database ServerHardening Database Server
Hardening Database Server
 
Telehack: May the Command Line Live Forever
Telehack: May the Command Line Live ForeverTelehack: May the Command Line Live Forever
Telehack: May the Command Line Live Forever
 
I Heart Stuxnet
I Heart StuxnetI Heart Stuxnet
I Heart Stuxnet
 
ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5
 
A Stuxnet for Mainframes
A Stuxnet for MainframesA Stuxnet for Mainframes
A Stuxnet for Mainframes
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9
 
Bitlockerflow
BitlockerflowBitlockerflow
Bitlockerflow
 
Mengenal Fitur Keamanan Dasar pada Windows 7
Mengenal Fitur Keamanan Dasar pada Windows 7Mengenal Fitur Keamanan Dasar pada Windows 7
Mengenal Fitur Keamanan Dasar pada Windows 7
 
Taishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_Lab
 

Viewers also liked

Windows 7 OS shortcuts
Windows 7 OS shortcutsWindows 7 OS shortcuts
Windows 7 OS shortcuts
247infotech
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Quek Lilian
 
Windows Server 8 Security Improvement
Windows Server 8 Security ImprovementWindows Server 8 Security Improvement
Windows Server 8 Security Improvement
Wong Chon Kit
 
Apostila Informática Básica Windows 7 e Pacote Office
Apostila Informática Básica Windows 7 e Pacote OfficeApostila Informática Básica Windows 7 e Pacote Office
Apostila Informática Básica Windows 7 e Pacote Office
Clayton de Almeida Souza
 
linux security: interact with linux
linux security: interact with linuxlinux security: interact with linux
linux security: interact with linux
Ammar WK
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
Amitesh Bharti
 
12 Crucial Windows Security Skills for 2017
12 Crucial Windows Security Skills for 201712 Crucial Windows Security Skills for 2017
12 Crucial Windows Security Skills for 2017
Paula Januszkiewicz
 
File system security
File system securityFile system security
File system security
AmmAr mobark
 
Sistemi Kompjuterik
Sistemi KompjuterikSistemi Kompjuterik
Sistemi KompjuterikMagribe
 
Linux Security Overview
Linux Security OverviewLinux Security Overview
Linux Security Overview
Kernel TLV
 
Sistemet operative
Sistemet operativeSistemet operative
Sistemet operativeAjla Hasani
 
Sisteme operative
Sisteme operativeSisteme operative
Sisteme operative
Xhelal Bislimi
 
2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentation
ixiademandgen
 

Viewers also liked (14)

Windows 7 OS shortcuts
Windows 7 OS shortcutsWindows 7 OS shortcuts
Windows 7 OS shortcuts
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
Windows Server 8 Security Improvement
Windows Server 8 Security ImprovementWindows Server 8 Security Improvement
Windows Server 8 Security Improvement
 
Apostila Informática Básica Windows 7 e Pacote Office
Apostila Informática Básica Windows 7 e Pacote OfficeApostila Informática Básica Windows 7 e Pacote Office
Apostila Informática Básica Windows 7 e Pacote Office
 
linux security: interact with linux
linux security: interact with linuxlinux security: interact with linux
linux security: interact with linux
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
 
12 Crucial Windows Security Skills for 2017
12 Crucial Windows Security Skills for 201712 Crucial Windows Security Skills for 2017
12 Crucial Windows Security Skills for 2017
 
File system security
File system securityFile system security
File system security
 
Sistemi Kompjuterik
Sistemi KompjuterikSistemi Kompjuterik
Sistemi Kompjuterik
 
Linux Security Overview
Linux Security OverviewLinux Security Overview
Linux Security Overview
 
Sistemet operative
Sistemet operativeSistemet operative
Sistemet operative
 
Sisteme operative
Sisteme operativeSisteme operative
Sisteme operative
 
Pensamientos Filosóficos
Pensamientos FilosóficosPensamientos Filosóficos
Pensamientos Filosóficos
 
2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentation
 

Similar to Windows 7 professional Vs Windows 7 enterprise

CSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami LaihoCSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami Laiho
NCCOMMS
 
CSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoCSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami Laiho
NCCOMMS
 
eFolder Expert Series Webinar - BDR Do's and Dont's: Featuring Andrew Bensing...
eFolder Expert Series Webinar - BDR Do's and Dont's: Featuring Andrew Bensing...eFolder Expert Series Webinar - BDR Do's and Dont's: Featuring Andrew Bensing...
eFolder Expert Series Webinar - BDR Do's and Dont's: Featuring Andrew Bensing...
eFolder
 
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hacked
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hackedDEF CON 27 - XIAOHUIHUI - all the 4g modules could be hacked
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hacked
Felipe Prado
 
