版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡介
1、,第一篇 區(qū)塊篇,Integrated phone and PDA Primarily data viewing Interoperability with Outlook and Exchange .NET Compact Framework ASP.NET mobile controls,Mobile Device Solutions,Complex document authoring, editing and reading Keyboard centric at the desk Keyboard and mouse input methods Full .NET framework
2、 available Centrino Solutions,Windows Mobile,Windows XP,Complex document authoring, editing and active reading Note taking and ink annotating Keyboard centric at the desk, pen and keyboard away from the desk Keyboard, mouse plus pen, ink, and speech input methods Full .NET framework preinstalled Pen
3、, ink, handwriting and speech recognition APIs Centrino Solutions,View and some data entry Integrated PDA with phone Interoperability with Office, Exchange and SQL Server .NET Compact Framework ASP.NET mobile controls Intel Xscale Solutions,Windows CE,One-way network Information consumption,Smart Pe
4、rsonal Objects,Smartphone,Pocket PC and Pocket PC Phone,Notebook PC,Tablet PC,Network Defense,Health checkup IT checks “health” of client Network Access Control Clients who pass get network access Clients who do not pass are fixed or blocked (aka “quarantined”) Health maintenance Quarantined clients
5、 can be given access to resources to get healthy,From Home(VPN, Dial up),Returning Laptops,ConsultantsGuests,UnhealthyDesktops,Microsoft Business Solutions ERP Positioning,Guiding Principles,Productive,Integrated,Extensible,Capable,Short learning curve Minimal administrative overhead,Tools integrate
6、d tightly Automates common tasks,Customizable for your process Integrates with 3rd party tools,Remotely accessible Robust, secure, scalable,Staging Architecture,Data entry,Test,Application Center,Commerce Web,Commerce,Commerce Data,Commerce Web,Commerce,Commerce Data,Application,Center,Application,C
7、enter,Data,ACS Cluster,ACS Cluster,Cluster controller,Cluster controller,Data,Live Communications Client Roadmap,LC 1.2 Client Platform Multiparty IM P2P Voice and Video MPOP Groups Roaming SIP support GPO policy management,LC 1.5 Client Platform Roll up of QFEs MPOP Additions Federation/Archiving N
8、otification HA Additions,LC 2.0 Client Platform Next generation of RTC experiences More coming!,2003,2H04,Longhorn,Enterprise Deployment Update,Internet,Firewall,Firewall,Firewall,Runtime Servers,Corporate LAN Internal Servers,Crawl/Search,Load Balanced Web,Infrastructure Servers,Development Servers
9、,Test Servers,Business Data Servers,Business Users,Database and Staging Servers,Staging Servers,Database Servers,Offline Servers,Indicates Staged Data Flow,Communicate and collaborate in a more secure mannerwithout sacrificing information worker productivity,Windows XP SP2Block virus or malicious co
10、de at the “point of entry”,At Risk,The Soft Underbelly,Security Issues Today,1 Source: Forrester Research 2 Source: Information Week, 26 November 2001 3 Source: Netcraft summary 4 Source: CERT, 2003 5 Source: CSI/FBI Computer Crime and Security Survey 6 Source: Computer Security Institute (CSI) Comp
11、uter Crime and Security Survey 2002 7 Source: CERT, 2002 8 Source: Gartner Group,14B devices on the Internet by 20101 35M remote users by 20052 65% increase in dynamic Web sites3 From 2000 to 2002 reported incidents rose from 21, 756 to 82,0944 Nearly 80 percent of 445 respondents surveyed said the
12、Internet has become a frequent point of attack, up from 57 percent just four years ago5,90% detected security breaches6 85% detected computer viruses6 95% of all breaches avoidable with an alternative configuration7 Approximately 70 percent of all Web attacks occur at the application layer8,Applicat
13、ion Layer Attacks,Identity Theft Web Site Defacement Unauthorized Access Modification of Data, Logs and Records Theft of Proprietary Information Service Disruption,Implications,Compliance: Sarbanes Oxley Gramm Leach Blilely US Patriot Act HIPAA The Privacy Act (CA) Basel 2 (EU) Data Protection Act (
