380 likes | 1.09k Views
MGT310. Microsoft System Center 2012 Endpoint Protection Overview. Mark Florida Principal Program Manager Lead Microsoft Corporation. Adwait Joshi (AJ) Product Marketing Manager Microsoft Corporation. Session Objectives And Takeaways. Session Objectives: The evolution of malware
E N D
MGT310 Microsoft System Center 2012 Endpoint Protection Overview Mark Florida Principal Program Manager Lead Microsoft Corporation AdwaitJoshi (AJ) Product Marketing Manager Microsoft Corporation
Session Objectives And Takeaways • Session Objectives: • The evolution of malware • Overview of System Center 2012 Endpoint Protection • Demos on EP client installation and management+security • Overview of the Endpoint Protection client
The Evolution Of Malware • In 1991, 1000 known threats, in 2001 there were 60,000 • Today there are millions, and it’s growing every day • Sophistication and production rates continue to evolve • Anybody can do it—full malware suites available online • Your stuff is worth money, and they want it!
National Interest Personal Gain Personal Fame Curiosity Nefarious Personas Spy Fastest growing segment Thief Tools created by experts now used by less skilled attackers and criminals Trespasser Vandal Author HobbyistHacker Script-Kiddy Expert Specialist
System Center 2012 Endpoint ProtectionNext generation of Forefront Endpoint Protection 2010 Unified Infrastructure Enhanced Protection Simplified Administration Reduce the cost of maintaining secure endpoints with unified management and security infrastructure Protect against known and unknown threats with endpoint inspection at behavior, application, and network levels Single administrator experience for simplified endpoint protection and management
System Center 2012 Endpoint Protection Unified Infrastructure Easy to setup and operate the management infrastructure Simplified deployment of antimalware policies Automated deployment of updates using ConfigMgr infrastructure Reduce the cost of maintaining secure endpoints with unified management and security infrastructure Easy client install and migration
Infrastructure Changes from FEP 2010 CONFIGURATION MANAGER 2012 ENDPOINT PROTECTION 2012 CONFIGURATION MANAGER 2007 FOREFRONT ENDPOINT PROTECTION 2010 Definition Catalogs FEP SERVICE EP CLIENT on ConfigMgr Server EP SITE ROLE SERVER CLIENT MANAGEMENTPOINT CM CLIENT FEP DW FEP DB CM DB Pre-Packaged EP CLIENT EP DEPLOYMENT EP OPERATIONS EP POLICY CONFIGURATIONMANAGER SITE SERVER FEPEXTENSIONS FEP DEPLOYMENT FEP OPERATIONS FEP POLICY DISTRIBUTIONPOINT EP CLIENT EXCELTEMPLATE REPORTS
Simplified Deployment of AM Policies • Centralized management for AM and Firewall Policy • AM and FW policy delivered as ConfigMgr policy – no package/program dependency • Out of box templates • Import, Export, Merge • Prioritization of policies by collection • Simplified UI for customizing policy
Signature Update Distribution • Easier distribution process • Automatic deployment rules within ConfigMgr software updates • Minimizes WAN impact • Uses distribution points and reduced definition size • Ensures always up-to-date security regardless of the client location • Multiple update sources (ConfigMgr, WSUS, Microsoft Update, Windows File Share) Corporate Network MICROSOFT UPDATE Delta update size: 50-2048 KB Update Frequency: 3 times/day Updates distributed through ConfigMgr, WSUS or Windows File Share ON THE ROAD Fallback to online update
Simplified Client Setup • Ease of client setup and deployment • No separate deployment needed for endpoint protection client • Endpoint Protection agent installer deployed with Configuration Manager client setup • Endpoint Protection client and definitions easily integrated with OSD • Flexible administrative control • Administrator can force or suppress any required reboots • Configurable option for automatic removal of existing AV client • Easy migration from existing solutions and automatic removal of existing clients • Symantec • McAfee • TrendMicro • Forefront Client Security or Forefront Endpoint Protection Client Installation Flow EP agent installer deployed with ConfigMgr Client EP enabled in the console- EP installation starts on the device Silent removal of third-party products EP client install Configure Policy Signature update
System Center 2012 Endpoint Protection Simplified Administration Single interface for client management and security Improved alerting, client to admin within 5 minutes, and reporting, with real-time and user-centric data views Single administrator experience for simplified endpoint protection and management
Single Interface For Management And Security • Single interface for client management and security • Dashboard integrated with ConfigMgr console • Simplified cross-feature integration • Quick identification and remediation of client security issues • Dashboard focused on actionable events • Flexibility to separate security admin role • Role-based administration • Access to only relevant security information
Monitoring Client Security • Quick alerts and event notification in the console • Uses high speed data channel to notify events in real time • High speed data channel prioritizes EP messages in state system, and no client “wait” to send messages up • Integrated monitoring for client health and antimalware status • Email subscription for alerts
Rich Reporting And Analysis • Rich reporting on client security • SQL Reporting Services-based reports on many categories • User-centric reports enable identification of commonly impacted users • Customizable reports simplified through database integration
