rodney buike it pro advisor, microsoft canada [email protected]...

15
Data Security Tools Rodney Buike IT Pro Advisor, Microsoft Canada [email protected] Http://blogs.technet.com/canitpro

Upload: ivy-lillie

Post on 01-Apr-2015

220 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro

Data Security Tools

Rodney BuikeIT Pro Advisor, Microsoft [email protected]://blogs.technet.com/canitpro

Page 2: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro

Facts

Laptop adoption is on the rise and expected to replace desktops

750,000 notebooks reported stolen in 2006

Up to 80% of corporate data stored on local drives

Page 3: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro

Internal threats are just as prevalent as external threats

IntentionalAccidental Targeted

Data intentionally compromised

Thief steals asset based on value of

data

Loss due tocarelessness

System disposal or repurposing without data wipeSystem physically lost in transit

Insider access to unauthorized dataOffline attack on lost/stolen laptop

Theft of branch office server (high value and volume of data)Theft of executive or government laptopDirect attacks with specialized hardware

Information Protection Threats

Page 4: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro

How do I adress these issues?

Security Guidance

Data Encryption Toolkit

Malware Removal Kit

Vista Security Technologies

Page 5: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro

Security Guidance

Page 6: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro

Data Encryption ToolkitThe Executive Overview - business and regulatory perspective of how mobile data is at risk

The Security Analysis - in-depth review of how EFS and BitLocker address the unique risks associated with data on mobile PCs.

The Planning and Implementation Guide - how to plan for, configure, deploy, and operate EFS and BitLocker in your organization.

The Microsoft Encrypting File System Assistant - a software tool you can use to centrally control EFS settings on all your PCs

Page 7: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro

EFS Assistant

Configure and Run EFS Assistant

demo

Page 8: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro

Malware Removal Kit

Guidance for IT professionals who want information and recommendations to remove and limit malware that infects computers Guidance on creating an incident response planHow to determine if a system has malwareStep by step on building WinPE based clean up disk

Page 9: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro

Malware Removal Kit

Build and Run Malware Removal Tool

demo

Page 10: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro

User Account Control

Page 11: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro

BitLocker™ Drive Encryption

Designed specifically to prevent a thief who boots another Operating System or runs a hacking tool from breaking Windows file and system protectionsProvides data protection on your Windows client systems, even when the system is in unauthorized hands or is running a different or exploiting Operating SsystemUses a v1.2 TPM or USB flash drive for key storage

BitLocker

Page 12: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro

BitLocker & UAC

Configuring Policy Settings

demo

Page 13: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro

Other Tools

GPO Accelerator

Microsoft Security Assessment Tool

Microsoft Baseline Security Analyzer 2.1

Best Practices Analyzers ExchangeSQLISASBS 2003

Page 14: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro

Resources

http://www.microsoft.ca/security

http://blogs.technet.com/canitpro

http://blogs.technet.com/cdnitmanagers

Page 15: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro