Top Banner
Data Security Tools Rodney Buike IT Pro Advisor, Microsoft Canada [email protected] Http://blogs.technet.com/canitpro
15

Rodney Buike IT Pro Advisor, Microsoft Canada [email protected] Http://blogs.technet.com/canitpro.

Apr 01, 2015

Download

Documents

Ivy Lillie
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.

Data Security Tools

Rodney BuikeIT Pro Advisor, Microsoft [email protected]://blogs.technet.com/canitpro

Page 2: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.

Facts

Laptop adoption is on the rise and expected to replace desktops

750,000 notebooks reported stolen in 2006

Up to 80% of corporate data stored on local drives

Page 3: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.

Internal threats are just as prevalent as external threats

IntentionalAccidental Targeted

Data intentionally compromised

Thief steals asset based on value of

data

Loss due tocarelessness

System disposal or repurposing without data wipeSystem physically lost in transit

Insider access to unauthorized dataOffline attack on lost/stolen laptop

Theft of branch office server (high value and volume of data)Theft of executive or government laptopDirect attacks with specialized hardware

Information Protection Threats

Page 4: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.

How do I adress these issues?

Security Guidance

Data Encryption Toolkit

Malware Removal Kit

Vista Security Technologies

Page 5: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.

Security Guidance

Page 6: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.

Data Encryption ToolkitThe Executive Overview - business and regulatory perspective of how mobile data is at risk

The Security Analysis - in-depth review of how EFS and BitLocker address the unique risks associated with data on mobile PCs.

The Planning and Implementation Guide - how to plan for, configure, deploy, and operate EFS and BitLocker in your organization.

The Microsoft Encrypting File System Assistant - a software tool you can use to centrally control EFS settings on all your PCs

Page 7: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.

EFS Assistant

Configure and Run EFS Assistant

demo

Page 8: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.

Malware Removal Kit

Guidance for IT professionals who want information and recommendations to remove and limit malware that infects computers Guidance on creating an incident response planHow to determine if a system has malwareStep by step on building WinPE based clean up disk

Page 9: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.

Malware Removal Kit

Build and Run Malware Removal Tool

demo

Page 10: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.

User Account Control

Page 11: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.

BitLocker™ Drive Encryption

Designed specifically to prevent a thief who boots another Operating System or runs a hacking tool from breaking Windows file and system protectionsProvides data protection on your Windows client systems, even when the system is in unauthorized hands or is running a different or exploiting Operating SsystemUses a v1.2 TPM or USB flash drive for key storage

BitLocker

Page 12: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.

BitLocker & UAC

Configuring Policy Settings

demo

Page 13: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.

Other Tools

GPO Accelerator

Microsoft Security Assessment Tool

Microsoft Baseline Security Analyzer 2.1

Best Practices Analyzers ExchangeSQLISASBS 2003

Page 14: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.

Resources

http://www.microsoft.ca/security

http://blogs.technet.com/canitpro

http://blogs.technet.com/cdnitmanagers

Page 15: Rodney Buike IT Pro Advisor, Microsoft Canada Rodney.Buike@Microsoft.com Http://blogs.technet.com/canitpro.