Virtual techdays Desktop Security with Windows 7 AppLocker & BitLocker to Go Aviraj Ajgekar│ Technology Evangelist │Microsoft Corporation Blog: http://blogs.technet.com/aviraj.

Slides:



Advertisements
Similar presentations
Microsoft ® Official Course First Look Clinic Overview of Windows 8 By Ragowo Riantory, S.Kom, MCP.
Advertisements

Ljubomir Ivaniš CPU d.o.o.
Rambling on the Private Data Security
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Windows Vista Serious Challenges for Digital Investigators Authors: Darren Hayes Shareq Qureshi Presented By: Prerna Gupta.
BitLocker™ Drive Encryption A look under the covers Steve Lamb Technical Security Advisor, Microsoft UK
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
Chapter 10 Securing Windows Server 2008 MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration.
Building on the Foundation of Windows Vista: Introduction to Windows 7: Security and Management Dan Stolts IT Pro Evangelist Microsoft
BitLocker: deep details, improvements and benifits
Windows 8: Windows To Go Overview Zvezdan PavkovicTanya Koval Senior ConsultantArchitect WCL333.
Benefits, Risks and Service Desk Impact. Robert Half Technology Kelly O’Connell Robert Half International Branch Manager 2/11/2010.
Jayesh Mowjee Security Consultant Microsoft Session Code: SIA 201.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
What's new in Microsoft Online Services Aviraj Ajgekar Technology Evangelist Microsoft Corporation
Security and Policy Enforcement Mark Gibson Dave Northey
BitLocker™ Drive Encryption Hardware Enhanced Data Protection
MDOP 2010: Diagnostic and Recovery Toolset (DaRT) Speaker Fabrizio Grossi
Paul A. Cooke - CISSP Director Microsoft Session Code: CLI311.
Windows 7 Windows Server 2008 R2 VirtualizationVirtualization Heterogeneous Server Environment Inventory Linux, Unix & VMware Windows 7 & Server 2008.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
Virtual techdays INDIA │ November 2010 Windows Virtual PC & Windows XP Mode Aviraj Ajgekar │ Regional Site Manager │ Microsoft Corporation Blog:
Session 2 – Security and Application Compatibility NameTitleCompany Your City MVP – Product Arrea
Microsoft ® Official Course Module 9 Configuring Applications.
11 SHARING FILE SYSTEM RESOURCES Chapter 9. Chapter 9: SHARING FILE SYSTEM RESOURCES2 CHAPTER OVERVIEW Create and manage file system shares and work with.
Module 6 Securing Windows 7 Desktops. Module Overview Overview of Security Management in Windows 7 Securing a Windows 7 Client Computer by Using Local.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Troubleshoot Access, Authentication, and User Account Control Issues Lesson 8.
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Hands-On Microsoft Windows Server 2008
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Week #7 Objectives: Secure Windows 7 Desktop
Troubleshooting Windows Vista Security Chapter 4.
Nils Dussart Program Manager Microsoft Corporation SIA305.
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Windows XP Professional Features ©Richard L. Goldman February 5, 2003.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 7 Windows 7 Security Features.
Module 15 Managing Windows Server® 2008 Backup and Restore.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
Ch 17 Securing the File System. Three Ways to Protect Files NTFS Permissions Encrypting File Service BitLocker full-disk encryption – BitLocker ToGo.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Paul Cooke - CISSP Director Microsoft Session Code: CLI322.
Managing Applications, Services, Folders, and Libraries Lesson 4.
Understand Encryption LESSON 2.5_A Security Fundamentals.
May 25 – June 15, Technical Overview Bruce Cowper IT Pro Advisor Microsoft Canada Damir Bersinic IT Pro Advisor Microsoft.
Virtual techdays INDIA │ 9-11 February 2011 virtual techdays What's new Windows Server 2008 R2 Service Pack 1 Aviraj Ajgekar │ Technology Evangelist │
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
Lesson 18: Configuring Security for Mobile Devices MOAC : Configuring Windows 8.1.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 7 Windows 7 Security Features.
Windows for the Enterprise Boris Ulík Technology Solutions Professional Microsoft Slovakia.
Automating Installations by Using the Microsoft Windows 2000 Setup Manager Create setup scripts simply and easily. Create and modify answer files and UDFs.
What is BitLocker and How Does It Work? Steve Lamb IT Pro Evangelist, Microsoft Ltd
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
Systems Architecture Microsoft BitLocker -> securing data on mobile devices Johannes Marotzke
UNM Encryption Services in Development
Create setup scripts simply and easily.
Supporting Windows 8.1 Krystle Portocarrero | Training Experts Inc.
4 Windows 7.
תרגול 9 – Windows Security
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Presentation transcript:

virtual techdays Desktop Security with Windows 7 AppLocker & BitLocker to Go Aviraj Ajgekar│ Technology Evangelist │Microsoft Corporation Blog: http://blogs.technet.com/aviraj │ aviraj@microsoft.com

Agenda BitLocker enhancements and capabilities Trusted Module Management PINs Encrypt Data Volumes and Removable storage devices Recover Encrypted Data AppLocker Enforce Rules & Audit Only Mode AppLocker Management using PowerShell AppLocker Architecture AppLocker Deployment Best Practices AppLocker Vs Software Restriction Policies

BitLocker & BitLocker to Go

Overview of BitLocker + Extend BitLocker drive encryption to removable devices Create group policies to mandate the use of encryption and block unencrypted drives Simplify BitLocker setup and configuration of primary hard drive

