Data Security Tools Rodney Buike IT Pro Advisor, Microsoft Canada [email protected] Http://blogs.technet.com/canitpro
Mar 22, 2016
Data Security Tools
Rodney BuikeIT Pro Advisor, Microsoft [email protected]://blogs.technet.com/canitpro
FactsLaptop adoption is on the rise and expected to replace desktops
750,000 notebooks reported stolen in 2006
Up to 80% of corporate data stored on local drives
Internal threats are just as prevalent as external threats
IntentionalAccidental Targeted
Data intentionally compromised
Thief steals asset based on value of
dataLoss due to
carelessness
System disposal or repurposing without data wipeSystem physically lost in transit
Insider access to unauthorized dataOffline attack on lost/stolen laptop
Theft of branch office server (high value and volume of data)Theft of executive or government laptopDirect attacks with specialized hardware
Information Protection Threats
How do I adress these issues?
Security Guidance
Data Encryption Toolkit
Malware Removal Kit
Vista Security Technologies
Security Guidance
Data Encryption ToolkitThe Executive Overview - business and regulatory perspective of how mobile data is at risk
The Security Analysis - in-depth review of how EFS and BitLocker address the unique risks associated with data on mobile PCs.
The Planning and Implementation Guide - how to plan for, configure, deploy, and operate EFS and BitLocker in your organization.
The Microsoft Encrypting File System Assistant - a software tool you can use to centrally control EFS settings on all your PCs
EFS Assistant
Configure and Run EFS Assistant
demo
Malware Removal KitGuidance for IT professionals who want information and recommendations to remove and limit malware that infects computers Guidance on creating an incident response planHow to determine if a system has malwareStep by step on building WinPE based clean up disk
Malware Removal Kit
Build and Run Malware Removal Tool
demo
User Account Control
BitLocker™ Drive Encryption Designed specifically to prevent a thief who boots another Operating System or runs a hacking tool from breaking Windows file and system protectionsProvides data protection on your Windows client systems, even when the system is in unauthorized hands or is running a different or exploiting Operating SsystemUses a v1.2 TPM or USB flash drive for key storage
BitLocker
BitLocker & UAC
Configuring Policy Settings
demo
Other ToolsGPO Accelerator
Microsoft Security Assessment Tool
Microsoft Baseline Security Analyzer 2.1
Best Practices Analyzers ExchangeSQLISASBS 2003
Resources
http://www.microsoft.ca/security
http://blogs.technet.com/canitpro
http://blogs.technet.com/cdnitmanagers