SlideShare a Scribd company logo
Windows Server 8 Security
Wong Chon Kit
(CISSP, RHCT, C|EH, E|CSA,MCSA, MCSE,MCTIP Enterprise   Contribution from Noel Teng
Administrator , VCP)
Agenda:
   Key IT Security Issues In 2011
   What you going to be expected from the
    developer preview version
    • Improving usability
    • Improving security enhancement & features
IT security incidents around the world
       Citigroup hackers made $2.7 million from about 3,400 accounts and the breach cost
   1
       $77 million – networkworld.com

   2
       Japanese electronics giant Sony has reported a loss of $3.1bn (£1.9bn) for the year
       to 31 March. – bbc.co.uk

   3
       Lockheed Martin – one of the world’s biggest military and aerospace companies
       and Pentagon's top supplier – nationalcybersecurity.com


   4   (IMF) has reportedly been hit with and potentially puts sensitive, confidential data
       about national economies at risk of exposure – computerworld.com
Fundamental Tradeoff
                        Secure




          You get to pick any two!
                                     Cheap
 Usable
Enhanced Security Features
 • Bit locker
 • Windows patch management
 • DHCP Failover
BitLocker
 1     Zero Cost provisioning & protection against theft


 2
       Improved performance and encrypt hard drive base on the HDD
       usage

Windows Update Service
 1     Part of the Windows Server 8


http://www.microsoft.com/download/en/details.aspx?DisplayLang=en&id=6416
Demo
•   Enable Bitlocker on
    Windows Server 8
    without TPM
Windows DHCP
 1     DHCP Failover by synchronizing IP address lease information
       between 2 server

 2     Load balancing supported




 http://www.jonathanmedd.net/2011/09/now-with-powershell-cmdlets-for-dhcp.html
Demo
•       High availability on
        DHCP
    •   2 Servers running the Windows 8 Server Developer
        Preview
    •   The Domain Controller Role Installed on 1 server
    •   The DHCP Role installed on both servers
New Security Features
 • Dynamic access control
 • Flexi auditing
 • Securing window surface
Dynamic Access Control
 1    Compliances Challenge


 2
      Information is tag base on user & classification, it doesn’t matter
      where the files is reside
      Authorization Latest model access control is base on expression
 3    (e.g. and / or)

 4    Real time protection on non-MS Office document


  http://www.windowsitpro.com/article/windowsserver8/windows-server-8-dynamic-access-
  control-140572
Access Control Comparison
          Windows 7                    New in Windows 8                                Example

•   No expressions in ACL              Support for Expression             User.memberOf (USA-Employees)
                                                                      AND User.memberOf (Finance-Division)
•   Led to group bloat                with ‘AND’/’OR ’ primitives     AND User.memberOf (Authorization-Project)




•   ACLs only based on groups      Support for User Claims from AD
                                                                          User.Division = ‘Finance’
                                                                      AND User.CostCenter = 20000
•   Led to group bloat


•   No ability to control access   Support for Static Device Claims       User.Division = ‘Finance’

    based on device state                     from AD                 AND Device.ITManaged = True




•   No way to target policy             Target Policy based on        IF (Resource.Impact = ‘HBI’)

    based on Resource Type                  Resource Type             ALLOW AU Read User.EmployeeType = ‘FTE’
Expression-based Access Control Policy



          User claims                       Device claims                    Resource properties
User.Department = Finance           Device.Department = Finance         Resource.Department = Finance
User.Clearance = High               Device.Managed = True               Resource.Impact = High




                                               Central Access Rule
                                     Applies to: @Resource.Impact == High
           Allow | Read, Write | if (@User.Clearance == High) AND (@Device.Managed == True)
Flexible Audit
 1   Challenges in Auditing


 2   Improve auditing capabilities based on expression
Challenges in Auditing




               Event Logs
Auditing Capabilities Based on Expression



           Active Directory                                    File server

                 User claims                                 Resource properties
   Clearance = High | Med | Low                     Department = Finance | HR | Engg
   Status = Fulltime | Contract                     Impact = High | Med | Low


                              Central audit policy for HBI data
   Audit | Read, Write | if (@Resource.Impact == High) AND (@User.Status != Fulltime)
History
 1   Require proper planning on choosing the right installation method ( full
     system or core)


New version
        Microsoft understand the IT challenge and now you have the ability to
        switch both installation method
        1. ServerManager.exe cant be executed
 1      2. Metro UI will be removed
        3. Explorer and internet explorer will be remove
        4. Patching will be lesser
        5. Surface attack will be minimize
Demo
•   Removing GUI from
    Window Server 8
What happen to the patches that was installed in
the server full when you have change the system to
the core system.?