New Features of BitLocker Improved Setup Wizard Automatic 200MB hidden boot partition New Key Protectors BitLocker To Go Support for FAT Protectors: DRA, passphrase, smart card and/or auto-unlock New GPOs to improve enterprise management Edition Availability BitLocker To Go Reader

Trusted Platform Module (TPM) Version 1.2 or later www.trustedcomputinggroup.org/specs/TPM www.trustedcomputinggroup.org/specs/PCClient BIOS Trusted Computing Group BIOS Physical presence interface Memory overwrite on reset Immutable CRTM or secure update USB System boot from USB 1.x and 2.x USB read/write in pre-operating system environment Hard Disk Requires at least two partitions Separate partitions for System and OS

DEMO Configuring the Trusted Platform Module Set Ownership of the TPM Block or Allow TPM Commands Turn Off and Clear TPM

DEMO Configuring BitLocker Group Policy Settings Enable BitLocker Encryption Without a TPM Configure BitLocker Group Policy Settings

Operating System Volume Disk Layout and Key Storage Operating System Volume Contains Encrypted OS Encrypted page file Encrypted temp files Encrypted data Encrypted hibernation file Where’s the Encryption Key? SRK (Storage Root Key) contained in TPM SRK encrypts the VMK (Volume Master Key) VMK encrypts FVEK (Full Volume Encryption Key) – used for the actual data encryption FVEK and VMK are stored encrypted on the Operating System Volume VMK FVEK 2 SRK 3 Operating System Volume 1 4 System Volume Contains MBR Boot Manager Boot Utilities System

BitLocker on Removable Drives Drive Type Removable data drives USB flash drives External hard drives Unlock Methods Passphrase Smart card Automatic unlocking Recovery Methods Recovery password Recovery key Active Directory backup of recovery password Data Recovery Agent Management Robust and consistent group policy controls Ability to mandate encryption prior to granting write access File Systems NTFS FAT FAT32 ExFAT

DEMO Encrypting Drives Using BitLocker and BitLocker To Go Add a Data Recovery Agent Encrypt FAT-Formatted Disk Drive Configure BitLocker To Go

DEMO Using the Manage-BDE Command-Line Tool Encrypt and Decrypt a Drive Using Manage-BDE

Lost or forgotten authentication methods Data Recovery Scenarios Lost or forgotten authentication methods Upgrade to core files Broken hardware Deliberate attack

Windows Recovery Environment Data Recovery Methods Develop Strategy Active Directory Data Recovery Agents Windows Recovery Environment

DEMO Managing and Recovering Data Unlock FAT-Formatted Drive Manage and Decrypt BitLocker Protected Disk Drive

AppLocker

Application Control - Situation Today Users can install and run non-standard applications Even standard users can install some types of software Unauthorized applications may: Introduce malware Increase helpdesk calls Reduce user productivity Undermine compliance efforts

Windows 7 AppLockerTM Eliminate unwanted/unknown applications in your network Enforce application standardization within your organization Easily create and manage flexible rules using Group Policy

DEMO AppLocker Identity Service AppLocker Audit Only Mode AppLocker Enforce Rules & Policies AppLocker Custom Error Messages

PowerShell Cmdlets Get-AppLockerFileInformation Get-AppLockerPolicy Core needs scriptable through PowerShell Building blocks for a more streamlined end-to-end experience Inbox cmdlets Get-AppLockerFileInformation Get-AppLockerPolicy Set-AppLockerPolicy New-AppLockerPolicy Test-AppLockerPolicy

DEMO AppLocker Management using PowerShell

Architectural Overview Process 1 Process 2 Process 3 AppID/SRP Service LoadLibrary SaferIdentityLevel CreateProcess ntdll SRP UM QueryPolicy ntoskrnl CreateProcess Notification Appid.sys AppID SRP Kernel

Deployment Best Practices Create a desktop lockdown strategy Inventory your applications Select and test rule types (allow / deny) in a lab Define GPO strategy and structure Build a process for managing rules Document your AppLocker design Build reference computers Test and update the policy using audit-only Enable rule enforcement Maintain the policy

AppLocker Vs. Software Restriction Policies

Session Summary BitLocker enhancements and capabilities BitLocker to Go for Removable Storage Devices BitLocker Recovery Agents & Tools AppLocker protect digital assets by preventing unwanted software from running AppLocker provides an improved management experience making it easier to maintain a list of approved applications

tech·ed Event Overview Microsoft® Event Dates: 23 - 25 March, 2011 India │2011 March 23-25│B a n g a l o r e Event Dates: 23 - 25 March, 2011 Event Venue: Lalit Ashok│ Bangalore (India) - 2010 Attendee Profile: CXO’s:3%│CXO’s -1/-2:13%│Architects : 8%│Developers : 54% │ IT Pro’s : 22% │Students │ Media/Press Event Theme: Learn │Connect │Explore │Evolve What’s in it 4 Audience: Strategic direction in Keynotes│Deep-Dive Technical Training │Free Certification │Software Access │ Networking│ Hands on Labs │Demo X Expected Attendance: 3,500 Tech Audience (onsite) │100,000 Tech Audience (satellite locations) │300 CXO & CXO-1 (onsite)

“Stay Ahead of the Game” Participate & “Stay Ahead of the Game” www.microsoftteched.in

virtual techdays Thank You Email: aviraj@microsoft.com Blog: http://blogs.technet.com/aviraj