150 likes | 365 Views
Implementing Client Security on Windows 2000 and Windows XP Level 150. Sandeep Modhvadia Security Technical Specialist http://blogs.msdn.com/sandeepm deep@microsoft.com. The Defense-in-Depth Model. Policies, Procedures, & Awareness. Physical Security. Data. ACLs, encryption, EFS.
E N D
Implementing Client Security on Windows 2000 and Windows XPLevel 150 Sandeep Modhvadia Security Technical Specialist http://blogs.msdn.com/sandeepm deep@microsoft.com
The Defense-in-Depth Model Policies, Procedures, & Awareness Physical Security Data ACLs, encryption, EFS Application Application hardening, antivirus OS hardening, authentication, patch management, HIDS Host Internal Network Network segments, IPSec, NIDS Firewalls, Network Access Quarantine Control Perimeter Guards, locks, tracking devices Security documents, user education
Implementing Network & Perimeter Security Next Implementing Advanced Server and Client Security Wednesday: 11:00 – 1215 Implementing Application & Data Security Wednesday: 0930 – 1045 Wireless Security: Let the Nightmare End! Wednesday: 15:50 – 17:05
Client Attack Vectors Malicious Web content Malicious e-mail attachments Buffer overrun attacks Port-based attacks
Enterprise Attack Vectors Potentially infected remote client Potentially infected local client
Threats Vectors & Countermeasures • Group Policy Overview • Web / Email • Applications • Remote Network Attacks • WorkStation Lockdown • Remediation
Group Policy Overview • Centralised management & control • The Windows XP administrative templates have over 850 settings • The Windows XP Security Guide includes 10 additional administrative templates • Two domain templates that contain settings for all computers in the domain • Two templates that contain settings for desktop computers • Two templates that contain settings for laptop computers • Registry & Local Admin • Scripts and Local Policy
Web / Email • Browser Lockdown • Disable Everything? • Sign Active X • Add on manager • URL Access lists • Trusted Sites prevents phishing • Pop Ups • Security risk – not just a nuisance • Attachments / SPAM • Stop unmanaged IM • Internal Applications • Internet Explorer 7
Applications • Patching Applications (& Servers) • Hardening Applications • Windows/Microsoft Update Services • Application Data • No Execute – hardware / software (GS Flag) • Internet Connectivity • Application Trust • Software Restriction Policies • Administrator Access
Remote Network Attacks • Windows Firewall • Boot Time Protection • Roaming Profiles / Management • 3rd Party Integration • Egress Filtering • Wireless Security • SSID, Macs, WEP, WPA • Remote Access • VPN, SSL Apps, Web Apps
Local Threats • Local Administrators • Strong Passwords • Access Control Lists & Encryption • Hard Drive Removal • Cracking Tools • Keyloggers….. • Auditing • BIOS Locks • Multi Factor Authentication • Locking Machines • USB / Devices
Countermeasures • Firewalls • Antivirus / Anti Spyware • Application / OS Lockdown • Patch Management • User education
Event Information What’s Next? Technical Roadshow Post Event Website www.microsoft.com/uk/techroadshow/postevents Available from Monday 18th April Please complete your Evaluation Forms
© 2004 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only.MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.