Come and join me and share your opinion

Usergroup   :   http://www.facebook.com/groups/MCIM2011/
Blog        :   http://www.wongchonkit.com
Email       :   wongchonkit@gmail.com
“Design it is not just what it looks like
   and feels like. Design is how it
                works.”

            -Steve    Jobs
Terima Kasih
   -   -
           Thank You   danke
       당신을 감사하십시오
Windows Server 8 Security Improvement

More Related Content

What's hot

Box Demo - Custom CRM
Box Demo - Custom CRMBox Demo - Custom CRM
Box Demo - Custom CRM
Mike Checker
 
Box Demo - Custom CRM
Box Demo - Custom CRMBox Demo - Custom CRM
Box Demo - Custom CRM
Mike Checker
 
Box Demo - Custom CRM
Box Demo - Custom CRMBox Demo - Custom CRM
Box Demo - Custom CRM
Mike Checker
 
Federal VMUG - March - VMware - Transforming Desktops with VMware View - Crai...
Federal VMUG - March - VMware - Transforming Desktops with VMware View - Crai...Federal VMUG - March - VMware - Transforming Desktops with VMware View - Crai...
Federal VMUG - March - VMware - Transforming Desktops with VMware View - Crai...
langonej
 
Engineering Software Products: 6. microservices architecture
Engineering Software Products: 6. microservices architectureEngineering Software Products: 6. microservices architecture
Engineering Software Products: 6. microservices architecture
software-engineering-book
 
Pervasive middleware
Pervasive middlewarePervasive middleware
Pervasive middleware
BHAKTI PATIL
 
Delivering People Centric IT with Configuration Manager 2012 R2
Delivering People Centric IT with Configuration Manager 2012 R2Delivering People Centric IT with Configuration Manager 2012 R2
Delivering People Centric IT with Configuration Manager 2012 R2
System Center User Group NL
 
Oracle Open World S308250  Securing Your People Soft Application Via Idm
Oracle Open World S308250  Securing Your People Soft Application Via IdmOracle Open World S308250  Securing Your People Soft Application Via Idm
Oracle Open World S308250  Securing Your People Soft Application Via Idm
edwinlorenzana
 
Introduction to SharePoint Framework
Introduction to SharePoint FrameworkIntroduction to SharePoint Framework
Introduction to SharePoint Framework
JoAnna Cheshire
 
Hyperion LCM Utility
Hyperion LCM UtilityHyperion LCM Utility
Hyperion LCM Utility
Amit Sharma
 
User Maintenance Workflow Application
User Maintenance Workflow ApplicationUser Maintenance Workflow Application
User Maintenance Workflow Application
Bijay Shrestha
 

What's hot (11)

Box Demo - Custom CRM
Box Demo - Custom CRMBox Demo - Custom CRM
Box Demo - Custom CRM
 
Box Demo - Custom CRM
Box Demo - Custom CRMBox Demo - Custom CRM
Box Demo - Custom CRM
 
Box Demo - Custom CRM
Box Demo - Custom CRMBox Demo - Custom CRM
Box Demo - Custom CRM
 
Federal VMUG - March - VMware - Transforming Desktops with VMware View - Crai...
Federal VMUG - March - VMware - Transforming Desktops with VMware View - Crai...Federal VMUG - March - VMware - Transforming Desktops with VMware View - Crai...
Federal VMUG - March - VMware - Transforming Desktops with VMware View - Crai...
 
Engineering Software Products: 6. microservices architecture
Engineering Software Products: 6. microservices architectureEngineering Software Products: 6. microservices architecture
Engineering Software Products: 6. microservices architecture
 
Pervasive middleware
Pervasive middlewarePervasive middleware
Pervasive middleware
 
Delivering People Centric IT with Configuration Manager 2012 R2
Delivering People Centric IT with Configuration Manager 2012 R2Delivering People Centric IT with Configuration Manager 2012 R2
Delivering People Centric IT with Configuration Manager 2012 R2
 
Oracle Open World S308250  Securing Your People Soft Application Via Idm
Oracle Open World S308250  Securing Your People Soft Application Via IdmOracle Open World S308250  Securing Your People Soft Application Via Idm
Oracle Open World S308250  Securing Your People Soft Application Via Idm
 
Introduction to SharePoint Framework
Introduction to SharePoint FrameworkIntroduction to SharePoint Framework
Introduction to SharePoint Framework
 
Hyperion LCM Utility
Hyperion LCM UtilityHyperion LCM Utility
Hyperion LCM Utility
 
User Maintenance Workflow Application
User Maintenance Workflow ApplicationUser Maintenance Workflow Application
User Maintenance Workflow Application
 

Viewers also liked

Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterpriseWindows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise
247infotech
 
linux security: interact with linux
linux security: interact with linuxlinux security: interact with linux
linux security: interact with linux
Ammar WK
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
Amitesh Bharti
 
12 Crucial Windows Security Skills for 2017
12 Crucial Windows Security Skills for 201712 Crucial Windows Security Skills for 2017
12 Crucial Windows Security Skills for 2017
Paula Januszkiewicz
 
Windows 7 Security
Windows 7 SecurityWindows 7 Security
Windows 7 Security
Jorge Orchilles
 
File system security
File system securityFile system security
File system security
AmmAr mobark
 
Linux Security Overview
Linux Security OverviewLinux Security Overview
Linux Security Overview
Kernel TLV
 
2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentation
ixiademandgen
 

Viewers also liked (8)

Windows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterpriseWindows 7 professional Vs Windows 7 enterprise
Windows 7 professional Vs Windows 7 enterprise
 
linux security: interact with linux
linux security: interact with linuxlinux security: interact with linux
linux security: interact with linux
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
 
12 Crucial Windows Security Skills for 2017
12 Crucial Windows Security Skills for 201712 Crucial Windows Security Skills for 2017
12 Crucial Windows Security Skills for 2017
 
Windows 7 Security
Windows 7 SecurityWindows 7 Security
Windows 7 Security
 
File system security
File system securityFile system security
File system security
 
Linux Security Overview
Linux Security OverviewLinux Security Overview
Linux Security Overview
 
2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentation
 

Similar to Windows Server 8 Security Improvement

VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld
 
Discover what´s new in Windows 8 Active Directory
Discover what´s new in Windows 8 Active DirectoryDiscover what´s new in Windows 8 Active Directory
Discover what´s new in Windows 8 Active Directory
Microsoft TechNet - Belgium and Luxembourg
 
Citrix and Desktop Migration Success
Citrix and Desktop Migration SuccessCitrix and Desktop Migration Success
Citrix and Desktop Migration Success
eG Innovations
 
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
AntonioMaio2
 
Application hardening
Application hardeningApplication hardening
Application hardening
Jayesh Naik
 
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Jayesh Naik
 
How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...
How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...
How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...
eG Innovations
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
Raghu Vamsy Sirasala
 
Citrix Troubleshooting 101
Citrix Troubleshooting 101Citrix Troubleshooting 101
Citrix Troubleshooting 101
eG Innovations
 
VMworld 2013: Getting Started with Horizon Workspace: Use Cases and Configura...
VMworld 2013: Getting Started with Horizon Workspace: Use Cases and Configura...VMworld 2013: Getting Started with Horizon Workspace: Use Cases and Configura...
VMworld 2013: Getting Started with Horizon Workspace: Use Cases and Configura...
VMworld
 
Operating a Highly Available Cloud Service
Operating a Highly Available Cloud ServiceOperating a Highly Available Cloud Service
Operating a Highly Available Cloud Service
Depankar Neogi
 
Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
Hitachi ID Systems, Inc.
 
Mitigating One Million Security Threats With Kafka and Spark With Arun Janart...
Mitigating One Million Security Threats With Kafka and Spark With Arun Janart...Mitigating One Million Security Threats With Kafka and Spark With Arun Janart...
Mitigating One Million Security Threats With Kafka and Spark With Arun Janart...
HostedbyConfluent
 
Power Platform Governance
Power Platform GovernancePower Platform Governance
Power Platform Governance
Daniel Laskewitz
 
Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1
solarisyougood
 
SoftwareRequirements (1).doc
SoftwareRequirements (1).docSoftwareRequirements (1).doc
SoftwareRequirements (1).doc
MadihaKhalid43
 
