![微軟經(jīng)典模板1(區(qū)塊篇)課件_第1頁(yè)](http://file4.renrendoc.com/view/40d6150c1e02d49813372b1cd83a7072/40d6150c1e02d49813372b1cd83a70721.gif)
![微軟經(jīng)典模板1(區(qū)塊篇)課件_第2頁(yè)](http://file4.renrendoc.com/view/40d6150c1e02d49813372b1cd83a7072/40d6150c1e02d49813372b1cd83a70722.gif)
![微軟經(jīng)典模板1(區(qū)塊篇)課件_第3頁(yè)](http://file4.renrendoc.com/view/40d6150c1e02d49813372b1cd83a7072/40d6150c1e02d49813372b1cd83a70723.gif)
![微軟經(jīng)典模板1(區(qū)塊篇)課件_第4頁(yè)](http://file4.renrendoc.com/view/40d6150c1e02d49813372b1cd83a7072/40d6150c1e02d49813372b1cd83a70724.gif)
![微軟經(jīng)典模板1(區(qū)塊篇)課件_第5頁(yè)](http://file4.renrendoc.com/view/40d6150c1e02d49813372b1cd83a7072/40d6150c1e02d49813372b1cd83a70725.gif)
版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、第一篇 區(qū)塊篇At RiskThe SoftUnderbellySecurity Issues Today1 Source: Forrester Research2 Source: Information Week, 26 November 20013 Source: Netcraft summary4 Source: CERT, 20035 Source: CSI/FBI Computer Crime and Security Survey6 Source: Computer Security Institute (CSI) Computer Crime and Security Surve
2、y 20027 Source: CERT, 20028 Source: Gartner Group14B devices on the Internet by 2010135M remote users by 2005265% increase in dynamic Web sites3From 2000 to 2002 reported incidents rose from 21, 756 to 82,0944Nearly 80 percent of 445 respondents surveyed said the Internet has become a frequent point
3、 of attack, up from 57 percent just four years ago5 90% detected security breaches685% detected computer viruses695% of all breaches avoidable with an alternative configuration7Approximately 70 percent of all Web attacks occur at the application layer8Application Layer AttacksIdentity TheftWeb Site
4、DefacementUnauthorized AccessModification of Data, Logs and RecordsTheft of Proprietary InformationService DisruptionImplicationsCompliance:Sarbanes OxleyGramm Leach BlilelyUS Patriot ActHIPAAThe Privacy Act (CA)Basel 2 (EU)Data Protection Act (EU)Litigation File Sharing Piracy HR Issues Shareholder
5、 SuitsCustomer ImpactTypes Of SRP RulesPath RuleCompares path of file being run to an allowed path listUse when you have a folder with many files for the same applicationEssential in when SRPs are strictHash RuleCompares the MD5 or SHA1 hash of a file to the one attempted to be runUse when you want
6、to allow/prohibit a certain version of a file from being runCertificate RuleChecks for digital signature on application (i.e. Authenticode)Use when you want to restrict both win32 applications and ActiveX contentInternet Zone RuleControls how Internet Zones can be accessedUse when in high security e
7、nvironments to control access to web applicationsSQL Server 2005 ThemesSupportability & QualityEnterprise EnhancementsUnified & Flexible AdministrationPatch SolutionsPrevention, Readiness, RecoveryEase of usePatch InstallsPatch in integrated stepIntegrated Database Services and Business Intelligence
8、Flexible install managementAdd value to one-step Failover ClusteringExpanded scripting supportLive Communications Client RoadmapLC 1.2 Client PlatformMultiparty IMP2P Voice and VideoMPOP GroupsRoamingSIP supportGPO policy managementLC 1.5 Client PlatformRoll up of QFEsMPOP AdditionsFederation/Archiv
9、ing NotificationHA AdditionsLC 2.0 Client PlatformNext generation of RTC experiencesMore coming!20032H04LonghornIntegrated phone and PDAPrimarily data viewingInteroperability with Outlook and Exchange.NET Compact FrameworkASP.NET mobile controlsMobile Device SolutionsComplex document authoring, edit
10、ing and readingKeyboard centric at the deskKeyboard and mouse input methodsFull .NET framework availableCentrino SolutionsWindows MobileWindows XPComplex document authoring, editing and active readingNote taking and ink annotating Keyboard centric at the desk, pen and keyboard away from the deskKeyb
