Microsoft Windows 7 Security Ronen Gottlib, CISSP Information Security Lead Microsoft.

Slides:



Advertisements
Similar presentations
Ljubomir Ivaniš CPU d.o.o.
Advertisements

WMS02: Direct Access Always Connected: Death of the VPN
Scott Roberts Lead Program Manager Microsoft Session Code: WSV320.
Chapter 10 Securing Windows Server 2008 MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration.
The future of Desktops Transform Your Desktop with Virtualization.
Building on the Foundation of Windows Vista: Introduction to Windows 7: Security and Management Dan Stolts IT Pro Evangelist Microsoft
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Benefits, Risks and Service Desk Impact. Robert Half Technology Kelly O’Connell Robert Half International Branch Manager 2/11/2010.
Unleashing the Power of Ubiquitous Connectivity with IPv6 Sandeep K. Singhal, Ph.D Director of Program Management Windows Networking.
Module 3 Windows Server 2008 Branch Office Scenario.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Dan Stolts IT Pro Evangelist US DPE - North East Microsoft Corporation
Security and Policy Enforcement Mark Gibson Dave Northey
IT:Network:Applications VIRTUAL DESKTOP INFRASTRUCTURE.
Jason Leznek, Group Product Manager, Windows Client Justin Graham, Senior Product Manager, Windows Server.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers Vendors.
Agenda Understanding the optimized desktop Windows 7 To Date Office 2010 Windows 7 Resources, Resources, Resources.
Vito Konopelec Microsoft Slovakia Building The Optimized Desktop Infrastructure with Windows 7 and Windows Server 2008 R2.
Ashwin Palekar Principal Group Program Manager Microsoft Corporation Session Code: WSV208 Scott Roberts Senior Program Manager Lead Network Security Microsoft.
Nicola Ferrini IT PRO Trainer
Server 2008 Terminal Services and Remote Desktop Services Basic application access is possible without Citrix, and Server 2008 R2 adds on some key features.
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
WSV404 DirectAccess Server (Server 2008 R2) DirectAccess Client (Windows 7) Internet Native IPv6 6to4 Teredo IP-HTTPS Tunnel over IPv4 UDP, HTTPS,
Session 2 – Security and Application Compatibility NameTitleCompany Your City MVP – Product Arrea
Windows Azure Networking & Active Directory Nasir (Muhammad Nasiruddin) Developer Evangelist - Azure Microsoft Corporation
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
Course 201 – Administration, Content Inspection and SSL VPN
Gavin Carius Architect Microsoft Services SVR311.
Clinic Security and Policy Enforcement in Windows Server 2008.
Hands-On Microsoft Windows Server 2008 Chapter 10 Securing Windows Server 2008.
Windows Server 2008 Chapter 10 Last Update
70-411: Administering Windows Server 2012
Implementing Network Access Protection
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Module 5: Designing a Terminal Services Infrastructure.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
PCIT313. Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers.
Alessandro Cardoso Microsoft MVP | Readify National Manager |
Module 8: Managing Terminal Services. Overview Use and manage Terminal Services RemoteApp programs Use and manage Terminal Services Gateway Optimize and.
Q XenDesktop & Windows Server 2012 Value Add – RDS & VDI.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
Module 5: Designing Security for Internal Networks.
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
Next Generation Remote Access Always On Seamless and Transparent Bi-Directional Connectivity NOT a VPN!
Providing seamless, secure access to enterprise resources from anywhere.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
“How can I reduce costs and take advantage of new technologies like virtualization?” “My users are becoming more savvy and have more diverse needs. How.
Uri Lichtenfeld Security Specialist Certified Security Solutions – Microsoft Partner SESSION CODE: SIA312.
Dominik Zemp Microsoft Switzerland Ltd Liab. Co. Install and Configure Remote Access for SharePoint (and RemoteApp and DirectAccess)
Dawie Human Infrastructure Architect Inobits Consulting Session Code: WSV320.
Virtualization Vitalis Konopelec Technology Solution Professional Microsoft Slovakia s.r.o.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
Enabling Secure Always-On Connectivity Gustav Kaleta Partner Technology Advisor Microsoft Corporation.
Joey Snow Technical Evangelist Microsoft Corportation SVR203.
Provided Under NDA - Secure Access to Corporate Resources.
Configuring Windows Firewall with Advanced Security
Modernizing your Remote Access
Securing the Network Perimeter with ISA 2004
Forefront Security ISA
Server-to-Client Remote Access and DirectAccess
Presentation transcript:

Microsoft Windows 7 Security Ronen Gottlib, CISSP Information Security Lead Microsoft

Enhance Security & Control Protect Users & Infrastructure AppLocker™ (Windows 7 Enterprise) controls what applications run Internet Explorer 8 helps keep users safe online Protect Data on PCs & Devices BitLocker To Go™ (Windows 7 Enterprise) protects data on removable drives BitLocker™ simplifies encryptions and key management for all drives Build on Windows Vista Security Foundation User Account Control prompts less Security Development Lifecycle for defense in depth

Data Protection Protect data on internal and removable drives Mandate the use of encryption with Group Policies Store recovery information in Active Directory for manageability Simplify BitLocker setup and configuration of primary hard drive BitLocker To Go™ (Windows 7 Enterprise) Worldwide Shipments (000s) Gartner “Forecast: USB Flash Drives, Worldwide, ” 24 September 2007, Joseph Unsworth Gartner “Dataquest Insight: PC Forecast Analysis, Worldwide, 1H08” 18 April 2008, Mikako Kitagawa, George Shiffler III +

Application Control Eliminate unwanted/unknown applications in your network Enforce application standardization within your organization Easily create and manage flexible rules using Group Policy AppLocker™ (Windows 7 Enterprise) Users can install and run unapproved applications Even standard users can install some types of software Unauthorized applications may: Introduce malware Increase helpdesk calls Reduce user productivity Undermine compliance efforts

Advanced Group Policy Management Enable group policy change management Provides granular administrative control Reduce risk of widespread failure Versioning, history & rollback of group policy changes Role-based administration & templates Flexible delegation model What it DoesBenefits Enhancing group policy through change management

Today’s Challenges Network Access Protection o Unprotected network taps within an organization’s buildings o Administrators have limited control over the health of systems joining the network o Result: hardware/network upgrades and increased operational costs, reduced productivity Solution: end-to-end, authenticated, tamper-resistant communication o Improved isolation using IPSec o Network access protection across IPSec, 802.1X, DHCP, VPN o Increased manageability

Forefront UAG 2010 DirectAccess and RDG Idan Plotnik Security Engineer Forefront MVP

Help us to help you to help others …

A word on wording In Windows 7 / Windows Server 2008 R2, Terminal Service (TS) was renamed to Remote Desktop Services (RDS) Other terminology changes: − Terminal Services Gateway (TSG)  Remote Desktop Gateway (RDG) − Terminal Services Server  Remote Desktop Session Host − TS Broker  RD Connection Broker

How SSLVPN works … RD/TS is published by tunneling its traffic without IAG or any other SSLVPN being able to control the traffic. IAGIAG RD/TS Client (MSTSC) (MSTSC) RD Session Host (TS Server) RD Session Host (TS Server) HTTPS Tunnel RDPRDP

What’s new in UAG In UAG RD/TS client traffic goes over HTTPS. The HTTPS tunnel is terminated at UAG, therefore, we can inspect the traffic. The traffic is then passed to the backend RD Session Host using the RDP protocol. UAG+RDGUAG+RDG RD/TS Client (MSTSC) (MSTSC) RDP over HTTPS RDPRDP RD Session Host (TS Server) RD Session Host (TS Server)

