We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byKian Seeney
Modified about 1 year ago
Tony Mangefeste Senior Program Manager Microsoft Corporation SYS-462T
Windows 8 OS Loader UEFI BootBoot Policy rd -Party Software Windows Kernel ELAM Software AM Policy Windows Logon 2 2 Anti- Malware Client Attestation Service Healthy? Quote 4 4 TPM 3 3
Encrypted OS Volume TPM PIN 1 1 Key Request Client Key Windows 8 WDS Server Native UEFI Boot UEFI DHCP 4 or 6 TPM Encrypted OS Volume 2 2
Not Ready Disabled Deactivated Ownership Not Taken Not Ready Ownership Not Taken Provisioning Flag = True
TPM-Based App Runs Is TPM State Ready ? App Uses the TPM Yes App Launches OS Wizard Administrator Interaction Clear TPM (If necessary) No
Direct TPM Commands Existing TPM 1.2 Apps TPM 1.2 Microsoft TPM Stack TPM 2.0 Microsoft TPM Stack Key Storage Provider TPM Application for Windows 8 Windows Internal TPM 1.2 or TPM 2.0 Abstraction Layer (RSA & SHA-1) TPM Provisioning TPM Virtual Smart Card
Tony Mangefeste Senior Program Manager Microsoft Corporation SYS-457T.
MANAGEMENT ANTIMALWARE PLATFORM Microsoft Malware Protection Center Dynamic Signature Svc Available only in Windows 8 Endpoint Protection Management.
Nishanth Lingamneni Program Manager Microsoft Corporation SYS-009T.
Tony Mangefeste Senior Program Manager Microsoft Corporation SYS-003T.
Reducing Trust Domain with TXT Daniel De Graaf. TXT overview Original TPM – Static Root of Trust – BIOS, all boot ROMs, bootloader, hypervisor, OS TPM.
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
Vpn-info.com. Introduction to Trusted Platform Module.
Sony White House Anthem Lockheed Aramco Bushehr nuclear reactor NSA Hacked Facebook Hacked Apple,Google,Microsoft,
Tony Mangefeste Senior Program Manager Microsoft Corporation SYS-004T.
Redmond Protocols Plugfest 2016 Kam Kouladjie Windows 10 Device Health Attestation (DHA) Microsoft OSG, Enterprise and Security R&D June 2016.
By Rashid Khan Lesson 10-From Here to There: Remote Installation of the Windows XP Professional Client.
Passwords are not able to keep user safe.
Device Guard and AppLocker Better Together Troy L. Martin 1E.com/blogs/author/troymartin/ Technical Architect 1E.
Tony Mangefeste Senior Program Manager SYS-005T Why UEFI? UX value prop from Day one: Fast Boot, OEM Certification, smooth transitions, etc. Secure Boot.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Tony Mangefeste Senior Program Manager Microsoft Corporation SYS-006T.
Craig Ashley | Sr. Product Manager Michael Raymond | SDET II.
What is Windows To Go. Mobility for the Enterprise Windows To Go: Windows in your back pocket Contractors Bring Your Own Device (at work) Travel Light.
Module 15 Managing Windows Server® 2008 Backup and Restore.
If a bad guy can alter the operating system on your computer, it's not your computer anymore A bad guy could have altered the operating system on EVERY.
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Improving the boot experience POST OS Initialization Service & App Initialization Service & App Init.
20 21 Remote Wipe.
Free, online, technical courses Take a free online course. Microsoft Virtual Academy.
Microsoft Virtual Academy SP1. Real time Endpoint Protection operations from console Simplified Administration Single administrator experience for simplified.
Windows for the Enterprise Boris Ulík Technology Solutions Professional Microsoft Slovakia.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the purpose of Microsoft virtualization. Objective Course Weight 2%
Session Agenda Designed to address BIOS Limitations Needed for the larger server platforms (Intel-HP Itanium) First called Intel Boot Initiative.
About PKI Key Stores Dartmouth College PKI Lab. Key Store Defined Protected “vault” to hold user’s private key with their copy of their x.509 certificate.
MDOP 2010: Diagnostic and Recovery Toolset (DaRT) Speaker Fabrizio Grossi
1 Module 1 The Windows NT 4.0 Environment. 2 Overview The Microsoft Operating System Family Windows NT Architecture Overview Workgroups and Domains.
Windows 8: Windows To Go Overview Zvezdan PavkovicTanya Koval Senior ConsultantArchitect WCL333.
Virtual techdays INDIA │ 9-11 February 2011 virtual techdays Desktop Security with Windows 7 AppLocker & BitLocker to Go Aviraj Ajgekar │ Technology Evangelist.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Script Kiddies; CybercrimeCyber-espionage; Cyber-warfare CybercriminalsState sponsored actions; Unlimited resources Attacks on fortune 500All sectors.
May 30 th – 31 st, 2007 Chateau Laurier Ottawa. Getting it Done: Understanding the Security Features of Windows Vista Kai Axford, CISSP, MCSE-Security.
Managed virtual smart cardsUnmanaged virtual smart cards Inventory management PIN reset and unblock PIN change Policy enforcement Certificate.
Securing. Agenda Hard Drive Encryption User Account Permissions Root Level Access Firewall Protection Malware Protection.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 13 Understanding and Installing Windows 2000 and Windows NT.
Module 2: Windows Deployment Services. Module Overview Describe Windows Deployment Services benefits Describe Windows Deployment Services (WDS) components.
© 2005 DataCore Software Corp SANsymphony™ Application Support Services Fast iSCSI Boot Capability Disaster Recovery, Flexibility and Cost Savings DataCore,
Module 10: Designing Operating System Deployment and Maintenance.
Hands-On Microsoft Windows Server 2008 Chapter 2 Installing Windows Server 2008.
1 Information Security – Theory vs. Reality , Winter Lecture 12: Trusted computing architecture (cont.), Eran Tromer Slides credit:
Trustworthy and Personalized Computing Christopher Strasburg Department of Computer Science Iowa State University November 12, 2008.
An approach to on the fly activation and deactivation of virtualization-based security systems Denis Efremov Pavel Iakovenko
© 2017 SlidePlayer.com Inc. All rights reserved.