Case Management by EMC - xCP Platform
 Case Management by EMC - xCP Platform Case Management by EMC - xCP Platform
Case Management by EMC - xCP Platform
Amplexor
 
Learning%20%20 port
Learning%20%20 portLearning%20%20 port
Learning%20%20 port
Prasad Kavuri
 
Trivandrumtechcon20
Trivandrumtechcon20Trivandrumtechcon20
Trivandrumtechcon20
Jenkins NS
 
Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...
Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...
Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...
eG Innovations
 

Similar to Windows Server 8 Security Improvement (20)

VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
 
Discover what´s new in Windows 8 Active Directory
Discover what´s new in Windows 8 Active DirectoryDiscover what´s new in Windows 8 Active Directory
Discover what´s new in Windows 8 Active Directory
 
Citrix and Desktop Migration Success
Citrix and Desktop Migration SuccessCitrix and Desktop Migration Success
Citrix and Desktop Migration Success
 
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
SPTechCon Boston 2013 - Introduction to Security in Microsoft Sharepoint 2013...
 
Application hardening
Application hardeningApplication hardening
Application hardening
 
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
 
How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...
How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...
How to Get the​ Fastest Possible ​Citrix Logon Times​? Optimization Tips for ...
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
 
Citrix Troubleshooting 101
Citrix Troubleshooting 101Citrix Troubleshooting 101
Citrix Troubleshooting 101
 
VMworld 2013: Getting Started with Horizon Workspace: Use Cases and Configura...
VMworld 2013: Getting Started with Horizon Workspace: Use Cases and Configura...VMworld 2013: Getting Started with Horizon Workspace: Use Cases and Configura...
VMworld 2013: Getting Started with Horizon Workspace: Use Cases and Configura...
 
Operating a Highly Available Cloud Service
Operating a Highly Available Cloud ServiceOperating a Highly Available Cloud Service
Operating a Highly Available Cloud Service
 
Introduction to Identity Management
Introduction to Identity ManagementIntroduction to Identity Management
Introduction to Identity Management
 
Mitigating One Million Security Threats With Kafka and Spark With Arun Janart...
Mitigating One Million Security Threats With Kafka and Spark With Arun Janart...Mitigating One Million Security Threats With Kafka and Spark With Arun Janart...
Mitigating One Million Security Threats With Kafka and Spark With Arun Janart...
 
Power Platform Governance
Power Platform GovernancePower Platform Governance
Power Platform Governance
 
Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1
 
SoftwareRequirements (1).doc
SoftwareRequirements (1).docSoftwareRequirements (1).doc
SoftwareRequirements (1).doc
 
Case Management by EMC - xCP Platform
 Case Management by EMC - xCP Platform Case Management by EMC - xCP Platform
Case Management by EMC - xCP Platform
 
Learning%20%20 port
Learning%20%20 portLearning%20%20 port
Learning%20%20 port
 
Trivandrumtechcon20
Trivandrumtechcon20Trivandrumtechcon20
Trivandrumtechcon20
 
Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...
Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...
Citrix Troubleshooting 101: How to Resolve and Prevent Business-Impacting Cit...
 

Recently uploaded

"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
Vadym Kazulkin
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 

Recently uploaded (20)