New functionality application level gateway UAG seamlessly integrates Terminal Services / Remote Desktop Gateway (TSG/RDG) to provide application level gateway for RDS applications. Enables employees to securely access applications that are hosted on Terminal Server or their internal workstation Benefits: − Enhanced security − Granular policies based on client health: no anti-virus  no driver sharing − TS RemoteApps are integrated into UAG portal side-by-side with Web applications − Single sign-on experience

DirectAccess Providing seamless, secure access to enterprise resources from anywhere

Always On Always connected No user action required Adapts to changing networks

Secure Encrypted by default 2 Factor AuthN Strong Authentication! −Computer AuthN −User AuthN Granular access control Coexists with existing edge, health, and access policies

Manageable Reach out to previously untouchable machines Allows remote clients to process Group Policies Ongoing updates (AV/WSUS etc …) from the internal infrastructure NAP integration for health compliance Consolidate Edge Infrastructure

VPN vs. DirectAccess - Value VPNDirectAccess Manageability Granular Security Ease of use Installation / Configuration / Troubleshooting

Forefront UAG DirectAccess DirectAccess Client (Windows 7) Internet Native IPv6 6to46to4 TeredoTeredo IP-HTTPSIP-HTTPS Tunnel over IPv4 UDP, HTTPS, etc. Encrypted IPsec+ESP

Enterprise Network Forefront UAG DirectAccess Line of Business Applications No IPsec IPsec Integrity Only (Auth) IPsec Integrity + Encryption Windows Server 2003 Windows Server 2008 Non-Windows Server

3 Deployment Models

End-to-Edge encryption No overhead of encryption on application servers Edge enforces machine/user authentication and data encryption Least change from existing edge deployments Trusted, compliant, healthy machine Windows 7 client Applications & Data (non-IPsec enabled) DC & DNS (Server 2008 SP2/R2) Internet Forefront UAG DirectAccess IPsec ESP tunnel encryption using machine cert (DC/DNS access) Clear Text traffic from client flows through encrypted tunnel to Corporate network resources IPsec ESP tunnel encryption using UserKerb/Health Cert/Smartcard for broad network access Corporate Network

End-to-Edge Encryption + End to End IPsec No overhead of encryption on application servers (just authentication) DirectAccess Edge Encryption combined with End to End IPsec Server and Domain Isolation Trusted, compliant, healthy machine Windows 7 client Corporate Network Applications & Data IPsec-enabled Internet IPsec ESP-Null AuthIP Transport Traffic flows through encrypted tunnel to Corporate network resources Forefront UAG DirectAccess IPsec ESP tunnel encryption using UserKerb/Health Cert/Smartcard for broad network access IPsec ESP tunnel encryption using machine cert (DC/DNS access) DC & DNS (Server 2008 SP2/R2)

End-To-End IPsec Transport Encryption Thin edge solution using IPsec Denial of Service Protection (DoSP) Service only allows IPSec & ICMP traffic Full End to End IPsec Encryption IP-HTTPS tunnel used for proxy scenarios only Trusted, compliant, healthy machine Windows 7 client Corporate Network Applications & Data IPsec-enabled Internet IPsec ESP-encrypted transport to access Corporate network resources Forefront UAG DirectAccess DC & DNS (Server 2008 SP2/R2)

IPv6 IPv6 Always On Windows7 IPv4 IPv4 IPv4 Forefront UAG DirectAccess Extend support to IPv4 servers UAG improves adoption and extends access to existing infrastructure Extends access to LOB servers with IPv4 support Access for down level and non Windows clients Enhances scalability and management Simplifies deployment and administration Hardened Edge SolutionMANAGED Vista XP UNMANAGED Non Windows PDA DirectAccess SSL VPN UAG provides access for down level and non Windows clients UAG enhances scale and management with integrated LB and array capabilities. UAG uses wizards and tools to simplify deployments and ongoing management. UAG is a hardened edge appliance available in HW and virtual options Windows7

DEMO