+ All Categories
Home > Documents > { Security Technologies }

{ Security Technologies }

Date post: 22-Feb-2016
Category:
Upload: wayde
View: 30 times
Download: 0 times
Share this document with a friend
Description:
{ Security Technologies }. Steve Lamb Technical Security Advisor, Microsoft UK http://blogs.technet.com/steve_lamb [email protected]. ”Effective Security”. Agenda. Overview of Windows Server 2008 Security Windows Service Hardening Network Access Protection - PowerPoint PPT Presentation
Popular Tags:
21
{ Security Technologies} Steve Lamb Technical Security Advisor, Microsoft UK http://blogs.technet.com/steve_lamb [email protected]
Transcript
Page 1: { Security Technologies }

{ Security Technologies}

Steve LambTechnical Security Advisor, Microsoft UKhttp://blogs.technet.com/[email protected]

Page 2: { Security Technologies }
Page 3: { Security Technologies }

”Effective Security”

Page 4: { Security Technologies }

Agenda• Overview of Windows Server 2008 Security• Windows Service Hardening• Network Access Protection• Read-Only Domain Controllers• AD Rights Management• Auditing• Resources

Page 5: { Security Technologies }

Windows Server 2008 SecurityArchitecture

Network Access Protection

Read-Only Domain Controller

AD Rights Management Services

Auditing

Page 6: { Security Technologies }

U UU

Windows Services are profiledReduce size of high risk layersSegment the servicesIncrease number of layers

Kernel DriversK

U User-mode Drivers

KK K

Service 1

Service 2

Service 3

Service…

Service …

Service A

Service B

Windows Services Hardening

Page 7: { Security Technologies }

Where is the boundary?

?

Page 8: { Security Technologies }

Network Access Protection

Customers

Partners

Remote Employees

Intranet

Internet

Page 9: { Security Technologies }

Network Access ProtectionHow It Works

Access requested

Health state sent to NPS (RADIUS)

NPS validates against health policy

If compliant, access granted

If not compliant, restricted network access and remediation

Microsoft NPS

Corporate Network

Policy Serverse.g.., Patch, AV

DCHP, VPNSwitch/Router

RestrictedNetwork

Remediation Serverse.g., Patch

Not policy compliant

Policy compliant

1

35

4

1

3

45

2

2

Page 10: { Security Technologies }

Read-Only Domain Controller

Main Office Branch Office

RODC

Page 11: { Security Technologies }

AD Rights Management

• Do NOT Forward–Let’s have a look @ my email

Page 12: { Security Technologies }

How does RMS work?

Author using Office The Recipient

Windows Server running RMS

SQL Server

Active Directory

2

3

4

5

13

Page 13: { Security Technologies }

Federated Rights Management

AD AD

AccountFederationServer

ResourceFederationServer

AdatumContoso

Federation Trust

RMS

WebSSO

Page 14: { Security Technologies }

Auditing - ComparisonWindows Server 2008Windows Server 2003

Page 15: { Security Technologies }

Updated Event Viewer

Page 16: { Security Technologies }

Is EFS Dead?

?

Page 17: { Security Technologies }

A Quick Review

BitLocker

Page 18: { Security Technologies }

New Windows Firewall• Inbound and Outbound

Filtering• New Management MMC• Integrated Firewall and

IPsec Policies• Rule Configuration on Active

Directory Groups and Users• Support for IPv4 and IPv6• Advanced Rule Options• On by Default (Beta 3)

Page 19: { Security Technologies }

Untrusted

Unmanaged/Rogue Computer

Domain Isolation

Active Directory Domain Controller

X

Server Isolation

Servers with Sensitive DataHR Workstation

Managed Computer

X

Managed Computer

Trusted Resource Server

Corporate Network

Define the logical isolation boundariesDistribute policies and credentialsManaged computers can communicateBlock inbound connections from untrustedEnable tiered-access to sensitive resources

Server and Domain Isolation

Page 20: { Security Technologies }

Crypto Next Generation (CNG)

• Native AES 256 in the Kernel• Can plug in new algorithms• FIPS 140-2

Page 21: { Security Technologies }

Please fill in your Evaluation Form


Recommended