Top Banner
Data Security Tools Rodney Buike IT Pro Advisor, Microsoft Canada [email protected] Http://blogs.technet.com/canitpro
15

Data Security Tools

Mar 22, 2016

Download

Documents

Pierce Norton

Data Security Tools. Rodney Buike IT Pro Advisor, Microsoft Canada [email protected] Http://blogs.technet.com/canitpro. Facts. Laptop adoption is on the rise and expected to replace desktops 750,000 notebooks reported stolen in 2006 - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Data Security Tools

Data Security Tools

Rodney BuikeIT Pro Advisor, Microsoft [email protected]://blogs.technet.com/canitpro

Page 2: Data Security Tools

FactsLaptop adoption is on the rise and expected to replace desktops

750,000 notebooks reported stolen in 2006

Up to 80% of corporate data stored on local drives

Page 3: Data Security Tools

Internal threats are just as prevalent as external threats

IntentionalAccidental Targeted

Data intentionally compromised

Thief steals asset based on value of

dataLoss due to

carelessness

System disposal or repurposing without data wipeSystem physically lost in transit

Insider access to unauthorized dataOffline attack on lost/stolen laptop

Theft of branch office server (high value and volume of data)Theft of executive or government laptopDirect attacks with specialized hardware

Information Protection Threats

Page 4: Data Security Tools

How do I adress these issues?

Security Guidance

Data Encryption Toolkit

Malware Removal Kit

Vista Security Technologies

Page 5: Data Security Tools

Security Guidance

Page 6: Data Security Tools

Data Encryption ToolkitThe Executive Overview - business and regulatory perspective of how mobile data is at risk

The Security Analysis - in-depth review of how EFS and BitLocker address the unique risks associated with data on mobile PCs.

The Planning and Implementation Guide - how to plan for, configure, deploy, and operate EFS and BitLocker in your organization.

The Microsoft Encrypting File System Assistant - a software tool you can use to centrally control EFS settings on all your PCs

Page 7: Data Security Tools

EFS Assistant

Configure and Run EFS Assistant

demo

Page 8: Data Security Tools

Malware Removal KitGuidance for IT professionals who want information and recommendations to remove and limit malware that infects computers Guidance on creating an incident response planHow to determine if a system has malwareStep by step on building WinPE based clean up disk

Page 9: Data Security Tools

Malware Removal Kit

Build and Run Malware Removal Tool

demo

Page 10: Data Security Tools

User Account Control

Page 11: Data Security Tools

BitLocker™ Drive Encryption Designed specifically to prevent a thief who boots another Operating System or runs a hacking tool from breaking Windows file and system protectionsProvides data protection on your Windows client systems, even when the system is in unauthorized hands or is running a different or exploiting Operating SsystemUses a v1.2 TPM or USB flash drive for key storage

BitLocker

Page 12: Data Security Tools

BitLocker & UAC

Configuring Policy Settings

demo

Page 13: Data Security Tools

Other ToolsGPO Accelerator

Microsoft Security Assessment Tool

Microsoft Baseline Security Analyzer 2.1

Best Practices Analyzers ExchangeSQLISASBS 2003

Page 14: Data Security Tools

Resources

http://www.microsoft.ca/security

http://blogs.technet.com/canitpro

http://blogs.technet.com/cdnitmanagers

Page 15: Data Security Tools