11、oard, mouse plus pen, ink, and speech input methodsFull .NET framework preinstalledPen, ink, handwriting and speech recognition APIsCentrino SolutionsView and some data entryIntegrated PDA with phoneInteroperability with Office, Exchange and SQL Server.NET Compact FrameworkASP.NET mobile controlsInt
12、el Xscale SolutionsWindows CEOne-way networkInformation consumptionSmart Personal ObjectsSmartphonePocket PC and Pocket PC PhoneNotebook PCTablet PCPerimeter Security EvolutionWide open to advanced attacksApplication-level protectionPerformance versussecurity tradeoffSecurity and performanceLimited
13、capacityfor growthExtensibility and scalabilityHard to manageEasier to useThe advanced application layer firewall, VPN and Web cache solution that enables customers to maximize IT investments by improving network security and performanceAdvanced protectionApplication layer security designed to prote
14、ct Microsoft applicationsFast, secure accessEmpowers you to connect users to relevant information on yournetwork in a cost efficient mannerEase of useEfficiently deploy, manage, and enable new usage scenariosIntroducing: ISA Server 2004Fast, secure accessEmpowers you to connect users to relevant inf
15、o. on your networkISA Server 2004 New FeaturesContinued commitment to integrationEnhancedarchitecture High speed data transport Utilizes latest Windows and PC hardware SSL bridging unloads downstream serversWeb cache Updated policy rules Serve content locally Pre-fetch content during low activity pe
16、riodsInternet accesscontrol User- and group-based Web usage policy Extensible by third partiesComprehensiveauthentication New support for RADIUS and RSA SecurID User- & group-based access policy Third party extensibilityHow To Use Windows UpdateTo configure Automatic Updates:Select Keep my computer
17、up to dateOpen the System application in Control Panel1On the Automatic Updates tab, select theoption you want32Office UpdateBenefitsLimitationSingle location for office patches and updatesEasy to useCan be configured to update consumer orenterprise systemsDoes not support Automatic Updates; updatin
18、g must be initiated manuallyOffice Update Web site:/officeupdateHow To Use Office UpdateGo to /officeupdate1Click Check for Updates2Install the Office Update Installation Engine (if not already installed)3Select the updates you want to install4Click Start Installation5How To Use SUSOn the SUS server
19、Configure the SUS server at http:/SUSAdminOn each SUS clientConfigure Automatic Updates on the client to use the SUS server Use Group Policy, manually configure each client, oruse scriptsSet the SUS server synchronization scheduleReview, test, and approve updates123Software Update Service Deployment
20、 Best Practices (1)Review each security patch Download and install the patchTest each security patch before deploymentConfigure a test labUse a test SUS serverConsider using Virtual PCs in the test labUse a standard acceptance testing procedureSoftware Update Service Deployment Best Practices (2)Com
21、plete the deploymentPilot the deploymentConfigure a child SUS server to approve updatesConfigure a GPO so that the patch is downloaded from the pilot SUS server only by specified workstationsIf the pilot fails, remove approval from the SUS server and manually uninstall the patchHow To Use SMS To Dep
22、loy PatchesOpen the SMS Administrator Console1Right-click All Windows XP Computers, and then select All Tasks Distribute Software Updates3Use the wizard to create a new package and program4Browse to the patch to be deployed5Configure options for how and when the patch will be deployed to clients6Exp
23、and the Site Database node2SMS MBSA IntegrationMBSA integration included with SMS 2003 and the SUS Feature Pack for SMS 2.0Scans SMS clients for missing security updates using mbsacli.exe /hfSMS directs client to run local MBSA scan1SMS server parses data to determine which computers need which secu
