Presentation is loading. Please wait.

Presentation is loading. Please wait.

Session 2 – Security and Application Compatibility NameTitleCompany Your City MVP – Product Arrea

Similar presentations


Presentation on theme: "Session 2 – Security and Application Compatibility NameTitleCompany Your City MVP – Product Arrea"— Presentation transcript:

1 Session 2 – Security and Application Compatibility NameTitleCompany Your City MVP – Product Arrea http://blogaddress

2 2 2 Investments in Security Development Lifecycle paying results Fewer High Security Vulnerabilities in Year 1 60% Fewer Malware Infections Than Windows XP SP2 Mac OS X 10.4 Ubuntu 6.06 LTS Red Hat EL4WS Reduced Windows Vista Security

3 3 Deployment Investments For Windows Vista Carry Forward

4 4 Enhance Security & Control AppLocker ™ (Windows 7 Enterprise) controls what applications run Internet Explorer 8 helps keep users safe online BitLocker To Go ™ (Windows 7 Enterprise) protects data on removable drives BitLocker ™ simplifies encryptions and key management for all drives User Account Control prompts lessUser Account Control prompts less Security Development Lifecycle for defense in depth 4

5 5 Data Protection Enhance Security & Control Protect data on internal and removable drives Mandate the use of encryption with Group Policies Store recovery information in Active Directory for manageability Simplify BitLocker setup and configuration of primary hard drive + Worldwide Shipments (000s) Gartner “Forecast: USB Flash Drives, Worldwide, 2001-2011” 24 September 2007, Joseph Unsworth Gartner “Dataquest Insight: PC Forecast Analysis, Worldwide, 1H08” 18 April 2008, Mikako Kitagawa, George Shiffler III 5

6 6 Security Security Improvement of PCs and Confidential Data Windows Vista has proven to be more secure than any other OS including previous version of Windows. Remove Unnecessary Administrator Privileges: UAC, IE Protected Mode. Protect data on lost or stolen PCs: BitLocker Drive Encryption. 62% less vulnerabilities than our closest competitor (H1 2008) Windows Vista had 20% less vulnerabilities than XP SP2 since Launch. 56% less malware than Windows XP SP2. VistaXP Vulnerabilities 6682 Critical Vulnerabilities 2950 “We don’t ship computers to our users with full administrative privileges anymore,” says Douglas Kotulski, network services and support manager for Trek Bicycle. “ The operating system has all kinds of new options for data encryption and protection of USB ports, to help us safeguard patient data on employee laptop computers,” say Eric Walraven, IT Manager at Vanboeijen. Micr osof t Ubu ntu Red Hat App le Vulnerab ilities 58153292222

7 7 Windows 7 Builds On Windows Vista Tools To Resolve Issues Quicker Keep Users Productive Richer support tools Reliability Monitor Reliability data is exposed via APIs for remote collection Integration of Reliability Monitor and Problem Reports and Solutions to better correlate system changes and events Resource Monitor SysInternals Process Explorer features integrated into Resource Monitor for clearer identification of process issues Windows Recovery Environment Windows Recovery Environment (WinRE) easily deployed via normal setup on all PCs Restore to OEM or IT image without data loss or reimage with recent system backup System Restore Users will now be able to view the list of software changes before rolling their PC back Restore points will be available from system backups allowing users to roll-back to a point further back in time Problem Steps Recorder Users can record steps taken when an issue occurs, giving help desk screen shots and comments to help resolve issues

8 8 Application Control Eliminate unwanted/unknown applications in your network Enforce application standardization within your organization Easily create and manage flexible rules using Group Policy AppLocker TM Users can install and run non-standard applications Even standard users can install some types of software Unauthorized applications may: Introduce malware Increase helpdesk calls Reduce user productivity Undermine compliance efforts

9 9 Application Compatibility Toolkit and Security Demos Windows Vista to Windows 7

10 10 AppLocker TM Simple Rule Structure: Allow, Exception & Deny Publisher Rules Product Publisher, Name, Filename & Version Multiple Policies Executables, installers, scripts & DLLs Rule creation tools & wizard Audit only mode AppLockerTM – Enterprise Legacy SRP – Business & Enterprise

11 11 Policy Versus Preference

12 Deployment Image Servicing and Management Add/Remove Drivers and Packages WIM and VHD Image Management User State Migration Tool Hardlink Migration Offline File Gather Improved user file detection Microsoft Deployment Toolkit Application Compatibility Toolkit Microsoft Assessment and Planning Windows Deployment Services Multicast Multiple Stream Transfer Dynamic Driver Provisioning Conclusion

13 13 © 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.


Download ppt "Session 2 – Security and Application Compatibility NameTitleCompany Your City MVP – Product Arrea"

Similar presentations


Ads by Google