nullnull第一篇 区块篇Mobile Device SolutionsMobile Device SolutionsIntegrated phone and PDA
Primarily data viewing
Interoperability with Outlook and Exchange
.NET Compact Framework
ASP.NET mobile controlsComplex document authoring, editing and reading
Keyboard centric at the desk
Keyboard and mouse input methods
Full .NET framework available
Centrino SolutionsWindows MobileWindows XPComplex document authoring, editing and active reading
Note taking and ink annotating
Keyboard centric at the desk, pen and keyboard away from the desk
Keyboard, mouse plus pen, ink, and speech input methods
Full .NET framework preinstalled
Pen, ink, handwriting and speech recognition API’s
Centrino SolutionsView and some data entry
Integrated PDA with phone
Interoperability with Office, Exchange and SQL Server
.NET Compact Framework
ASP.NET mobile controls
Intel Xscale SolutionsWindows® CEOne-way network
Information consumptionSmart Personal ObjectsSmartphonePocket PC and Pocket PC PhoneNotebook PCTablet PCNetwork DefenseNetwork DefenseHealth checkup
IT checks “health” of client
Network Access Control
Clients who pass get network access
Clients who do not pass are fixed or blocked (aka “quarantined”)
Health maintenance
Quarantined clients can be given access to resources to get healthyFrom Home
(VPN, Dial up)Returning LaptopsConsultants
GuestsUnhealthy
DesktopsMicrosoft Business Solutions ERP PositioningMicrosoft Business Solutions ERP PositioningGuiding PrinciplesGuiding PrinciplesProductiveIntegratedExtensibleCapableShort learning curve
Minimal administrative overheadTools integrated tightly
Automates common tasksCustomizable for your process
Integrates with 3rd party toolsRemotely accessible
Robust, secure, scalableStaging ArchitectureStaging ArchitectureData entryTestApplication CenterCommerce WebCommerceCommerce DataCommerce WebCommerceCommerce DataApplication CenterApplication CenterDataACS ClusterACS ClusterCluster controllerCluster controllerDataLive Communications Client RoadmapLive Communications Client RoadmapLC 1.2 Client Platform
Multiparty IM
P2P Voice and Video
MPOP
Groups
Roaming
SIP support
GPO policy managementLC 1.5 Client Platform
Roll up of QFEs
MPOP Additions
Federation/Archiving Notification
HA AdditionsLC 2.0 Client Platform
Next generation of RTC experiences
More coming!20032H04LonghornEnterprise Deployment UpdateEnterprise Deployment UpdateInternetFirewallFirewallFirewallRuntime ServersCorporate LAN – Internal ServersCrawl/SearchLoad Balanced WebInfrastructure ServersDevelopment ServersTest ServersBusiness Data ServersBusiness UsersDatabase and Staging ServersStaging ServersDatabase ServersOffline ServersIndicates Staged Data FlowWindows XP SP2
Block virus or malicious code at the “point of entry”
Windows XP SP2
Block virus or malicious code at the “point of entry”
Communicate and collaborate in a more secure manner without sacrificing information worker productivitySecurity Issues TodaySecurity Issues TodayThe Soft
Underbelly1 Source: Forrester Research
2 Source: Information Week, 26 November 2001
3 Source: Netcraft summary
4 Source: CERT, 2003
5 Source: CSI/FBI Computer Crime and Security Survey
6 Source: Computer Security Institute (CSI) Computer Crime and Security Survey 2002
7 Source: CERT, 2002
8 Source: Gartner Group14B devices on the Internet by 20101
35M remote users by 20052
65% increase in dynamic Web sites3
From 2000 to 2002 reported incidents rose from 21, 756 to 82,0944
Nearly 80 percent of 445 respondents surveyed said the Internet has become a frequent point of attack, up from 57 percent just four years ago5 90% detected security breaches6
85% detected computer viruses6
95% of all breaches avoidable with an alternative configuration7
Approximately 70 percent of all Web attacks occur at the application layer8Customer ImpactCustomer ImpactApplication Layer AttacksIdentity Theft
Web Site Defacement
Unauthorized Access
Modification of Data, Logs and Records
Theft of Proprietary Information
Service Disruption
ImplicationsCompliance:
Sarbanes Oxley
Gramm Leach Blilely
