1 / 21

{ Security Technologies }

{ Security Technologies }. Steve Lamb Technical Security Advisor, Microsoft UK http://blogs.technet.com/steve_lamb Stephen.lamb@microsoft.com. ”Effective Security”. Agenda. Overview of Windows Server 2008 Security Windows Service Hardening Network Access Protection

wayde
Download Presentation

{ Security Technologies }

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. {Security Technologies} Steve Lamb Technical Security Advisor, Microsoft UK http://blogs.technet.com/steve_lamb Stephen.lamb@microsoft.com

  2. ”Effective Security”

  3. Agenda • Overview of Windows Server 2008 Security • Windows Service Hardening • Network Access Protection • Read-Only Domain Controllers • AD Rights Management • Auditing • Resources

  4. Windows Server 2008 Security Architecture Network Access Protection Read-Only Domain Controller AD Rights Management Services Auditing

  5. K K K K U U U U Windows Services Hardening Windows Services are profiled Reduce size of high risk layers Segment the services Increase number of layers Service … Service 1 Service… Service 2 Service A Service 3 Service B Kernel Drivers User-mode Drivers

  6. Where is the boundary? ?

  7. Network Access Protection Internet Boundary Zone Employees , Partners, Vendors Intranet Customers Partners Remote Employees

  8. Network Access ProtectionHow It Works Access requested Health state sent to NPS (RADIUS) NPS validates against health policy If compliant, access granted If not compliant, restricted network access and remediation 1 Policy Serverse.g.., Patch, AV 1 Microsoft NPS 2 3 5 Not policy compliant Remediation Serverse.g., Patch 2 3 RestrictedNetwork Policy compliant 4 DCHP, VPN Switch/Router 5 Corporate Network 4

  9. Read-Only Domain Controller RODC Main Office Branch Office

  10. AD Rights Management • Do NOT Forward • Let’s have a look @ my email

  11. How does RMS work? Active Directory SQL Server Windows Server running RMS 3 4 1 2 5 3 The Recipient Author using Office

  12. Federated Rights Management Contoso Adatum AD AD ResourceFederationServer Federation Trust AccountFederationServer RMS WebSSO

  13. Auditing - Comparison Windows Server 2003 Windows Server 2008

  14. Updated Event Viewer

  15. Is EFS Dead? ?

  16. A Quick Review BitLocker

  17. New Windows Firewall • Inbound and Outbound Filtering • New Management MMC • Integrated Firewall and IPsec Policies • Rule Configuration on Active Directory Groups and Users • Support for IPv4 and IPv6 • Advanced Rule Options • On by Default (Beta 3)

  18. Servers with Sensitive Data Server Isolation HR Workstation Managed Computer Domain Isolation Managed Computer Server and Domain Isolation Active Directory Domain Controller Corporate Network Trusted Resource Server X Unmanaged/Rogue Computer X Untrusted Enable tiered-access to sensitive resources Block inbound connections from untrusted Managed computers can communicate Define the logical isolation boundaries Distribute policies and credentials

  19. Crypto Next Generation (CNG) • Native AES 256 in the Kernel • Can plug in new algorithms • FIPS 140-2

  20. Please fill in your Evaluation Form

More Related