What’s new in SP1 System Center 2012Endpoint Protection SP1 • Automatically deploy definition update 3 times per day • Category based scan from client to WSUS • Delta syncs between SUP and WSUS • Real-time administrative actions: • Run Definition Updates • Run Quick Scan • Run Full Scan • Allow threats • Exclude paths and/or files • Restore files quarantined by threat • Client side merge of antimalware policies
What’s new in SP1 Real-time Administrative Actions 3 In administrative console selects “Run Full Scan” on a collection • A task is created • MP is told that new urgent task has been requested 2 Task = “Run Full Scan” Administrator Site Server and MP 1 • “Dial tone” • Active TCP Session with the MP • Client Checking for urgent tasks • “Call is placed” • Client via this TCP connection is told there are urgent tasks to run • Client then connects to the MP to get policy • Client runs the Full Scan Task 4 All this happens within seconds Client
System Center 2012 Endpoint Protection Enhanced Protection Comprehensive protection stack building on Windows Security Proactive protection against known and unknown threats Reduced complexity while protecting clients Protect against known and unknown threats with endpoint inspection at behavior, application, and network levels
Comprehensive Protection Stack Building on Windows Platform security Reactive Techniques (Against Known Threats) Proactive Techniques (Against Unknown Threats) DYNAMIC CLOUD UPDATES Behavior Monitoring Data Execution Prevention Address Space Layout Randomization User Account Control Windows Resource Protection APPLICATION Antimalware Dynamic Translation and Emulation Dynamic Signature Service Microsoft Malware Protection Center Internet Explorer® 8 SmartScreen Microsoft AppLocker Microsoft BitLocker FILE SYSTEM Vulnerability Shielding (Network Inspection System) NETWORK Windows Firewall Centralized Management System Center Endpoint Protection Windows 7
Dynamic Translation With Heuristics • Industry-leading proactive detection • Emulation based detection helps provide better protection • Safe translation in a virtual environment for analysis • Enables faster scanning and response to threats • Heuristics enable one signature to detect thousands of variants Real Time Protection Driver Intercepts Malware Detected Potential Malware Execution attempt on the system Safe Translation Using DT Malicious File Blocked VIRTUALIZED RESOURCES
Behavior Monitoring And Dynamic Signatures RESEARCHERS REAL-TIME SIGNATURE DELIVERY BEHAVIOR CLASSIFIERS REPUTATION • Live system monitoring identifies new threats • Tracks behavior of unknown processes and known bad processes • Multiple sensors to detect OS anomaly • Updates for new threats delivered through the cloud in real time • Real time signature delivery with Microsoft Active Protection Service • Immediate protection against new threats without waiting for scheduled updates Microsoft Active Protection Service Properties/ Behavior Real-time signature Sample submit Sample request 1 2 3 4
Protect Clients With Reduced Complexity • Simple interface • Minimal, high-level user interactions • Administrative Control • User configurability options • Central policy enforcement • Maintains high productivity • CPU throttling during scans • Faster scans through advanced caching
What’s new in SP1 Heterogeneous Antimalware Clients • Mac OS X • Linux
Summary Unify Protect Simplify
Online Resources Launching a Windows Defender Offline Scan with Configuration Manager 2012 OSD Operating System Deployment and Endpoint Protection Client Installation Software Update Content Cleanup in System Center 2012 Configuration Manager Building Custom Endpoint Protection Reports in System Center 2012 Configuration Manager Managing Software Updates in Configuration Manager 2012 How-to-Videos Product Documentation Security and Compliance Manager – Configuration Packs
Related Content • Breakout Sessions • MGT309 | Microsoft System Center 2012 Configuration Manager Overview • MGT311 | Microsoft System Center 2012 Configuration Manager Deployment and Infrastructure Technical Overview • MGT312 | Deep Application Management with Microsoft System Center 2012 Configuration Manager • MGT313 | Microsoft System Center 2012 Configuration Manager: Plan, Deploy, and Migrate from Configuration Manager 2007 to 2012 • MGT318 | Patch and Settings Management in Microsoft System Center 2012 Configuration Manager • WCL388 | Client Management Scenarios in the Windows 8 Timeframe
Related Content • Hands-on Labs: • MGT23-HOL | Deploying Windows 7 to Bare Metal Systems with Microsoft System Center 2012 Configuration Manager • MGT24-HOL | Implementing Endpoint Protection 2012 in Microsoft System Center 2012 Configuration Manager • MGT12-HOL | Compliance and Settings Management in Microsoft System Center 2012 Configuration Manager • MGT25-HOL | Deep Dive: Microsoft System Center 2012 Configuration Manager SQL Replication Labs • MGT21-HOL | Basic Software Distribution in Microsoft System Center 2012 Configuration Manager • MGT16-HOL | Migrating from Microsoft System Center Configuration Manager 2007 to System Center 2012 Configuration Manager • MGT14-HOL | Implementing Role Based Administration in Microsoft System Center 2012 Configuration Manager • MGT15-HOL | Deploying a Microsoft System Center 2012 Configuration Manager Hierarchy • MGT11-HOL | Introduction to Microsoft System Center 2012 Configuration Manager
Resources Learning TechNet • Connect. Share. Discuss. • Microsoft Certification & Training Resources http://northamerica.msteched.com www.microsoft.com/learning • Resources for IT Professionals • Resources for Developers http://microsoft.com/technet http://microsoft.com/msdn
Required Slide Complete an evaluation on CommNet and enter to win!
MS Tag Scan the Tag to evaluate this session now on myTechEd Mobile
© 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.