Windows 7 Enhanced Security And Control

Post on 01-Nov-2014

2,215 views 1 download

description

This is the Windows 7 launch IT Pro track session on Enhanced Security and Control.

transcript

Windows® 7 Enhanced Security and Control

PRESENTER NAMETITLEDATE

Protecting Users on their Desktops and Online

Extending Data Protection to Laptops and Removable Media

Agenda

Addressing Security Challenges and Solutions

IT Security Challenges

Flexible work styles Digital natives

Users

Cost versus agility Compliance

Business

Anywhere access Desktop control

Infrastructure

Windows Optimized DesktopEnhanced Security and Control with Windows 7

Make peopleproductive anywhere

Manage risks through

enhanced security and

control

Reduce costs by streamlining PC

management

Protect desktop and

mobile resources

• BitLocker™

• BitLocker To Go™

Enable more secure

Web browsing

• Internet Explorer® 8

Enforce compliance

• User Account Control

• AppLocker™

Protect DataProtect Data from Unauthorized Viewing

Encrypting File System (EFS) User-based file and folder encryption Ability to store EFS keys on a smart card

Active Directory® Rights Management Services (RMS)

Policy definition and enforcement Protection for information wherever it travels Integrated RMS client

BitLocker and BitLocker To Go Ease of configuration and deployment Ability to share data with coworkers, clients, partners, and

others Support for compliance and data security

BitLocker and BitLocker To Go

Increased Data Protection Extend BitLocker drive encryption to removable devices Create group policies to mandate the use of encryption

and block unencrypted drives Simplify BitLocker setup and configuration of primary

hard drive

+

BitLocker To GoOverview

demo

Internet Explorer 8 Security

Freedom from Intrusion

Limitation of social engineering and exploits Reduction of unwanted communications

Protection from Harm

Safeguards against browser and Web server exploits Protection from deceptive web sites, malicious code, online fraud,

identity theft

Control of Information

Choice and control Clear notice of information use—provide only what is needed

Introduction of UAC All users, including

administrators, run as standard user by default

Administrators use full privilege only for administrative tasks or applications

Ecosystem is influenced to write software requiring no admin rights

Challenges User provides explicit

consent Disabling UAC removes

protections

Simplified UAC Reduce number of

applications that require elevation

Re-factor applications into elevated and non-elevated pieces

Provide flexible, prompt behavior

Customer Value Standard users can do

more Administrators see

fewer UAC elevation prompts

User Account Control

Windows Vista Windows 7

AppLocker

Challenges Users can install and run non-standard applications Even standard users can install some types of software

Solution Eliminate unwanted, unknown applications in your

network Enforce application standardization within your

organization Easily create and manage flexible rules using Group

Policy

AppLockerOverview

demo

Session Summary

Provide a fundamentally secure platform Protect desktop and mobile resources Provide more secure Web browsing Enforce compliance

Learn More About Windows 7

Technical Resources

The New Efficiency Virtual Launch Experience Windows 7 Springboard Windows 7 Webcasts and Podcasts

Get Hands on Training

Training Offers—Exclusive for Launch Attendees

Community Resources

Windows Team Blog Talking About Windows Windows Client Forums

www.windowsteamblog.com

www.talkingaboutwindows.com

http://go.microsoft.com/?linkid=9681314.5

www.microsoft.com/learning/careeroffers

www.thenewefficiency.com

www.microsoft.com/springboard

http://go.microsoft.com/?linkid=9681312

© 2009 Microsoft Corporation. All rights reserved. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the

date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.