24、rity updates3Administrator pushes missing updates only to clients that require them4Client performs scan, returns data to SMS server2MBSA BenefitsScans systems forMissing security patchesPotential configuration issuesWorks with a broad range ofMicrosoft softwareAllows an administrator to centrally s
25、can multiple computers simultaneously MBSA is a free tool, and can bedownloaded from/mbsa MBSA ConsiderationsMBSA reports important vulnerabilitiesPassword weaknessesGuest account not disabledAuditing not configuredUnnecessary services installedIIS vulnerabilitiesIE zone settingsAutomatic Updates co
26、nfigurationInternet Connection Firewall configurationMBSA Scan OptionsMBSA has three scan optionsMBSA graphical user interface (GUI)MBSA standard command-lineinterface (mbsacli.exe)HFNetChk scan (mbsacli.exe /hf)Business Case ForPatch ManagementWhen determining the potential financial impact of poor
27、 patch management, considerDowntimeRemediation timeQuestionable data integrityLost credibilityNegative public relationsLegal defensesStolen intellectual property“We commend Microsoft for providing enhanced security guidance to its customers as well as for soliciting user input as part of the process
28、 of producing that guidance“Clint KreitnerPresident/CEO“NIST reviewed and provided technical comments & advice, that was incorporated in this guidance”Timothy GranceManagerSystems and Network Security GroupCommentsSecurely make e-mail available to outside employeesExchange publishingYou Need ToSecur
29、ely make internal applications available on the InternetWeb and Server PublishingEnable partners to access relevant information on my networkIntegrated S2S VPN and FWSecure and flexible remote access, while protecting my corporate networkIntegrated RRAS VPN and FWSecurely connect my branch offices t
30、o the corporate officeIntegrated FW, VPN, CacheControl Internet Access and protect my clients from malicious Internet trafficFW, Web ProxyEnsure fast access to the most frequently used web contentCachingISA DeliversRelational ReportingMultiple fact tablesFull richness the dimensionsattributes Transa
31、ction level accessStar, snowflake, 3NF Complex relationships: Multi-grains, many-to-many, role playing, indirectRecursive self joinsSlowly changing dimensionsThe Unified Dimensional Model The Best Of Relational And OLAPOLAP CubesMultidimensional navigationHierarchical presentationFriendly entity nam
32、esPowerful MDX calculationsCentral KPI framework“Actions” Language translations Multiple perspectivesPartitionsAggregations Distributed sourcesVisual Studio Team SystemChange ManagementWork Item TrackingReportingProject SiteVisual StudioTeam FoundationIntegration ServicesProject ManagementProcess an
33、d Architecture GuidanceVisual Studio Industry PartnersDynamic Code AnalyzerVisual StudioTeam ArchitectStatic Code AnalyzerCode ProfilerUnit TestingCode CoverageVisio and UML ModelingTeam Foundation ClientVS ProClass ModelingLoad TestingManual TestingTest Case ManagementApplication ModelingLogical In
34、fra. ModelingDeployment ModelingVisual StudioTeam DeveloperVisual StudioTeam TestApplication ModelingLogical Infra. ModelingDeployment ModelingClass ModelingSQL Server CatalogReport ServerXML Web Service InterfaceReport ProcessingDeliveryDelivery Targets(E-mail, SharePoint,Custom)RenderingOutput For
35、mats (HTML, Excel, PDF, Custom)Data ProcessingData Sources(SQL, OLE DB, XML/A, ODBC, Oracle, Custom)SecuritySecurity Services(NT, Passport, Custom)OfficeCustom ApplicationBrowserSQL Server 2000 Reporting Services ArchitectureCM ProfileRuns customizablepost connect scriptScript runs RQC notifierwith
36、“results string”ListenerRQS receives Notifier“results string”Compares results topossible resultsRemoves time-out ifresponse received butclient out of dateRemoves quarantine filterif client up to dateQuarantine VSAsTimer limits timewindow to receive notify before auto disconnectQ-filter sets temporar