US Patriot Act
HIPAA
The Privacy Act (CA)
Basel 2 (EU)
Data Protection Act (EU)
Litigation
File Sharing
Piracy
HR Issues
Shareholder SuitsTypes Of SRP RulesTypes Of SRP RulesSQL Server 2005 ThemesSQL Server 2005 ThemesSupportability & QualityEnterprise EnhancementsUnified & Flexible AdministrationPatch SolutionsTraditional FirewallsTraditional FirewallsCode Red, Nimda
SSL-based attacksSecurity is complex
IT is already overloadedBandwidth too expensive
Too many moving partsNot easily upgradeable
Don’t scale with businessChoosing the Right Type of Assessment Choosing the Right Type of Assessment Vulnerability Scanning
Focuses on known weaknesses
Of the three, requires the least expertise
Generally easy to automatePenetration Testing
Focuses on known and unknown weaknesses
Requires advanced technical expertise
Carries tremendous legal burden in certain countries/organizations IT Security Audits
Focuses on security policies and procedures
Of the three, requires the most expertise
When done right is the most effective type of assessmentPerimeter Security EvolutionPerimeter Security EvolutionIntroducing: ISA Server 2004Introducing: ISA Server 2004The advanced application layer firewall, VPN and Web cache solution that enables customers to maximize IT investments by improving network security and performanceISA Server 2004 New Features
Continued commitment to integrationISA Server 2004 New Features
Continued commitment to integrationWeb cacheSystem Service AccountsSystem Service AccountsLocal Service and Network Service
No password to manage
Runs with only slightly more permissions than Authenticated User
Local Service cannot authenticate across the network, Network Service authenticates as the computer accountLocal System
No password to manage
Bypasses security checks
User Accounts
Run with less privilege than Local System
Stores password as an LSA secret
Can be complex to configure
What’s New With IPSec?What’s New With IPSec?Management
IP Security Monitor
Command-line management with Netsh
Logical addresses for local IP configuration Security
Stronger cryptographic master key (Diffie-Hellman)
Computer startup security
Persistent policy for enhanced security
Ability to exclude the name of the CA from certificate requests
Better default exemption handlingInteroperability
IPSec functionality over network address translation (NAT)
Improved IPSec integration with Network Load BalancingISA Server 2004 New Features
New management tools and user interfaceISA Server 2004 New Features
New management tools and user interfaceNetwork templates
and wizardsHow To Use Windows UpdateHow To Use Windows UpdateTo configure Automatic Updates:Select Keep my computer up to dateOpen the System application in Control Panel1On the Automatic Updates tab, select the option you want32Office UpdateOffice UpdateBenefits
Limitation
Single location for office patches and updates
Easy to use
Can be configured to update consumer or enterprise systemsDoes not support Automatic Updates; updating must be initiated manuallyOffice Update Web site: http://office.microsoft.com/officeupdateHow To Use Office UpdateHow To Use Office UpdateGo to http://office.microsoft.com/officeupdate1Click Check for Updates2Install the Office Update Installation Engine (if not already installed)3Select the updates you want to install4Click Start Installation5How To Use SUSHow To Use SUSOn the SUS serverConfigure the SUS server at http:///SUSAdminOn each SUS clientConfigure Automatic Updates on the client to use the SUS server Use Group Policy, manually configure each client, or use scriptsSet the SUS server synchronization scheduleReview, test, and approve updates123How To Use MBSAHow To Use MBSADownload and install MBSA (once only)1Launch MBSA2Select the computer(s) to scan3Select relevant options4Click Start scan5View the Security Report6Software Update Service Deployment Best Practices (1)Software Update Service Deployment Best Practices (1)Software Update Service Deployment Best Practices (2)Software Update Service Deployment Best Practices (2)How To Use SMS To Deploy PatchesHow To Use SMS To Deploy PatchesSMS – MBSA IntegrationSMS – MBSA IntegrationMBSA integration included with SMS 2003 and the SUS Feature Pack for SMS 2.0
