1 / 29

May 25 – June 15, 2006

May 25 – June 15, 2006. Technical Overview. Damir Bersinic IT Pro Advisor Microsoft Canada damirb@microsoft.com. Bruce Cowper IT Pro Advisor Microsoft Canada bcowper@microsoft.com. http://blogs.technet.com/canitpro. Session Goals:.

Télécharger la présentation

May 25 – June 15, 2006

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. May 25 – June 15, 2006

  2. Technical Overview Damir Bersinic IT Pro Advisor Microsoft Canada damirb@microsoft.com Bruce Cowper IT Pro Advisor Microsoft Canada bcowper@microsoft.com http://blogs.technet.com/canitpro

  3. Session Goals: • Provide insight into how Vista fits in your environment • Showcase Vista security • How To’s: configuration and management of Windows Vista • Best Practices, Tools and Tips

  4. Agenda • Key Vista User Enhancements • Monitoring and Task Scheduling • Centralized Security Management • Protecting the OS

  5. Breakthrough Windows Aero and Basic experiences • Desktop Search and Organization • Internet Explorer 7 • Windows Sidebar • Performance • XPS Documents • Better together with Office 2007 Empowered Professional

  6. demonstration Windows Vista Features User Interface Enhancements Enhanced Search Internet Explorer 7 Family Safety Settings

  7. Agenda • Key Vista User Enhancements • Monitoring and Task Scheduling • Centralized Security Management • Protecting the OS

  8. New Event Reporting Standards Infrastructure Enhanced Windows Vista Event Logging More Components Producing Events Event Forwarding Event Logging in Windows Vista

  9. Reusable Views

  10. Cross Log Query Cross Log Queries

  11. Forwarded Events SEA-DC-01 SEA-WRK-002 SEA-WRK-001

  12. Launch tasks at specific times Specific event occurs User logs on Computer is idle Task Scheduler

  13. demonstration Event Management and Task Scheduling Creating a cross log query and reusable view Event forwarding Attaching a Task to an event Creating a new Task

  14. Agenda • Key Vista User Enhancements • Monitoring and Task Scheduling • Centralized Security Management • Protecting the OS

  15. Security Pain Points Users over-privileged Spyware and Viruses Lost Productivity Administrative Cost Secure by Default

  16. Foundational Protection

  17. Windows Defender Wireless and Wired Configuration Version 7.0 Network Access Protection Public Key Policy Configuration Integrated IE 7.0 Policy Settings Security Enhancements

  18. IPsec Windows Firewall

  19. Getting The Right Set Of Policy Settings In Windows Vista Policy Settings Highlights • Power savings potential via GP control of power management • Granular control over USB devices • Integration of the Firewall and IPSec* • IE Settings controlled via Group Policy More Control and Flexibility GPMC Integration Support for multiple local GPOs Search/Sort/ Filter and Templates (SP1) Language- and network-aware

  20. demonstration Securing Windows Vista Using Group Policy USB and Device Locks User Account Controls IE7 Settings Windows Firewall

  21. Agenda • Key Vista User Enhancements • Monitoring and Task Scheduling • Centralized Security Management • Protecting the OS

  22. 63% 36% 35% 22% 22% 20% Information Leakage Is Top-of-mind With Business Decision Makers Virus infection Unintended forwarding of emails Loss of mobile devices Password compromise Email piracy Loss of digital assets, restored 0% 10% 20% 30% 40% 50% 60% 70% “After virus infections, businesses report unintended forwarding of e-mails and loss of mobile devices more frequently than they do any other security breach” Jupiter Research Report, 2004

  23. Policy Definition & Enforcement Rights Management Services User-Based File System Encryption Encrypted File System Hardware-Based Disk Encryption Full Volume Encryption Windows Vista Data Protection

  24. Designed specifically to prevent a thief who boots another Operating System or runs a hacking tool from breaking Windows file and system protections Provides data protection on your Windows client systems, even when the system is in unauthorized hands or is running a different or exploiting Operating Ssystem Uses a v1.2 TPM or USB flash drive for key storage BitLocker™ Drive Encryption BitLocker

  25. ******* Different BitLocker Configurations USB Dongle TPM Chip TPM Chip and Pin TPM Chip and USB Dongle

  26. demonstration Protecting the OS Administrative tasks to protect the OS Enabling BitLocker™ Drive Encryption

  27. Session Summary • Windows Vista’s user interface provides a cleaner environment to work in • Windows Vista is Secure by Design • Group Policy enhancements allow you to more easily and completely control desktops • BitLocker™ Drive Encryption secures the hard disk

  28. For More Information… • Main TechNet Canada Web site at www.microsoft.ca/technet • Windows Vista Main Web Site http://www.microsoft.com/windowsvista • Canadian IT Pro Blog http://blogs.technet.com/canitpro

  29. Join us for the next session on: Microsoft Office 2007 – Working Together Better

More Related