Using Software Restriction Policies

Slides:



Advertisements
Similar presentations
By Hiranmayi Pai Neeraj Jain
Advertisements

Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Paula Kiernan Senior Consultant Ward Solutions
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
Unleashing the Power of Ubiquitous Connectivity with IPv6 Sandeep K. Singhal, Ph.D Director of Program Management Windows Networking.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Implementing Exchange Server Security Ward Solutions.
Defense-in-Depth Against Malicious Software Rick Claus / Bruce Cowper IT Pro Advisors Microsoft Canada.
Security of Communication & IT systems Bucharest, 21 st September 2004 Stephen McGibbon Chief Technology Officer, Eastern Europe, Russia & CIS Senior Director,
2851A_C01. Microsoft Windows XP Service Pack 2 Security Technologies Bruce Cowper IT Pro Advisor Microsoft Canada.
Securing Exchange Server Session Goals: Introduce you to the concepts and mechanisms for securing Exchange Examine the techniques and tools.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Module 14: Configuring Server Security Compliance
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Windows Defender. What is Windows Defender? Windows Defender is a free program that helps protect your computer against pop- ups, slow performance, and.
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
Security Insights: Spyware. Spyware Challenges Bombard you with ads Change system settings Collect personal information Slow down or crash computers Invade.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Module 7: Advanced Application and Web Filtering.
Security fundamentals Topic 10 Securing the network perimeter.
NetTech Solutions Protecting the Computer Lesson 10.
11 IMPLEMENTING AND MANAGING SOFTWARE UPDATE SERVICES Chapter 7.
Security for Mere Mortals Steve Lamb Technical Security Advisor Microsoft Ltd.
Securing Tomorrow’s World Microsoft Security Roadmap Ed Gibson & Steve Lamb Microsoft Ltd.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
Windows Tutorial 5 Protecting Your Computer
Security fundamentals
Securing Information Systems
.
Managing Windows Security
Three steps to prevent Malware infection
TMG Client Protection 6NPS – Session 7.
Working at a Small-to-Medium Business or ISP – Chapter 8
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Securing the Network Perimeter with ISA 2004
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Threat Management Gateway
Deriving more value from your Windows investment
Firewalls.
Microsoft’s Security Strategy
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Free Actual Tests Actual Dumps PDF - Dumps4download.co.in.
Information Security Session October 24, 2005
Implementing Client Security on Windows 2000 and Windows XP Level 150
Securing Windows 7 Lesson 10.
Designing IIS Security (IIS – Internet Information Service)
Microsoft Virtual Academy
Security in the Real World – Plenary Day One
Chapter 9: Configuring Internet Explorer
Implementing Advanced Server and Client Security
About Us Scanster is one of the leading IT security software company. Our Software's are well integrated system that simplify computer security management.
Security Insights: Secure Messaging
Presentation transcript:

Using Software Restriction Policies

Isolation and Resiliency Reducing the Modes of Attack – XP SP2

How SP2 Would Have Helped MSBlaster worm Firewall, by default, blocks the ports DCOM denies unauthenticated requests /GS and/or NX would have prevented exploit of unchecked buffer W32.Sasser.worm Windows Firewall, by default, blocks the ports Mydoom and W32/Nimda.A@mm Attachment Manager would have blocked Mydoom Various spoofing and phishing attacks on the Internet New security features in IE have eliminated many of these attacks

Protecting Servers: What Are the Challenges? Challenges to protecting servers include: Maintaining reliability and performance Maintaining security updates Maintaining antivirus updates Applying specialized defence solutions based upon server role

What Is Server-Based Malware Defence? Basic steps to defend servers against malware include: Reduce the attack surface Apply security updates Enable a host-based firewall Analyze using configuration scanners Analyze port information

Using ISA Server 2004 SMTP Message Screener

Protecting the Network: What Are the Challenges? Challenges related to protecting the network layer include: Balance between security and usability Lack of network-based detection or monitoring for attack

Implementing Application Layer Filtering Application layer filtering includes the following: Web browsing and e-mail can be scanned to ensure that content specific to each does not contain illegitimate data Deep content analyses, including the ability to detect, inspect and validate traffic using any port and protocol

Implementing Filtering with ISA Server 2004

Isolation and Resiliency Network Access Protection Advanced Isolation Clients who do not pass can be blocked and isolated Isolated clients can be given access to updates to get healthy Health Checkup Check update level, antivirus, and other plug in and scriptable criteria

Microsoft Windows AntiSpyware Continuous protection guards 50+ ways spyware gets on a PC Intelligent alerts handle spyware based on your preferences Global SpyNet™ community helps identify new spyware Automatic signature downloads keep you up-to-date Spyware removal reduces PC slow down, pop-up ads, and more Scheduled scans help maintain PC security and privacy

Guidance, Tools & Response Delivering Support and Creating Community Security tools Microsoft Baseline Security Analyzer Security Bulletin Search Tool IIS Lockdown Tool Urlscan tool Port Reporter Tool Malicious Software Removal Tool Guidance and training Security Guidance Center E-Learning Clinics Community engagement Newsletters Webcasts and chats

Session Summary Understanding malware will help you implement an effective defence against malware attacks Use a defence-in-depth approach to defend against malware Harden client computers by applying security updates, installing and maintaining an antivirus strategy and restricting computers using group policy Stage all updates through a test server before implementing into production ISA Server 2004 can be used to implement network defences

Next Steps Find additional security training events: http://www.microsoft.com/seminar/events/security.mspx Sign up for security communications: http://www.microsoft.com/technet/security/signup/default.mspx Order the Security Guidance Kit: http://www.microsoft.com/security/guidance/order/ default.mspx Get additional security tools and content: http://www.microsoft.com/security/guidance Tools http://www.microsoft.com/technet/Security/tools TechNet Lounge / TechNet Subscriptions http://www.microsoft.com/australia/technet

© 2005 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.