260 likes | 428 Views
A-02 Overblik over Forefront Protection Manager 2010. Christian Stahl chstahl@microsoft.com. Formål. Formålet med denne session er at give et overblik over ForeFront Protection Manager (FPM). Hvem er jeg. Christian Stahl - Ansat i Microsoft Services som Engagement Manager
E N D
A-02 Overblik over Forefront Protection Manager 2010 • Christian Stahl • chstahl@microsoft.com
Formål • Formålet med denne session er at give et overblik over ForeFront Protection Manager (FPM)
Hvem er jeg • Christian Stahl - Ansat i Microsoft Services som Engagement Manager • CISSP og CISA • Underviser på ITU, IT Arkitektur og Sikkerhed • Har været i IT branchen siden 1996 • HP Danmark fra 1996 til 2000 (konsulent) • HP USA fra 2000 til 2002 (konsulent) • HP Danmark fra 2002 til 2004 (senior konsulent) • Saxo bank 2004 til 2005 (senior manager) • Microsoft 2005 nu • Fokus har altid været IT sikkerhed, infrastruktur og mobility • Arbejdet de sidste mange år som løsningsarkitekt for større komplekse projekter involverende alt fra fysiske serverrum til netværk og applikationsdesign
Agenda • Introduktion til Security Management • Introduktion til ForeFront Protection Manager (FPM) • FPM funktionalitet • FPM arkitektur • Demo
Forefront Roadmap Today CY 2009 H2 CY 2010 H1 Management Management Consoles Protection and Access Solutions Active Directory RMS Active Directory RMS
Security Management today Server Application Protection Vulnerability Assessment Endpoint Protection Network Edge Management Console Management Console Management Console Console Reporting Console Reporting Console Reporting Console • Jumping between consoles waste time • Each console has its own policyparadigm • Product’s are in silos with no integration • Lack of integration with infrastructure generate inefficiencies • Difficult to know if solutions are protecting from emerging threats
Silo'd best of breed solution are not enough • Breaches came from a combination of event: • 62% were attributed to a significant error • 59% resulted from hacking and intrusions • 31% incorporated malicious code • 22% exploited a vulnerability • Time span of data breach events Source: 2008 Data Breach Investigations Report. Verizon Business http://www.verizonbusiness.com/resources/security/databreachreport.pdf
Simplified Management with FPM • One console for simplified, role-based security management • Define one security policy for your assets across protection technologies • Deploy signatures, policies and software quickly • Integrates with your existing infrastructure: SCOM, SQL, WSUS, AD, NAP, SCCM
Forefront Protection Manager • Comprehensive, coordinated protection with dynamic responses to complex threats • Unified management across client, server application, & edge security in one console • Critical visibility into overall security state including threats and vulnerabilities Next GenerationForefront Client Security Next GenerationForefront Server Security Next GenerationEdge Security and Access Antivirus / Antispyware Exchange Protection Firewall Host Firewall & NAP SharePoint Protection VPN Others – To be announced at a later date Others – To be announced at a later date Others – To be announced at a later date
An Integrated Security System Management & Visibility Dynamic Response Client and Server OS Server Applications Network Edge vNext
Security Assessments Channel Example: Zero Day Scenario Compromised User: Andy Low Fidelity High Severity Expire: Wed Network Admin Security Admin Desktop Admin Alert TMG identifies malware on DEMO-CLT1 computer attempting to propagate (Port Scan) FCS identifies Andy has logged on to DEMO-CLT1 Compromised Computer DEMO-CLT1 High Fidelity High Severity Expire: Wed FPM Core Client Security Forefront TMG Forefront Server for: Exchange, SharePoint OCS WEB NAP Active Directory Block IM Quarantine Scan Computer Malicious Web Site Reset Account Block Email Andy DEMO-CLT1
Critical Visibility & Control • Know your security state • View insightful reports • Investigateand remediate security risks
Risk Management Dashboard • Risk = Security State X Asset Value • Asset value via FPM policies • Overall security risk driven by actionable rules • Single number to sort assets by • Enterprise security status reports
Microsoft Update FPM Conceptual Architecture Forefront Security Assessment Channel Windows Server Update Services (WSUS) FPM Core Server FPM Data Analysis & Collection Servers 3rd party protection service Systems Center Operations Manager Threat Management Gateway Servers Virus &Spyware Definitions Settings Settings Settings Settings Exchange Servers Events Events Events Events FPM Console SharePoint Servers Desktops, Laptops and Servers
TMG: Connect to FPM Provided by FPM Admin