Scans SMS clients for missing security updates using mbsacli.exe /hfMBSA BenefitsMBSA BenefitsScans systems for
Missing security patches
Potential configuration issues
Works with a broad range of Microsoft software
Allows an administrator to centrally scan multiple computers simultaneously
MBSA is a free tool, and can be downloaded from http://www.microsoft.com/mbsa
MBSA ConsiderationsMBSA ConsiderationsMBSA reports important vulnerabilities
Password weaknesses
Guest account not disabled
Auditing not configured
Unnecessary services installed
IIS vulnerabilities
IE zone settings
Automatic Updates configuration
Internet Connection Firewall configurationMBSA – Scan OptionsMBSA – Scan OptionsMBSA has three scan options
MBSA graphical user interface (GUI)
MBSA standard command-line interface (mbsacli.exe)
HFNetChk scan (mbsacli.exe /hf)
Business Case For
Patch ManagementBusiness Case For
Patch ManagementDowntime
Remediation time
Questionable data integrity
Lost credibility
Negative public relations
Legal defenses
Stolen intellectual propertyWhen determining the potential financial impact of poor patch management, consider
CommentsComments“We commend Microsoft for providing enhanced security guidance to its customers as well as for soliciting user input as part of the process of producing that guidance“
Clint Kreitner
President/CEO“NIST reviewed and provided technical comments & advice, that was incorporated in this guidance”
Timothy Grance
Manager
Systems and Network Security GroupYou Need To…You Need To…ISA DeliversThe Unified Dimensional Model –
The Best Of Relational And OLAPThe Unified Dimensional Model –
The Best Of Relational And OLAPVisual Studio Team SystemVisual Studio Team SystemVisual Studio Team FoundationVisual Studio Team ArchitectVisual Studio Team DeveloperVisual Studio Team TestSQL Server 2000 Reporting Services
ArchitectureSQL Server 2000 Reporting Services
ArchitectureSQL Server CatalogReport ServerXML Web Service InterfaceReport ProcessingDeliveryDelivery Targets
(E-mail, SharePoint,
Custom)RenderingOutput Formats
(HTML, Excel, PDF, Custom)Data ProcessingSecurityQuarantine ArchitectureQuarantine ArchitectureInternetRAS ClientRRAS ServerIAS ServerRQC.exe and RQS.exe are in the Windows Server 2003 Resource KitWhat is VS Team Foundation?What is VS Team Foundation?Microsoft BI Product SuiteMicrosoft BI Product SuiteAnalysis Services
OLAP & Data MiningData Transformation
ServicesSQL Server
Relational EngineReporting ServicesManagement ToolsDev Tools
Visual Studio .NetExcel
OWC
Visio
Map Point
Data AnalyzerSharePoint Portal
Server
Project ServerWindows ServerMBS BI ApplicationsCurrent ArchitectureCurrent Architecture
Server ArchitectureServer ArchitectureApplication InteractionApplication InteractionnullTITLEAvailableTodayMicrosoft® Windows® Security Resource KitAssessing Network SecurityJune 23, 2004EAP architectureEAP architectureTLSGSS_API
KerberosPEAPIKEMD5EAPPPP802.3802.5802.11Anything…method
layerEAP
layermedia
layerMS-CHAPv2TLSSecurIDOffice Solution AcceleratorsOffice Solution AcceleratorsPartner Solutions OfferingsVALUE Proposition: Get more business value from your investment in OfficeFinance
Sarbanes-Oxley
Business Scorecard
Excel Add-in for SQL Server Analysis ServicesOperations
Six SigmaHR
RecruitingSales
ProposalsSolution AcceleratorsMicrosoft ProductsVALUE Proposition: Get more business value from your investment in OfficeEPM Involves….EPM Involves….Your
PeopleYour Business
Processes Your OrganizationYour Software Technology & ToolsAn orchestration of your people, processes, organization with technologyYour Business Processes…Your Business Processes…GovernancePrioritizationBudgetingHuman Resources… etc …InitiativesDecisionsYour Organization…Your Organization…Strategic Initiatives Development ProjectsOperational ImprovementsRepresentative Risks And TacticsRepresentative Risks And TacticsTactical SolutionsEnterprise RisksEmbody