14、EU) Litigation File Sharing Piracy HR Issues Shareholder Suits,Customer Impact,Types Of SRP Rules,Path Rule Compares path of file being run to an allowed path list Use when you have a folder with many files for the same application Essential in when SRPs are strict,Hash Rule Compares the MD5 or SHA1
15、 hash of a file to the one attempted to be run Use when you want to allow/prohibit a certain version of a file from being run,Certificate Rule Checks for digital signature on application (i.e. Authenticode) Use when you want to restrict both win32 applications and ActiveX content,Internet Zone Rule
16、Controls how Internet Zones can be accessed Use when in high security environments to control access to web applications,SQL Server 2005 Themes,Supportability updating must be initiated manually,Office Update Web site:,How To Use Office Update,Go to ,1,Click Check for Updates,2,Install the Office Up
17、date Installation Engine (if not already installed),3,Select the updates you want to install,4,Click Start Installation,5,How To Use SUS,On the SUS server,Configure the SUS server at http:/SUSAdmin,On each SUS client,Configure Automatic Updates on the client to use the SUS server Use Group Policy, m
18、anually configure each client, oruse scripts,Set the SUS server synchronization schedule,Review, test, and approve updates,1,2,3,How To Use MBSA,Download and install MBSA (once only),1,Launch MBSA,2,Select the computer(s) to scan,3,Select relevant options,4,Click Start scan,5,View the Security Repor
19、t,6,Software Update Service Deployment Best Practices (1),Software Update Service Deployment Best Practices (2),How To Use SMS To Deploy Patches,SMS MBSA Integration,MBSA integration included with SMS 2003 and the SUS Feature Pack for SMS 2.0 Scans SMS clients for missing security updates using mbsa
20、cli.exe /hf,MBSA Benefits,Scans systems for Missing security patches Potential configuration issues Works with a broad range ofMicrosoft software Allows an administrator to centrally scan multiple computers simultaneously MBSA is a free tool, and can bedownloaded from,MBSA Considerations,MBSA report
21、s important vulnerabilities,Password weaknesses Guest account not disabled Auditing not configured Unnecessary services installed IIS vulnerabilities IE zone settings Automatic Updates configuration Internet Connection Firewall configuration,MBSA Scan Options,MBSA has three scan options MBSA graphic
22、al user interface (GUI) MBSA standard command-lineinterface (mbsacli.exe) HFNetChk scan (mbsacli.exe /hf),Business Case ForPatch Management,When determining the potential financial impact of poor patch management, consider,Downtime Remediation time Questionable data integrity Lost credibility Negati
23、ve public relations Legal defenses Stolen intellectual property,“We commend Microsoft for providing enhanced security guidance to its customers as well as for soliciting user input as part of the process of producing that guidance“ Clint Kreitner President/CEO,“NIST reviewed and provided technical c
24、omments device independent. Integration into a broad range of different applications and devices.,2004,2005,Windows Small Business Server 2003 SP1 Windows Server 2003 for 64-Bit Extended Systems Windows Server 2003 Service Pack 1 (SP1) Windows XP Tablet Edition 2005 Windows XP Media Center Edition 2
25、005 Windows XP Service Pack 2 (SP2) Virtual Server 2005 Additional Feature Packs (e.g. Windows Update Services),Windows Server: Codename “Longhorn” Beta 1 Windows Client: Codename “Longhorn” Beta 1 Windows Server 2003 Update: Codename “R2”,Release Roadmap,第二篇 表格篇,Microsoft Patch Severity Ratings,Sec
26、urity Bulletin List: http:/www.M,Patching Time Frames,Improving The Patching Experience,Choosing A PatchManagement Solution,Patch Management Solution For Medium-Sized And Large Organizations,Other Sessions Of Interest,The Importance Of Proactive Patch Management,DREAD,Micro Issues are 88%,Simple to
27、fix. Create “Noise” Five issues represent 88% of all upgrade issues,Analysis Service and DTS Migration Wizards No new MDAC bits Reduced SQL Database services downtime,Upgrade,Example Goals,Example Scope,What to plan for,Patch Management Solution For Small And Medium-sized Organizations,Elements of Y
