Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.

Slides:



Advertisements
Similar presentations
Ljubomir Ivaniš CPU d.o.o.
Advertisements

2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Introduction to Systems Management Server 2003 Tyler S. Farmer Sr. Technology Specialist II Education Solutions Group Microsoft Corporation.
System Center Operations Manager 2007 Management Pack Roadmap (Apr/May 2008)
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Ronald Beekelaar Beekelaar Consultancy Forefront Overview.
HP and Microsoft Solutions for the Midsize Business Presented by: Adaptive Infrastructure for Midsize Businesses Plaza Dynamics HP Alternative Thinking.
Ronald Beekelaar Beekelaar Consultancy Forefront Overview.
Security and Policy Enforcement Mark Gibson Dave Northey
Hands-On Microsoft Windows Server 2003 Networking Chapter 1 Windows Server 2003 Networking Overview.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
Smart Card Deployment David Gautrey IT Manager – Microsoft New Zealaand Microsoft Corporation.
SP2 Mikael Nystrom. Agenda Översikt Installation.
Cliff Evans Security and Privacy Lead Trustworthy Computing Group Microsoft UK.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Tim Vander Kooi Systems
Successful Deployment and Solid Management … Close Relatives Tim Sinclair, General Manager, Windows Enterprise Management.
70-411: Administering Windows Server 2012
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Module 11: Remote Access Fundamentals
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
Uwe Lüthy Solution Specialist, Core Infrastructure Microsoft Corporation Integrated System Management.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Configuring Network Access Protection
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Module 3: Planning Administrative Access. Overview Determining the Appropriate Administrative Model Designing Administrative Group Strategies Planning.
System Center Lesson 4: Overview of System Center 2012 Components System Center 2012 Private Cloud Components VMM Overview App Controller Overview.
Agency Introduction to DDM Dell Desktop Manager (DDM) Implementation.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
MICROSOFT TESTS /291/293 Fairfax County Adult Education Courses 1477/1478/1479.
The Business of IT How Microsoft does IT William McKnight Microsoft IT Microsoft Corporation.
1 Overview of Microsoft Windows 2000 Multipurpose OS Reduces total cost of ownership (TCO)
Secure Network Connectivity Claus Jespersen Solution Architect (the new) HP
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
Master Expert Associat e Microsoft Certified Solutions Master (MCSM) Microsoft Certified Solutions Expert (MCSE) Microsoft Certified Solutions Associate.
Bridging The Gap between Development and Production Kevin Sangwell Infrastructure Architect Microsoft Regional Head Quarters.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Dev and Test Solution reference architecture.
Basharat Institute of Higher Education
Secure Connected Infrastructure
Fourth Dimension Technologies
Introduction to Windows Server 2008
Dev and Test Solution reference architecture.
Dev and Test Solution reference architecture.
Implementing Network Access Protection
2016 Citrix presentation.
Dev and Test Solution reference architecture.
Security Insights: How Microsoft Secures IT
Dev and Test Solution reference architecture.
Infrastructure, Data Center & Managed Services
Goals Introduce the Windows Server 2003 family of operating systems
Dev and Test Solution reference architecture.
Implementing Client Security on Windows 2000 and Windows XP Level 150
5/12/2019 2:57 PM © Microsoft Corporation. All rights reserved.
Designing IIS Security (IIS – Internet Information Service)
In the attack index…what number is your Company?
Presentation transcript:

Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and digital assets

Tokyo Dublin Singapore 3M+ messages per day internally 99.99% availability 99.99% availability 104,000 end users 83 countries 334,000+ PCs and devices 9,000 Servers 10,000 network devices Single Instance SAP (1.9Tb Db) 441 buildings 9.5M+ remote connections/month 111,000+ server accounts Redmond Reno SVC(BC/DR)

Centralized IT operations Reduced operation costs Required for effective standardization Federated Business Systems Groups Regional representation Account managers are the “face” of IT in regions Provides understanding of local business and cultural issues Allows for local accountability and involvement with the business – Links IT service levels directly to localized business drivers

Centralization Monitoring and Incident Management centralized Centralized change and release processes Remote Server to staff ratio of 450:1 143 offices connected over internet Consolidation A 30% reduction in Infrastructure Servers Microsoft exchange down from 74 to 4 sites globally More than 1500 virtual machines at 16:1 guest to host ratio Microsoft DPM (eliminated 115 tape libraries) Automation 85% alerts auto- ticketed Decreased duplicate/ NPF tickets by 90%. Alert/ ticket ratio of 1.4 Single MOM console

Core Infrastructure Management Services Network Operations Data Center Server Operations Telephony Operations Database Operations Application performance monitoring Desktop Management Patch management Software deployment Image management Data Protection Services Identity Management Messaging and Collaboration Support Virtual Server and Storage utilities

MOM 2007 Centralized Management Console IT Config CMDB Trouble Ticketing Third-Party Network Events Server MOM 2007 Events Messaging Events LOB Application Events Out-of-box integration Custom integration

Remote access clients/dial-up Workgroups Secure Net Devices ~270,000 Labs & Pilots ~38,000 Devices managed through SMS: ~265,000 IPSec Datacenter : ~16,000 Desktops : ~211,000 Separate SMS Hierarchies ● Cooperative computer management model ● IT & users working together ● Other misc. special testing hierarchies ● Completely centralized administration All Devices ~330,000

Mitigate risk to the infrastructure through implementation of four key strategies Enforce Secure Key Assets Secure the Network Interior Secure the Network Perimeter Secure Wireless Smart Cards for RAS Network Access Protection Patch Management IPsec Segmentation Smart Cards for Admin Access IPSec for key assets Strong enforcement

Wireless Access Point User Provisioning ISA configuration (FW) & Policies Wireless Access Point Forwarding ACLs RRAS/ISA SE (VPN) configuration & policies ISA (Proxy) Configuration & policies ISA (FW) configuration & policies Router ACLs Router IAS / NAP configuration & policies DHCP configuration & policies Health Certificate Server (PKI) configuration & policies ADAM User Provisioning SharePoint Domain Controller Wireless Access Point LOB App Domain Controller Router ACLs Forwarding ACLs Fix up resources PKI configuration & policies User Provisioning Domain Controller SharePoint LOB App Forwarding & Infrastructure ACLs RRAS configuration & policies Infrastructure ACLs Forwarding & Infrastructure ACLs

Guidance Developer Tools Systems Management Active Directory Federation Services (ADFS) Identity Management Service s Information Protection Encrypting File System (EFS) BitLocker™ Network Access Protection (NAP) Client and Server OS Server Applications Edge