Trustworthy
ComputingSecure Environmental RemediationUnpatched DevicesNetwork Segmentation Through IPSecUnmanaged DevicesSecure Remote UserRemote and Mobile UsersTwo-Factor for Remote Access and AdministratorsSingle-Factor AuthenticationManaged Source InitiativesFocus Controls Across Key AssetsRemote Access Security
Remote Access Security
ThreatRequirementSolutionMalicious usersTwo factor authenticationSmart Cards for RASMalicious softwareEnforce remote system security configurationConnection Manager, custom scripts and tools provided in the Windows 2003 resource kit
Corporate Security Group OrganizationCorporate Security Group OrganizationCorporate Security GroupThreat, Risk
Analysis, and PolicyAssessment and
ComplianceMonitoring, Intrusion Detection, and Incident ResponseShared Services
OperationsThreat and Risk
AnalysisPolicy
DevelopmentProduct
EvaluationDesign
ReviewStructure
StandardsSecurity
ManagementSecurity
AssessmentCompliance and
RemediationMonitoring and
Intrusion DetectionRapid Response
and Resolution
ForensicsIT
InvestigationsPhysical and
Remote AccessCertificate
AdministrationSecurity
ToolsInitiative
ManagementServer Workloads FocusServer Workloads FocusServer FunctionsOperational InfrastructureApplication/Web Server
Unix integration servicesWorkloadsSolutionsApplication PlatformInformation Worker InfrastructureDatabase
High Performance ComputingSoftware Distribution
Virtualization
Operations Mgmt
Terminal ServerEmail
CollaborationBranch Office
Medium Business
Small BusinessNetworking
Remote Access
Security
Identity MgmtStorage (file, portal)
PrintWhat Is MapPoint Web Service?What Is MapPoint Web Service?Functionalities/APIs
Maps, Geocoding, Reverse Geocoding, Proximity Search, Find Address etc.Development Tools
Visual Studio .Net, Linux, Visual Basic, Mac, Java, C# …XML Web Service Points of Interest Database of more than 200,000 and 16 million business listingsCartographic data
Extensive geographic coverage in 19 countries in Europe and North America.No UI constraints; device independent. Integration into a broad range of different applications and devices.nullWindows Small Business Server 2003 SP1
Windows Server 2003 for 64-Bit Extended Systems
Windows Server 2003 Service Pack 1 (SP1)
Windows XP Tablet Edition 2005
Windows XP Media Center Edition 2005
Windows XP Service Pack 2 (SP2)
Virtual Server 2005
Additional Feature Packs (e.g. Windows Update Services)Windows Server: Codename “Longhorn” Beta 1
Windows Client: Codename “Longhorn” Beta 1
Windows Server 2003 Update: Codename “R2”Release Roadmapnull第二篇 表格篇Microsoft Patch Severity RatingsMicrosoft Patch Severity RatingsSecurity Bulletin List:
http://www.Microsoft.com/TechNet/Security/Current.asp Patching Time FramesPatching Time FramesImproving The Patching ExperienceImproving The Patching ExperienceChoosing A Patch
Management SolutionChoosing A Patch
Management SolutionPatch Management Solution For Medium-Sized And Large OrganizationsPatch Management Solution For Medium-Sized And Large OrganizationsOther Sessions Of InterestOther Sessions Of InterestThe Importance Of Proactive Patch ManagementThe Importance Of Proactive Patch ManagementDREADDREADMicro Issues are 88%Micro Issues are 88%Simple to fix.
Create “Noise”
Five issues represent 88% of all upgrade issuesUpgradeUpgradeAnalysis Service and DTS Migration Wizards
No new MDAC bits
Reduced SQL Database services downtimeExample Goals Example Goals Example ScopeExample ScopeWhat to plan for…What to plan for…Patch Management Solution For Small And Medium-sized OrganizationsPatch Management Solution For Small And Medium-sized Organizationsnull
本文档为【经典PPT素材库合集】,请使用软件OFFICE或WPS软件打开。作品中的文字与图均可以修改和编辑,
图片更改请在作品中右键图片并更换,文字修改请直接点击文字进行修改,也可以新增和删除文档中的内容。
该文档来自用户分享,如有侵权行为请发邮件ishare@vip.sina.com联系网站客服,我们会及时删除。
[版权声明] 本站所有资料为用户分享产生,若发现您的权利被侵害,请联系客服邮件isharekefu@iask.cn,我们尽快处理。
本作品所展示的图片、画像、字体、音乐的版权可能需版权方额外授权,请谨慎使用。
网站提供的党政主题相关内容(国旗、国徽、党徽..)目的在于配合国家政策宣传,仅限个人学习分享使用,禁止用于任何广告和商用目的。