150 likes | 213 Views
Data Security Tools. Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro. Facts. Laptop adoption is on the rise and expected to replace desktops 750,000 notebooks reported stolen in 2006
E N D
Data Security Tools Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro
Facts • Laptop adoption is on the rise and expected to replace desktops • 750,000 notebooks reported stolen in 2006 • Up to 80% of corporate data stored on local drives
Data intentionally compromised Thief steals asset based on value of data Loss due tocarelessness Information Protection Threats Internal threats are just as prevalent as external threats Targeted Accidental Intentional Insider access to unauthorized data Offline attack on lost/stolen laptop System disposal or repurposing without data wipe System physically lost in transit Theft of branch office server (high value and volume of data) Theft of executive or government laptop Direct attacks with specialized hardware
How do I adress these issues? Security Guidance Data Encryption Toolkit Malware Removal Kit Vista Security Technologies
Data Encryption Toolkit • The Executive Overview - business and regulatory perspective of how mobile data is at risk • The Security Analysis - in-depth review of how EFS and BitLocker address the unique risks associated with data on mobile PCs. • The Planning and Implementation Guide - how to plan for, configure, deploy, and operate EFS and BitLocker in your organization. • The Microsoft Encrypting File System Assistant - a software tool you can use to centrally control EFS settings on all your PCs
EFS Assistant demo Configure and Run EFS Assistant
Malware Removal Kit • Guidance for IT professionals who want information and recommendations to remove and limit malware that infects computers • Guidance on creating an incident response plan • How to determine if a system has malware • Step by step on building WinPE based clean up disk
Malware Removal Kit demo Build and Run Malware Removal Tool
Designed specifically to prevent a thief who boots another Operating System or runs a hacking tool from breaking Windows file and system protections Provides data protection on your Windows client systems, even when the system is in unauthorized hands or is running a different or exploiting Operating Ssystem Uses a v1.2 TPM or USB flash drive for key storage BitLocker™ Drive Encryption BitLocker
BitLocker & UAC demo Configuring Policy Settings
Other Tools • GPO Accelerator • Microsoft Security Assessment Tool • Microsoft Baseline Security Analyzer 2.1 • Best Practices Analyzers • Exchange • SQL • ISA • SBS 2003
Resources • http://www.microsoft.ca/security • http://blogs.technet.com/canitpro • http://blogs.technet.com/cdnitmanagers