Hypervisor and VDI security
Hypervisor and VDI securityHypervisor and VDI security
Hypervisor and VDI securityDenis Gundarev
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Qualcomm Developer Network
 
E2E What\'s New In XenApp 6.5
E2E What\'s New In XenApp 6.5E2E What\'s New In XenApp 6.5
E2E What\'s New In XenApp 6.5sthirion
 
Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1
solarisyougood
 
VMware End-User-Computing Best Practices Poster
VMware End-User-Computing Best Practices PosterVMware End-User-Computing Best Practices Poster
VMware End-User-Computing Best Practices Poster
VMware Academy
 
Trusted Computing security _platform.ppt
Trusted Computing security _platform.pptTrusted Computing security _platform.ppt
Trusted Computing security _platform.ppt
naghamallella
 
Managing bitlocker with MBAM
Managing bitlocker with MBAMManaging bitlocker with MBAM
Managing bitlocker with MBAM
Olav Tvedt
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
Sophos Benelux
 
Mikrotik
MikrotikMikrotik
Mikrotikhzcom
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
Mark John Lado, MIT
 
Platform Security Summit 18: Xen Security Weather Report 2018
Platform Security Summit 18: Xen Security Weather Report 2018Platform Security Summit 18: Xen Security Weather Report 2018
Platform Security Summit 18: Xen Security Weather Report 2018
The Linux Foundation
 
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Andrejs Prokopjevs
 
Introduction to chrome os
Introduction to chrome osIntroduction to chrome os
Introduction to chrome os
Indrajit Gohokar
 
BAS004-1_伺服器硬體基礎_v181026
BAS004-1_伺服器硬體基礎_v181026BAS004-1_伺服器硬體基礎_v181026
BAS004-1_伺服器硬體基礎_v181026
rwp99346
 
Frokost seminar windows 8 februar 2013
Frokost seminar   windows 8 februar 2013Frokost seminar   windows 8 februar 2013
Frokost seminar windows 8 februar 2013Olav Tvedt
 

Similar to Windows 7 professional Vs Windows 7 enterprise (20)

CSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami LaihoCSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami Laiho
 
CSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoCSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami Laiho
 
eFolder Expert Series Webinar - BDR Do's and Dont's: Featuring Andrew Bensing...
eFolder Expert Series Webinar - BDR Do's and Dont's: Featuring Andrew Bensing...eFolder Expert Series Webinar - BDR Do's and Dont's: Featuring Andrew Bensing...
eFolder Expert Series Webinar - BDR Do's and Dont's: Featuring Andrew Bensing...
 
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hacked
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hackedDEF CON 27 - XIAOHUIHUI - all the 4g modules could be hacked
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hacked
 
Hypervisor and VDI security
Hypervisor and VDI securityHypervisor and VDI security
Hypervisor and VDI security
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
 
E2E What\'s New In XenApp 6.5
E2E What\'s New In XenApp 6.5E2E What\'s New In XenApp 6.5
E2E What\'s New In XenApp 6.5
 
Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1
 
VMware End-User-Computing Best Practices Poster
VMware End-User-Computing Best Practices PosterVMware End-User-Computing Best Practices Poster
VMware End-User-Computing Best Practices Poster
 
Trusted Computing security _platform.ppt
Trusted Computing security _platform.pptTrusted Computing security _platform.ppt
Trusted Computing security _platform.ppt
 
Managing bitlocker with MBAM
Managing bitlocker with MBAMManaging bitlocker with MBAM
Managing bitlocker with MBAM
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
Mikrotik
MikrotikMikrotik
Mikrotik
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
 
Platform Security Summit 18: Xen Security Weather Report 2018
Platform Security Summit 18: Xen Security Weather Report 2018Platform Security Summit 18: Xen Security Weather Report 2018
Platform Security Summit 18: Xen Security Weather Report 2018
 
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
 
Introduction to chrome os
Introduction to chrome osIntroduction to chrome os
Introduction to chrome os
 
W8 client management
W8 client managementW8 client management
W8 client management
 
BAS004-1_伺服器硬體基礎_v181026
BAS004-1_伺服器硬體基礎_v181026BAS004-1_伺服器硬體基礎_v181026
BAS004-1_伺服器硬體基礎_v181026
 
Frokost seminar windows 8 februar 2013
Frokost seminar   windows 8 februar 2013Frokost seminar   windows 8 februar 2013
Frokost seminar windows 8 februar 2013
 

Recently uploaded

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 

Recently uploaded (20)

