Rodney Buike IT Pro Advisor, Microsoft Canada [email protected]...
-
Upload
ivy-lillie -
Category
Documents
-
view
220 -
download
0
Transcript of Rodney Buike IT Pro Advisor, Microsoft Canada [email protected]...
![Page 1: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.](https://reader030.fdocuments.us/reader030/viewer/2022020720/551b0e785503462e578b59a9/html5/thumbnails/1.jpg)
Data Security Tools
Rodney BuikeIT Pro Advisor, Microsoft [email protected]://blogs.technet.com/canitpro
![Page 2: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.](https://reader030.fdocuments.us/reader030/viewer/2022020720/551b0e785503462e578b59a9/html5/thumbnails/2.jpg)
Facts
Laptop adoption is on the rise and expected to replace desktops
750,000 notebooks reported stolen in 2006
Up to 80% of corporate data stored on local drives
![Page 3: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.](https://reader030.fdocuments.us/reader030/viewer/2022020720/551b0e785503462e578b59a9/html5/thumbnails/3.jpg)
Internal threats are just as prevalent as external threats
IntentionalAccidental Targeted
Data intentionally compromised
Thief steals asset based on value of
data
Loss due tocarelessness
System disposal or repurposing without data wipeSystem physically lost in transit
Insider access to unauthorized dataOffline attack on lost/stolen laptop
Theft of branch office server (high value and volume of data)Theft of executive or government laptopDirect attacks with specialized hardware
Information Protection Threats
![Page 4: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.](https://reader030.fdocuments.us/reader030/viewer/2022020720/551b0e785503462e578b59a9/html5/thumbnails/4.jpg)
How do I adress these issues?
Security Guidance
Data Encryption Toolkit
Malware Removal Kit
Vista Security Technologies
![Page 5: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.](https://reader030.fdocuments.us/reader030/viewer/2022020720/551b0e785503462e578b59a9/html5/thumbnails/5.jpg)
Security Guidance
![Page 6: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.](https://reader030.fdocuments.us/reader030/viewer/2022020720/551b0e785503462e578b59a9/html5/thumbnails/6.jpg)
Data Encryption ToolkitThe Executive Overview - business and regulatory perspective of how mobile data is at risk
The Security Analysis - in-depth review of how EFS and BitLocker address the unique risks associated with data on mobile PCs.
The Planning and Implementation Guide - how to plan for, configure, deploy, and operate EFS and BitLocker in your organization.
The Microsoft Encrypting File System Assistant - a software tool you can use to centrally control EFS settings on all your PCs
![Page 7: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.](https://reader030.fdocuments.us/reader030/viewer/2022020720/551b0e785503462e578b59a9/html5/thumbnails/7.jpg)
EFS Assistant
Configure and Run EFS Assistant
demo
![Page 8: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.](https://reader030.fdocuments.us/reader030/viewer/2022020720/551b0e785503462e578b59a9/html5/thumbnails/8.jpg)
Malware Removal Kit
Guidance for IT professionals who want information and recommendations to remove and limit malware that infects computers Guidance on creating an incident response planHow to determine if a system has malwareStep by step on building WinPE based clean up disk
![Page 9: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.](https://reader030.fdocuments.us/reader030/viewer/2022020720/551b0e785503462e578b59a9/html5/thumbnails/9.jpg)
Malware Removal Kit
Build and Run Malware Removal Tool
demo
![Page 10: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.](https://reader030.fdocuments.us/reader030/viewer/2022020720/551b0e785503462e578b59a9/html5/thumbnails/10.jpg)
User Account Control
![Page 11: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.](https://reader030.fdocuments.us/reader030/viewer/2022020720/551b0e785503462e578b59a9/html5/thumbnails/11.jpg)
BitLocker™ Drive Encryption
Designed specifically to prevent a thief who boots another Operating System or runs a hacking tool from breaking Windows file and system protectionsProvides data protection on your Windows client systems, even when the system is in unauthorized hands or is running a different or exploiting Operating SsystemUses a v1.2 TPM or USB flash drive for key storage
BitLocker
![Page 12: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.](https://reader030.fdocuments.us/reader030/viewer/2022020720/551b0e785503462e578b59a9/html5/thumbnails/12.jpg)
BitLocker & UAC
Configuring Policy Settings
demo
![Page 13: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.](https://reader030.fdocuments.us/reader030/viewer/2022020720/551b0e785503462e578b59a9/html5/thumbnails/13.jpg)
Other Tools
GPO Accelerator
Microsoft Security Assessment Tool
Microsoft Baseline Security Analyzer 2.1
Best Practices Analyzers ExchangeSQLISASBS 2003
![Page 14: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.](https://reader030.fdocuments.us/reader030/viewer/2022020720/551b0e785503462e578b59a9/html5/thumbnails/14.jpg)
Resources
http://www.microsoft.ca/security
http://blogs.technet.com/canitpro
http://blogs.technet.com/cdnitmanagers
![Page 15: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.](https://reader030.fdocuments.us/reader030/viewer/2022020720/551b0e785503462e578b59a9/html5/thumbnails/15.jpg)