28、our Final Report,Whats New In Setup,Default Exempt Rules In IPSec,Stored in the registry value: HKLMSYSTEMCurrentControlSetServicesIPSECNoDefaultExempt,PerformanceEnhanced Architecture,Optimized for real life usage scenarios Improvements since ISA Server 2000 Kernel-mode data pump User-mode optimiza
29、tions Up to +150% (2.5X faster) for firewall (SecureNAT) traffic Up to +250% (3.5X faster) for Web (transparent) proxy traffic 1,000,000+ concurrent connections Scale up with additional CPUs,Raw throughput performance,How? Design improvements IP Stack improvements Hardware improvements (raw thru-put
30、 measured using HTTP+NAT benchmark),IT Policy Completeness,IT Audit Score Card Example,Upgrading And MigratingSharePoint products and technologies,Other Sessions,Windows Server Family,Dedicated,第三篇 圖例篇,Corpnet,Internet,RADIUS Authentication,Federation through RADIUS proxies Can be used for centraliz
31、ed authentication services Domain membership not required Great for DMZ placement,RADIUS Server (IAS),Back-end Server,Web Client (Browser, HTTP client),ISA Server 2000 (Old)Networking Model,Fixed zones “IN” = LAT “OUT” = DMZ, Internet Packet filter only on external interfaces Single outbound policy
32、NAT always Static filtering from DMZ to Internet,InternalNetwork,Internet,DMZ 1,ISA 2000,ISA Server 2004 Networking Model,Any number of networks VPN as network Localhost as network Assigned relationships (NAT/Route) Per-Network policy Packet filtering onall interfaces Support for DoD Any topology, a
33、ny policy,ISA 2004,Rule Structure infects unprotected or unpatched systems,No Exploit,Exploit,MBSA How It Works,MSSecure.xml contains Security bulletin names Product-specific updates Version and checksum info Registry keys changed KB article numbers Etc.,Windows Download Center,MSSecure.xml,MBSAComp
34、uter,Policies, Procedures, begin integrating PM tools and business/IT requirements Improve risk response & managing a “portfolio” of projects,4,Risk,PM Maturity,Project Complexity,PM Capability,EPM Expectation,Project Management Maturity Model (PMMM),TechnologyMicrosoft Office EPM Architecture,Easil
35、y Create Enterprise Project Plans,Team Participation,Centrally Store Project, Resources, and Reporting,Project Documents, Issues, Risks, and Tasks,LOB Systems,Get More from Your IT Investments,More Productive Users,Taking a Staged Approach,Deployment Planning,Legacy App,Workflow Engine,Siebel,SAP,MS
36、-CRM,Architecture Overview,Information Bridge,Back-end Services,Client,Office Application,Smart Tag,Smart Doc,Task Pane Manager,Host Renderer,IBF - UI,IBF Engine,Metadata Cache,Metadata Designer,Metadata Web Service,Metadata,Compliant Service Adapter,Compliant Service Adapter,Compliant Service (Nati
37、ve),BizTalk EAI,Existing Web Service,XML Instance Data,Metadata,Metadata,View 2,Relationship,ServiceOp 1,UI Op 1,ServiceOp 1,UI Op 1,ServiceOp 1,UI Op 1,Web Services,.net Assembly,HTML,Winform,Actions,Ref 3,Ref 1,Ref 2,Action 1,Action 3,Action 2,View 1,Entity,Namespace,Ref 4,View 3,Entity,Entity,Entity,Namespace,Developed as a Visual Studio Add-In Complete UI t
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025 小學(xué)六年級(jí)語文下冊(cè) 親情友情 對(duì)話細(xì)節(jié)捕捉課件
- 【項(xiàng)目方案】5MWh液冷儲(chǔ)能一體柜項(xiàng)目技術(shù)方案(200MW-400MWh獨(dú)立儲(chǔ)能)202505
- 跨境電商2025年供應(yīng)鏈管理合同協(xié)議
- 口腔種植體采購合同(醫(yī)療機(jī)構(gòu)用)2025年保密條款
- 2025年AI語音合成服務(wù)終止協(xié)議
- 就業(yè)協(xié)議(2025年派遣用工)
- 承臺(tái)、地系梁、橋臺(tái)施工方案
- 銀行跨崗位面試題及答案
- 深度解析(2026)《GBT 34362-2017無損檢測(cè) 適形陣列渦流檢測(cè)導(dǎo)則 》
- 外科學(xué)總論腎移植術(shù)后感染的預(yù)防護(hù)理措施要點(diǎn)課件
- 醫(yī)療糾紛預(yù)防與處理流程
- 銷售行業(yè)合同范本
- 2026年民用無人機(jī)操控員執(zhí)照(CAAC)考試復(fù)習(xí)重點(diǎn)題庫標(biāo)準(zhǔn)卷
- 英語試卷+答案黑龍江省哈三中2025-2026學(xué)年上學(xué)期高二學(xué)年12月月考(12.11-12.12)
- 運(yùn)輸企業(yè)消防安全責(zé)任制
- 中北大學(xué)2025年招聘編制外參編管理人員備考題庫(一)參考答案詳解
- 介入治療患者隱私保護(hù)
- 2025年及未來5年市場(chǎng)數(shù)據(jù)中國高層、超高層建筑火災(zāi)消防救援裝備市場(chǎng)深度分析及投資戰(zhàn)略咨詢報(bào)告
- 2025年廣州美術(shù)學(xué)院招聘真題(行政管理崗)
- (重點(diǎn))M9執(zhí)照英語近年考試真題題庫(附答案)
- 獸醫(yī)服務(wù)委托協(xié)議書
評(píng)論
0/150
提交評(píng)論