"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 

Windows Server 8 Security Improvement

  • 1. Windows Server 8 Security Wong Chon Kit (CISSP, RHCT, C|EH, E|CSA,MCSA, MCSE,MCTIP Enterprise Contribution from Noel Teng Administrator , VCP)
  • 2. Agenda:  Key IT Security Issues In 2011  What you going to be expected from the developer preview version • Improving usability • Improving security enhancement & features
  • 3. IT security incidents around the world Citigroup hackers made $2.7 million from about 3,400 accounts and the breach cost 1 $77 million – networkworld.com 2 Japanese electronics giant Sony has reported a loss of $3.1bn (£1.9bn) for the year to 31 March. – bbc.co.uk 3 Lockheed Martin – one of the world’s biggest military and aerospace companies and Pentagon's top supplier – nationalcybersecurity.com 4 (IMF) has reportedly been hit with and potentially puts sensitive, confidential data about national economies at risk of exposure – computerworld.com
  • 4. Fundamental Tradeoff Secure You get to pick any two! Cheap Usable
  • 5. Enhanced Security Features • Bit locker • Windows patch management • DHCP Failover
  • 6. BitLocker 1 Zero Cost provisioning & protection against theft 2 Improved performance and encrypt hard drive base on the HDD usage Windows Update Service 1 Part of the Windows Server 8 http://www.microsoft.com/download/en/details.aspx?DisplayLang=en&id=6416
  • 7. Demo • Enable Bitlocker on Windows Server 8 without TPM
  • 8. Windows DHCP 1 DHCP Failover by synchronizing IP address lease information between 2 server 2 Load balancing supported http://www.jonathanmedd.net/2011/09/now-with-powershell-cmdlets-for-dhcp.html
  • 9. Demo • High availability on DHCP • 2 Servers running the Windows 8 Server Developer Preview • The Domain Controller Role Installed on 1 server • The DHCP Role installed on both servers
  • 10. New Security Features • Dynamic access control • Flexi auditing • Securing window surface
  • 11. Dynamic Access Control 1 Compliances Challenge 2 Information is tag base on user & classification, it doesn’t matter where the files is reside Authorization Latest model access control is base on expression 3 (e.g. and / or) 4 Real time protection on non-MS Office document http://www.windowsitpro.com/article/windowsserver8/windows-server-8-dynamic-access- control-140572
  • 12. Access Control Comparison Windows 7 New in Windows 8 Example • No expressions in ACL Support for Expression User.memberOf (USA-Employees) AND User.memberOf (Finance-Division) • Led to group bloat with ‘AND’/’OR ’ primitives AND User.memberOf (Authorization-Project) • ACLs only based on groups Support for User Claims from AD User.Division = ‘Finance’ AND User.CostCenter = 20000 • Led to group bloat • No ability to control access Support for Static Device Claims User.Division = ‘Finance’ based on device state from AD AND Device.ITManaged = True • No way to target policy Target Policy based on IF (Resource.Impact = ‘HBI’) based on Resource Type Resource Type ALLOW AU Read User.EmployeeType = ‘FTE’
  • 13. Expression-based Access Control Policy User claims Device claims Resource properties User.Department = Finance Device.Department = Finance Resource.Department = Finance User.Clearance = High Device.Managed = True Resource.Impact = High Central Access Rule Applies to: @Resource.Impact == High Allow | Read, Write | if (@User.Clearance == High) AND (@Device.Managed == True)
  • 14. Flexible Audit 1 Challenges in Auditing 2 Improve auditing capabilities based on expression
  • 16. Auditing Capabilities Based on Expression Active Directory File server User claims Resource properties Clearance = High | Med | Low Department = Finance | HR | Engg Status = Fulltime | Contract Impact = High | Med | Low Central audit policy for HBI data Audit | Read, Write | if (@Resource.Impact == High) AND (@User.Status != Fulltime)
  • 17. History 1 Require proper planning on choosing the right installation method ( full system or core) New version Microsoft understand the IT challenge and now you have the ability to switch both installation method 1. ServerManager.exe cant be executed 1 2. Metro UI will be removed 3. Explorer and internet explorer will be remove 4. Patching will be lesser 5. Surface attack will be minimize
  • 18. Demo • Removing GUI from Window Server 8
  • 19. What happen to the patches that was installed in the server full when you have change the system to the core system.? Come and join me and share your opinion Usergroup : http://www.facebook.com/groups/MCIM2011/ Blog : http://www.wongchonkit.com Email : wongchonkit@gmail.com
  • 20. “Design it is not just what it looks like and feels like. Design is how it works.” -Steve Jobs
  • 21. Terima Kasih - - Thank You danke 당신을 감사하십시오

Editor's Notes

  1. Windows Server 8 Dynamic Access Control is a new file-system authorization mechanism that gives IT the ability to define central file-access policies at the domain level that apply to every file server in the domain. Dynamic Access Control provides a “safety net,” in addition to any existing share and NTFS permissions, which ensures that regardless of how the share and NTFS permissions might be changing on a day-to-day basis, this central overriding policy will still be enforced.http://www.windowsitpro.com/article/windowsserver8/windows-server-8-dynamic-access-control-140572
  2. “Audit” is trustworthy logging of security-relevant events by a software component responsible for making security decisions
  3. Transition from Previous SlideThank you. For next steps, I suggest you…Now I’d like to take any questionsGoal of this slideAllow questions, offer advice on next stepsTalking PointsCustom – for your audience.