Presentation is loading. Please wait.

Presentation is loading. Please wait.

Paul Cooke - CISSP Director Microsoft Session Code: CLI322.

Similar presentations


Presentation on theme: "Paul Cooke - CISSP Director Microsoft Session Code: CLI322."— Presentation transcript:

1

2 Paul Cooke - CISSP Director Microsoft Session Code: CLI322

3 Protecting Your Digital Assets Traditional ways Standard user, strong authentication, … Anti-virus, firewall, IDS, … Data access control policies Access Control Policies (ACLs) DRM, encryption, … However… Any software running on the user’s behalf has the same access to data as the user running it

4 Application Control - Situation Today Users can install and run non-standard applications Even standard users can install some types of software Unauthorized applications may: Introduce malware Increase helpdesk calls Reduce user productivity Undermine compliance efforts

5 Windows 7 AppLocker TM Eliminate unwanted/unknown applications in your network Enforce application standardization within your organization Easily create and manage flexible rules using Group Policy

6 Simple Rule Structure Allow Limit execution to “known good” and block everything else Deny Deny “known bad” and allow execution of everything else Exception Exclude files from allow/deny rule that would normally be included “Allow all versions greater than 12 of the Office Suite to run if it is signed by the software publisher Microsoft EXCEPT Microsoft Access.”

7 Publisher Rules Rules based upon application digital signatures Can specify application attributes Allow for rules that survive application updates “Allow all versions greater than 12 of the Office Suite to run if it is signed by the software publisher Microsoft.”

8 Rule Targeting Rules can be associated with any user or group Provides granular control of specific applications Supports compliance by enforcing who can run specific applications “Allow users in the Finance Department to run…”

9 Multiple Rule Sets Rule Types Executable Installer Script DLL Allows construction of rules beyond executable only solutions Provides greater flexibility and enhanced protection “Allow users to install updates for Office as long as it is signed by Microsoft and is for version 12.*”

10 Rule Creation Wizards Step-by-step approach Fully integrated help Rule creation modes Manual Automatically generated Import / Export Intuitive so that rules are easy to create and maintain

11 Audit Only Mode Test rules before enforcement Events written to local audit log Applications and Service Logs | Microsoft | Windows | AppLocker PowerShell cmdlets Turn audit events into rules

12 PowerShell Cmdlets Core needs scriptable through PowerShell Building blocks for a more streamlined end-to-end experience Inbox cmdlets Get-AppLockerFileInformation Get-AppLockerPolicy Set-AppLockerPolicy New-AppLockerPolicy Test-AppLockerPolicy

13 PowerShell Example Scenario Test-AppLocker Policy New- AppLocker Policy Get-AppLocker FileInformation Retrieve file information from event log Create a new policy Test the new policy Set-AppLocker Policy Set the policy Help DeskLocal or GPO Admin Bob calls Help Desk because AppLocker has blocked a finance application that he really needs to run for his job. Help Desk agrees to temporarily add a rule to local GPO to allow the program.

14 Custom Error Messages Configurable in Group Policy Computer Configuration | Administrative Templates | Windows Components | Windows Explorer | Set a support web page link Sets URL for Support Web page that is displayed to the user

15 Architectural Overview Process 1 Appid.sysAppid.sys AppIDAppID SRP Kernel AppID/SRP Service SRP UM ntoskrnlntoskrnl Process 2 ntdllntdll Process 3

16 AppLocker

17 Deployment Best Practices Create a desktop lockdown strategy Inventory your applications Select and test rule types (allow / deny) in a lab Define GPO strategy and structure Build a process for managing rules Document your AppLocker design Build reference computers Test and update the policy using audit-only Enable rule enforcement Maintain the policy

18 Key Takeaways AppLocker helps the enterprise protect its digital assets by preventing unwanted software from running AppLocker provides an improved management experience making it easier to maintain a list of approved applications AppLocker helps reduce support and license related costs by standardizing execution environments

19 Call To Action Everyone – Adopt Signed Applications Signed code comes with a higher assurance of authenticity and integrity If you are developing applications – sign them If you are using applications – ask for them to be signed

20 Call To Action Enterprise Customers Review your defense in depth strategy Consider allow-listing applications ISVs Leverage this opportunity by building solutions Develop solutions for enterprises as they adopt application allow-listing

21

22 www.microsoft.com/teched Sessions On-Demand & Community http://microsoft.com/technet Resources for IT Professionals http://microsoft.com/msdn Resources for Developers www.microsoft.com/learning Microsoft Certification & Training Resources Resources

23 Complete an evaluation on CommNet and enter to win an Xbox 360 Elite!

24 © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.


Download ppt "Paul Cooke - CISSP Director Microsoft Session Code: CLI322."

Similar presentations


Ads by Google