37、y route filter to quarantine accessInternetRAS ClientRRAS ServerIAS ServerQuarantineRQC.exe and RQS.exe are in the Windows Server 2003 Resource KitQuarantine ArchitectureMicrosoft BI Product SuiteAnalysis ServicesOLAP & Data MiningData TransformationServicesSQL ServerRelational EngineReporting Servi
38、cesManagement ToolsDev Tools Visual Studio .NetExcelOWCVisioMap PointData AnalyzerSharePoint PortalServerProject ServerWindows ServerMBS BI ApplicationsCurrent ArchitectureTCP/IPRTC Client APIUser AppRTPSIPPINTT.120Server ArchitectureApplicationManaged APIsApplicationManaged APIsWinsockStorageADDisp
39、atcherData Store InterfacesSPL Script EngineRegistrar/PresenceSIP ProxyServerApplication InteractionApplication1 CRMApplication2 BillingApplication3 LoggingRequestModifiedRequestWhat is VS Team Foundation?Source Code ControlWork Item TrackingBuild AutomationProject SiteReportingTITLEAvailableTodayMi
40、crosoft Windows Security Resource KitAssessing Network SecurityJune 23, 2004EAP architectureTLSGSS_APIKerberosPEAPIKEMD5EAPPPP802.3802.5802.11AnythingmethodlayerEAPlayermedialayerMS-CHAPv2TLSSecurIDPartner Solutions OfferingsVALUE Proposition:Get more business value from your investment in OfficeFin
41、anceSarbanes-OxleyBusiness ScorecardExcel Add-in for SQL Server Analysis ServicesOperationsSix SigmaHRRecruitingSalesProposalsSolution AcceleratorsMicrosoft ProductsOffice Solution AcceleratorsVALUE Proposition:Get more business value from your investment in OfficeYour PeopleEPM Involves.Your Busine
42、ssProcesses Your OrganizationYour Software Technology & ToolsEnterprise Project ManagementAn orchestration of your people, processes, organization with technologyYour Business ProcessesGovernancePrioritizationBudgetingHuman Resources etc InitiativesImplement Microsoft OfficeProject 2003 for the Ente
43、rpriseDecisions- Corporate Goals and ObjectivesExecutivesFinanceSales and MarketingR&DIT / ISYour OrganizationStrategic Initiatives HRDevelopment ProjectsOperational ImprovementsOn Average 45-50% of all Projects are linked to Strategic Objectives.Representative Risks And TacticsTactical SolutionsEnt
44、erprise RisksEmbodyTrustworthyComputingSecure Environmental RemediationUnpatched DevicesNetwork Segmentation Through IPSecUnmanaged DevicesSecure Remote UserRemote and Mobile UsersTwo-Factor for Remote Access and AdministratorsSingle-Factor AuthenticationManaged Source InitiativesFocus Controls Acro
45、ss Key AssetsRemote Access SecurityThreatRequirementSolutionMalicioususersTwo factor authenticationSmart Cardsfor RASMalicioussoftwareEnforce remote system security configurationConnection Manager, custom scripts and tools provided in the Windows 2003 resource kitCorporate Security Group OrganizationCorpor
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025年度健康養(yǎng)生產(chǎn)品銷(xiāo)售個(gè)人擔(dān)保合同
- 2025年度有機(jī)肥采購(gòu)合同風(fēng)險(xiǎn)控制要點(diǎn)解析
- 2025年度紅木家具行業(yè)品牌戰(zhàn)略規(guī)劃合同
- 衡陽(yáng)2024年湖南常寧市衛(wèi)健系統(tǒng)招聘衛(wèi)生專(zhuān)業(yè)技術(shù)人員99人筆試歷年參考題庫(kù)附帶答案詳解
- 蘇州江蘇蘇州工業(yè)園區(qū)新加花園幼兒園教學(xué)輔助人員招聘筆試歷年參考題庫(kù)附帶答案詳解
- 舟山浙江舟山岱山縣統(tǒng)計(jì)局招聘編外人員筆試歷年參考題庫(kù)附帶答案詳解
- 紅河云南紅河州教育體育局所屬事業(yè)單位(紅河州第一中學(xué))急需緊缺人才招聘筆試歷年參考題庫(kù)附帶答案詳解
- 江門(mén)2025年廣東江門(mén)開(kāi)平市自然資源局所屬事業(yè)單位招聘工作人員筆試歷年參考題庫(kù)附帶答案詳解
- 卷繞機(jī)項(xiàng)目融資計(jì)劃書(shū)
- 無(wú)錫2024年江蘇無(wú)錫市惠山區(qū)衛(wèi)生事業(yè)單位招聘65人筆試歷年參考題庫(kù)附帶答案詳解
- 農(nóng)副產(chǎn)品精深加工技術(shù)
- 《三國(guó)演義》中的佛教文化:以黃承兒為例
- 論犯罪與刑罰
- 材料預(yù)定協(xié)議
- 《學(xué)習(xí)的本質(zhì)》讀書(shū)會(huì)活動(dòng)
- 高氨血癥護(hù)理課件
- 《石油化工電氣自動(dòng)化系統(tǒng)設(shè)計(jì)規(guī)范》
- Q-GGW-BF-0117-2023天然氣管道無(wú)人站技術(shù)規(guī)范
- 新教科版三年級(jí)下冊(cè)科學(xué) 第二單元重點(diǎn)題型練習(xí)課件
- 寧夏回族自治區(qū)地圖矢量動(dòng)態(tài)PPT模板(圖文)
- 靜脈中等長(zhǎng)度導(dǎo)管臨床應(yīng)用專(zhuān)家共識(shí)-
評(píng)論
0/150
提交評(píng)論