Anders Vinger, University of Oslo Personal Data Recovery The pain of laptops.

Slides:



Advertisements
Similar presentations
Ljubomir Ivaniš CPU d.o.o.
Advertisements

Network Secure Gateway What is the Network Secure Gateway ? It is in essence Secure remote access to PC’s and resources on your network. This includes.
Computer networks Fundamentals of Information Technology Session 6.
Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy’s National Nuclear.
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
Back Up and Recovery Sue Kayton February 2013.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
Mobility Methods for document access while away from the office.
Group Policy in Microsoft Windows Active Directory.
Module 16: Software Maintenance Using Windows Server Update Services.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Course 201 – Administration, Content Inspection and SSL VPN
Chapter 5 Roles and features. objectives Performing management tasks using the Server Manager console Understanding the Windows Server 2008 roles Understanding.
Introduction to Active Directory December 10th, pm Daniels 407.
Test Review. What is the main advantage to using shadow copies?
GROUP POLICY An overview of Microsoft Windows Group Policy.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Terminal Services in Windows Server ® 2008 Infrastructure Planning and Design.
Adam Leidigh Brandon Pyle Bernardo Ruiz Daniel Nakamura Arianna Campos.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
VPN: An Easy Software / Appliance Solution for Remote Access Robert Gulick, EdD DBA/Technology Trainer Parma City School District
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
PPD Computing “Business Continuity” Windows and Mac Kevin Dunford May 17 th 2012.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Normalized Endpoint Computing Research Team Results PSU Technology Solution Mat B. & Alice S.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
Module 13: Maintaining Software by Using Windows Server Update Services.
Computer Basics   Active Directory and Domain   Profiles   Storage Services   Naming Conventions and File Management   Laptop Use.
70-411: Administering Windows Server 2012
Implementing Network Access Protection
Mobile Device Management Central Management of Wintel Laptop Software and Hardware in a Secure Environment.
Windows 2000 Operating System -- Active Directory Service COSC 516 Yuan YAO 08/29/2000.
Module 11: Remote Access Fundamentals
Module 8: Configuring Network Access Protection
Common Servers in a Workplace Environment Brandon Reynolds Computer Electronic Networking Dept. of Technology, Eastern Kentucky University.
Kevin Dunford – Windows Support & Development What do I do.. Support, configuration, and development of - Windows servers, desktops, Laptops, printers,
Brian Arkills Software Engineer, LDAP geek, AD guy, Chief Troublemaking Officer Windows HiEd Conference 2006 Managed Workstations: UW Nebula.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
How to use Remote Desktop and Remote Support. What is remote desktop? Remotely control your computer from another office, from home, or while traveling.
1 Windows 2008 Configuring Server Roles and Services.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
1 Evolution and Revolution: Windows 7 and Desktop Virtualization How to Accelerate Migration to Windows 7 Miguel Sian, Sr. Enterprise Solutions Consultant.
Module 8: Managing Terminal Services. Overview Use and manage Terminal Services RemoteApp programs Use and manage Terminal Services Gateway Optimize and.
CHAPTER 9 HARDENING SERVERS. C REATING A BASELINE POLICY Security parameters used to create a baseline installation can be configured using a Group Policy.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Windows 2000 Ronnie Park Jarod Nozawa Joe Stones Yassir Mhdhroui.
Introduction TO Network Administration
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Sydney Region Servers. Windows 2003 Standard Configuration Able to be supported remotely Antivirus updates managed from server.
1 Overview of Microsoft Windows 2000 Multipurpose OS Reduces total cost of ownership (TCO)
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Small Business Server common configurations and setup steps David Overton
Microsoft Administering Windows Server 2012 Pass Microsoft exam with 100% Guarantee 100% REAL EXAM QUESTIONS ANSWERS Get All PDF with Complete.
Dial-In Number: 1 (631) Webinar ID: FHC Tech Talk Automation and Efficiency Series Talk #1 Carbonite automated backup.
Self-service enrollment for Windows desktops
Managed Desktops :SSD IT Services Ammar Khan, Desktop solutions team
Citrix Online Training at GoLogica
Printers.
Back Up and Recovery Sue Kayton October 2015.
Implementing Client Security on Windows 2000 and Windows XP Level 150
Increase and Improve your PC management with Windows Intune
IT Management, Simplified
Division of Engineering Computing Services
Presentation transcript:

Anders Vinger, University of Oslo Personal Data Recovery The pain of laptops

Anders Vinger, University of Oslo Overview A bit about our environment The problems we face What we need to get rid of them What we are looking at and have implemented so far Questions

Anders Vinger, University of Oslo What do we have? ~12000 computer objects in Active Directory ~1500 laptops in AD. + An unknown number of laptops not in AD. (For various reasons) Our laptop-users are both researchers out in the field, home- users, and the executive type running between meetings. We have a centrally managed policy for which computers can be bought, that also dictates installation of our OS-image.

Anders Vinger, University of Oslo The issue Most of our users have a managed desktop at the office. But many also have a laptop, and they want everything they get at the office on that laptop. (Plus some extra freedom since they use it at home.) How do we replicate the environment from the office computer to that laptop? How do we backup the data? How do we protect the data from being stolen? The applications and the operatingsystem needs some love too.

Anders Vinger, University of Oslo Typical examples A department keeps a few spare laptops in a closet. Just in case. Of course they expect it all to work when they just grab one and fire it up. A user takes a trip to Hawaii for 6 months to do some research. A user prefers the desktop for storage space, works at home for a week on his laptop, shows up at work, and calls the helpdesk demanding to know what the **** we have done to his documents. And the ususal backup-issues... We have laptops that are on site, but they are on the wireless network, from which we dont allow laptops to log into active directory or map printers and drives.

Anders Vinger, University of Oslo So how would we like to solve it all? Networked storage for the laptops Printer access. Encryption software Synchronisation software Software maintenance that works on a roaming client. A way to make some of the laptops more managed

Anders Vinger, University of Oslo What actual solutions do we have? Our own image, with local GPOs as well as AD-GPOs WSUS-server (Windows Server Update Services) Some applications with automatic update functionality VPN Synchronisation software

Anders Vinger, University of Oslo What are we looking into? WebDAV, Web-based Distributed Authoring and Versioning IPP, Internet Printing Protocol NAC, Network Admission Control (Cisco) NAP, Network Access Protection (Microsoft) Encryption software, in essence; Bitlocker Tivoli for mobile endpoints Two SSIDs for the wireless network. Managed/Unmanaged

Anders Vinger, University of Oslo And my favourite (for some users)…. Remote Desktop! –Full access to all your apps, often already running, on your personal office computer –Your laptop can be cheap; wont need that much computing power. –If you loose it or break it, replacement is much less hazzle. All you need is a few basic applications. –Your data are safely tucked away at a network-drive mapped up to your office computer. –The communication is encrypted, if you worry about the encryption being broken, add another layer by tunneling it all through SSL.

Anders Vinger, University of Oslo Thats it. Questions? anders dot vinger at usit dot uio dot no