Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security Configuration Wizard - how to make your systems only do the things you need them to! Steve Lamb IT Pro Evangelist for Security Technologies

Similar presentations


Presentation on theme: "Security Configuration Wizard - how to make your systems only do the things you need them to! Steve Lamb IT Pro Evangelist for Security Technologies"— Presentation transcript:

1

2 Security Configuration Wizard - how to make your systems only do the things you need them to! Steve Lamb IT Pro Evangelist for Security Technologies Stephen.lamb@microsoft.com http://blogs.technet.com/steve_lamb

3 Our network is secure, right? Oh sure, Don’t worry. We have several firewalls

4 Your network is not secure! At best, it is protected Protected networks are well-designed, well-managed networks, with savvy users The Truth

5 If I just open a bunch of ports in the firewall my app will work. Say, we run a network too. How do you configure your firewalls? Bad Practices Spread Why You Need Policies I think I will wedge the computer room door open. Much easier. They have blocked my favorite Web site. Lucky I have a modem. I think I will use my first name as a password. Why do we need the door locked? Hey, nice modem. What's the number of that line? I can never think of a good password. What do you use?

6 People, Policies, and Process Defense In Depth Physical Security Perimeter Internal Network Host Application Data

7 The Security Management Problem Security management is about spending good money to have nothing happen

8 The Security Administrators Pledge I pledge commitment To the patches Issued for the systems I run And to the challenges That security presents One network Now protected With services and data for all

9 Use Some Hardening Guide

10 Rolling Back The Guide

11 Roles Your System Can Fill Now

12 Agenda Introduction to SCW Tool summary Server roles Operational coverage/scope SCW extensibility

13 We Can’t Provide Physical Security

14 Print Server Base Role SCW Targeting Configuration Guidance

15 Demo Why Talk About It When You Can Show It?

16 For More Information http://www.microsoft.com/SCW

17 © 2005 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary. Steve Lamb IT Pro Evangelist for Security Technologies Stephen.lamb@microsoft.com http://blogs.technet.com/steve_lamb Thanks to Jesper Johansson for the slides

18 For Even More Information Jesper and Steve finally wrote a book! Order online: http://www.awprofessional.com/title/03213 36437 Use promo code JJSR6437


Download ppt "Security Configuration Wizard - how to make your systems only do the things you need them to! Steve Lamb IT Pro Evangelist for Security Technologies"

Similar presentations


Ads by Google