© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,

Slides:



Advertisements
Similar presentations
Selecting the Right Network Access Protection (NAP) Architecture Infrastructure Planning and Design Published: June 2008 Updated: November 2011.
Advertisements

Tech·Ed North America /6/2017 9:33 AM
Network Access Protection & Network Admission Control March 10, 2005 Teerapol Tuanpusa Network Consultant Cisco Systems Thailand Jirat Boomuang Technology.
5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
May 30 th – 31 st, 2006 Sheraton Ottawa. Network Access Protection Gene Ferioli Program Manager Customer Advisory Team Microsoft Corporation.
Agenda Introduction Network Access Protection platform architecture
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
Unleashing the Power of Ubiquitous Connectivity with IPv6 Sandeep K. Singhal, Ph.D Director of Program Management Windows Networking.
Module 3 Windows Server 2008 Branch Office Scenario.
Providing 802.1X Enforcement For Network Access Protection Mudit Goel Development Manager Windows Enterprise Networking Microsoft Corporation.
Ronald Beekelaar Beekelaar Consultancy Forefront Overview.
Copyright© Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 Tightening the Network: Network.
Network Access Protection Platform Architecture Joseph Davies Technical writer Windows Networking and Device Technologies Microsoft Corporation.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Ronald Beekelaar Beekelaar Consultancy Forefront Overview.
Jayson Ferron CIO Interactive Security Training WSV206.
Security and Policy Enforcement Mark Gibson Dave Northey
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Chris Sfanos Program Manager Forefront Client Security Microsoft Session Code: SW17.
Windows Clients and Windows Server 2008 NAP: Session objectives See why using the built functionality of Windows in both.
Getting Ready for Network Access Protection Jeff Alexander Technology Advisor Microsoft.
Sreenivas Addagatla - Development Lead Lambert Green - Test Lead Microsoft Corporation.
Windows Server 2008 Network Access Protection (NAP) Technical Overview.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Cliff Evans Security and Privacy Lead Trustworthy Computing Group Microsoft UK.
Security of Communication & IT systems Bucharest, 21 st September 2004 Stephen McGibbon Chief Technology Officer, Eastern Europe, Russia & CIS Senior Director,
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Wally Mead Senior Program Manager Microsoft Corporation.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Clinic Security and Policy Enforcement in Windows Server 2008.
Small Business Edition 4 C707 – Technical overview.
Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Open Standards for Network Access Control Trusted Network Connect.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Selecting the Right Network Access Protection Architecture
70-411: Administering Windows Server 2012
Implementing Network Access Protection
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Module 8: Configuring Network Access Protection
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
Configuring Network Access Protection
Yaniv Feldman Senior Infrasec Architect Microsoft Security Regional Director
May 30 th – 31 st, 2007 Chateau Laurier Ottawa. Securing Your Network – End to End Connectivity Pat Fetty Senior Program Manager Windows Customer Advisory.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
NAC-NAP Interoperability
Virtual Machine Management Challenges What are Solution Accelerators? Offline Virtual Machine Servicing Tool Next Steps.
Module 6: Network Policies and Access Protection.
Service Pack 2 System Center Configuration Manager 2007.
Connect with life Ravi Sankar Technology Evangelist | Microsoft Corporation Ravisankar.spaces.live.com/blog.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Module 5: Network Policies and Access Protection
Securing Tomorrow’s World Microsoft Security Roadmap Ed Gibson & Steve Lamb Microsoft Ltd.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Provided Under NDA - Secure Access to Corporate Resources.
Managing Network Access Protection. Introduction to NAP Issues  Although corporate networks are highly secured, no control over the configuration of.
Click to edit Master title style TechNet goes virtual ©2009 Microsoft Corporation. All Rights Reserved. TechNet goes virtual NAP and NPS in Windows Server.
D-Link Wireless AP with NAP 802.1x solution
Implementing Network Access Protection
Forefront Security ISA
Deriving more value from your Windows investment
{ Security Technologies}
Microsoft Virtual Academy
NAP / PWG Discussion August 17, 2009.
Empowering Security Communities
Presentation transcript:

© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Network Access Protection Working to ensure that laptops don’t infect your network with malware – without buying yet another product

“Third-party security vendors will want to be part of the NAP party” Alan Stevens, IT Week, 30 July

How do you deal with managing the health of machines connecting to your network? Owned Assets Guests \ Consultants Uninvited Visitors

The four elements of NAP NAP is a health solution ! Health Policy Validation Network Restriction Remediation Ongoing Compliance

Network Protection with NAP Requesting access. Here’s my new health status. MS NPS Client VISTA XP SP3 Network Access Device Remediation Servers May I have access? Here’s my current health status. Should this client be restricted based on its health? Ongoing policy updates to Network Policy Server You are given restricted access until fix-up. Can I have updates? Here you go. According to policy, the client is not up to date. Quarantine client, request it to update. Restricted Network Client is granted access to full intranet. System Health Servers According to policy, the client is up to date. Grant access.

NAP Architecture Client SHA – System Health Agents check client state Nap Agent – Coordinates SHA/EC EC – Enforcement Client controls network access Remediation Server Serves up patches, AV signatures, etc. Network Policy Server NAP Server – evaluates client health SHV - System Health Validator evaluates SHA answer from clients System Health Server – Management \ Health products like System Center Configuration Manager NPS Policy Server (RADIUS) NAP Server Client NAP Agent Health policy Updates Health Statements Network Access Requests System Health Servers Remediation Servers Health Certificate Network Access Devices Certificate Services (IPSEC) (SHA) MS SHA, SMS (SHA) MS SHA, SMS System Health Validator (EC) (DHCP, IPSec, 802.1X, VPN ) (SHA) 3 rd Parties (SHA) 3 rd Parties (EC) 3 rd Party EAP VPN’s

NAP - Enforcement Options

What health items can NAP assess? Any application that integrates with the Windows Security Center Firewall Status Automatic Updating Antivirus - Enbabled and Up to Date On Vista: AntiMalware – Enabled and up to date Microsoft System Center Configuration Manager 2007 for software updates. Microsoft Forefront Client Security A range of third health and management products

What do I need to make this work? At least one Windows Server 2008 Network Policy Server Clients must be running Windows XP SP3, Vista or Windows Server 2008 MAC \ Linux clients? We have partners delivering solutions A deployment plan: Reporting Mode Deferred Enforcement Enforcement

NAP works with the Industry Rich Platform APIs for network, security and management ISVs/IHVs Broadly Adopted 120+ partners developing solutions on NAP Anti Virus, network, security vendors + System Integrators Most Interoperable network health Solution Tested with over 98% of switch and access point market Integration with 3 rd party VPN underway Standards NAP Protocol now adopted by Trusted Computing Group as a standard mechanism for communicating health! Protects your customers investments

What is Microsoft Forefront? Microsoft Forefront is a comprehensive line of business security products providing greater protection and control through integration with your existing IT infrastructure and through simplified deployment, management, and analysis. Edge Client and Server OS Server Applications

IT Service Management Data Protection Manager ‘Service Desk’ Capacity Planner Reporting Manager Operations Manager Client Data Storage & Recovery Problem Management Capacity Management IT Reporting Client Operations Management Configuration Manager Operations Manager Performance & Availability Monitoring Software Update & Deployment Microsoft System Centre Enabler for Microsoft’s Best Practices Microsoft Operations Framework Infrastructure Optimization

Call to action Don’t buy another product without looking closely at the features you’ve already paid for! Stop.

Next steps Receive the latest Security news, sign-up for the: Microsoft Security Newsletter Microsoft Security Notification Service Assess your current IT security environment Download the free Microsoft Security Assessment Tool Find all your security resources here

Session Evaluation Hand-in you session evaluation on your way out Win one of 2 Xbox 360 ® Elite’s in our free prize draw* Winners will be drawn at 3.30 today Collect your goody bag which includes. Windows Vista Business (Upgrade), Forefront Trials, Forefront Hand-On-Labs Security Resources CD I’ll be at the back of the room if you have any questions * Terms and conditions apply, alternative free entry route available.