The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 

Windows 7 professional Vs Windows 7 enterprise

  • 1. WINDOWS 7 PRO VS WINDOWS 7 ENT A Presentation on the exceptional differences between the two Operating Systems
  • 2. Extra Features In WIN 7 Ent • BitLocker • Bitlocker To Go • Applocker • Boot from VHD • BranchCache • DirectAccess
  • 3. BitLocker Available on Win 7 Enterprise and Ultimate. It is used in Encrypting the HDD with 128bit AES encryption. It is faster than other AES encryption and has low RAM requirements since the CBC mode with a 128bit key is used for encryption. Authentication Mechanism • Transparent mode: Uses TPM chip for key storage. Releases the Key to the OS loader only if the early bootfile appears to be unmodified. Vulnerable to a ‘coldboot’ attack. • User Authentication mode: Uses the bootloader. Requires authentication to the pre-boot environment in the form of a PIN. Vulnerable to the ‘bootkit’ attack but not to ‘coldboot’ attack. • USB Key mode: Uses a USB dongle containing the startup key. BIOS must support portable USB devices at the Pre-boot OS stage. This mode is immune to ‘coldboot’ attack.
  • 4. BitLocker Recovery Modes • Recovery Password: A numerical Key protector for recovery purposes. • Recovery Key: An external Key for recovery purposes. • Certificate: Adds a certificate-based public key protector for recovery. The following Combination of Authentication modes are possible and all can be recovered using the ‘Recovery Key’ method. • TPM • TPM+PIN • TPM+PIN+USB key • TPM+USB key • USB Key Requirements 1. Two NTFS formatted volumes(one for OS and a 100MB min from which the OS boots). This can be achived using the DISKPART util or the Bitlocker Drive Preparation Tool. 2. An optional Key can be stored on the AD for recovery purpose and can be used for recover using the ‘BitLocker Recovery Password Viewer for AD users’. For server versions before 2008 the ‘Schema’ must be updated.
  • 5. BitLocker Benefits to the Business • Good Degree of safety in case of Laptop theft. • Integrated with AD directly no extra application or Add-on required. • It encrypts more than the OS partition thus ensuring max security of data. • Works on Multiboot environments. • Flexible configuration as GP can be used. Limitations • Cool boot attack while using it in the TPM mode(transparent operation mode) • Only Supported on the NTFS partision and on NT based OS(but BITLOCKER TO GO Reader can run on NTFS, FAT 32 or exFAT). • Workaround possible without TPM. • BitLocker gives the End user local admin Rights. This gives them the opportunity to turn off the encryption if desired
  • 6. AppLocker This help to prevent the use of Unknown or Unwanted application within the Network. Helps to boast security and compliance for the organisation. It is a rule based service, with 3 main rules configurable( Exec rule, Windows Installer rule, Script rule). Applocker Vs Other Solutions Restriction policies can be applied to the following. • Specific User or Group. • Default Rule Action is Deny. • Audit-only mode possible. • Wizard to create multiple rules at once. • Policy import or export. • Rule Collection available. • PowerShell Support. • Custom Error Messages.
  • 7. AppLocker Requirement • Windows Server 2008 R2. Windows 7 Ult, Windows 7 Ent(Win 7 pro can create rules but can’t enforce them.) • For GP deployment, at least one computer with the Group Policy Management Console(GPMC) or the Remote Server Administration Tools(RSAT) installed to host the Applocker rules. • Computers to enforce the Applocker rules created. Rule Conditions Rules are created either by PUBLISHER, PATH or by FILE HASH. Benefits • Increased security. • Cost of Procuring third party apps lock down application eliminated.
  • 8. Booting from VHD VHD(Virtual Hard Drive) Benefits • It can be used as a simplified backup mechanism which is also portable. • Booting from VHD helps to test new configurations and applications before final role-out. • Any Malware infection only affects the VOS and does not spread to the Main OS. • Native image deployment using Windows Deployment Service for Workstation/ Server redeployment or recovery Limitations • VHD size limited to 2TB • EFS/NTFS compression not suported • Hibernating not supported. • OS can’t be upgraded. • Cannot be nested. • Can’t be booted from a USB.
  • 9. BranchCache Caching contents of files and webservers locally at branch office, increasing the network responsiveness of centralized applications when accessed remotely. Modes of Operation • Distributed Cache. • Hosted Cache. Benefits • Reduced WAN link Utilisation in Branch offices(intranet based HTTP and SMB traffic). • Accelerates delivery of encrypted contents(HTTPS and IPSec). • Does not require additional equipment at the branch office and can be managed using GP. • Caching done by default when round trip lattency time exceeds 80ms. Limitations • Depends on the caching mode(distr requires more processing power from work stations thus performance may be affected. Hosted however combats this but requires extra hardware investment.
  • 10. DirectAccess Enables connection to the office securely through the internet without the need for a VPN. Advantages • Working outside the office is easier as there is no need for traditional VPN. • Remote Management possible(Update deployment and GP settings over the internet). • Enhanced Security and Access control. • Communicates using IPv6 over IPsec.