WCL317 Disclaimer The information in this presentation relates to a pre-released product which may be substantially modified before it’s commercially

Embed Size (px)

Citation preview

  • Slide 1
  • Slide 2
  • WCL317
  • Slide 3
  • Disclaimer The information in this presentation relates to a pre-released product which may be substantially modified before its commercially released. The information contained represents the current view of Microsoft Corporation on the issues discussed as of the date of the presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of the presentation. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this presentation. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this information does not give you any license to these patents, trademarks, copyrights, or other intellectual property. 2010 Microsoft Corporation. All rights reserved.
  • Slide 4
  • Manage Risks with Enhanced Security Make People Productive Anywhere Reduce Costs by Streamlining PC Management Unified Lifecycle Management Streamlined Application DeliveryEnhanced Security and Protection Centralized Data Control and Compliance Anywhere Productivity Flexible Modern PC ( Virtualization for PC with local apps and data)
  • Slide 5
  • Protect and manage threats Complete protection requires investments in both prevention and detection Gartner Network Blog, 7/15/2010 Gartner Network Blog Secure access to resources The majority of organizations consider roaming workers to be the weakest link... 65% reported employees circumventing security features on their laptops. 45% reported... a security threat as a direct consequence of a roaming worker. ScanSafe Roaming Security Survey, 4/10ScanSafe Roaming Security Survey misconfigurations continue to be a larger source of attack openings than actual software vulnerabilities John Pescatore, Gartner Network Blog 9/1/10 We will have more granular control over identity and access, so we can start providing users with self-service capabilities and extend secure collaboration to our partners. Armand Martin, Enterprise Architect, Security, Dow Corning Identity and configuration management
  • Slide 6
  • Operating System Volume Removable Data Volumes Fixed Data Volumes
  • Slide 7
  • When a device gets lost, we need to report whether the data was encrypted. I need a simple way to check. The process of encrypting assets with BitLocker can be difficult. I need a simpler way to make it happen. Determining compliance can be difficult. I need an easy way to determine organizational compliance. When users lose keys to secured volumes, their productivity is blocked. We need a key recovery process. There is a large set of policy options for BitLocker. Id like a simplified means to make the right choices.
  • Slide 8
  • Goals are: 1 Simplify provisioning and deployment 2 Improve compliance and reporting 3 Reduce support costs
  • Slide 9
  • Slide 10
  • Slide 11
  • Slide 12
  • Slide 13
  • How it works: 1 Before MBAM starts encryption, it verifies the computer is capable (make/model) 2 As new computers are identified in the org, they are added to the list on MBAM servers 3 Website allows IT pros to move computers from unknown to capable or not-capable state 4 When this feature is ON, only computers that are capable will be encrypted
  • Slide 14
  • Recovery Password Data Compliance Data HTTPS MBAM Client Group Policy: AD, AGPM Key Recovery Service Helpdesk UX for Key Recovery Compliance Reports Central Administration Compliance Service
  • Slide 15
  • demo MBAM Client Group Policy: AD, AGPM
  • Slide 16
  • Need to know the last known state of a lost computer? Need to know how effective your rollout is? Or how compliant your company is? Who and when keys have been accessed and when new hardware has been added?
  • Slide 17
  • Slide 18
  • Search by: User or Computer Lets you know if a computer is compliant or not
  • Slide 19
  • Shows you the changes made through the Hardware Compatibility page Used when you enable Hardware Compatibility Management policy
  • Slide 20
  • Who has been requesting recovery information
  • Slide 21
  • Slide 22
  • MBAM Client Group Policy: AD, AGPM Compliance Data HTTPS Compliance Service Compliance Reports Central Administration demo
  • Slide 23
  • Slide 24
  • Slide 25
  • Slide 26
  • Slide 27
  • Slide 28
  • Recovery Password Data Compliance Data HTTPS MBAM Client Group Policy: AD, AGPM Compliance Service Key Recovery Service Helpdesk UX for Key Recovery Compliance Reports Central Administration demo
  • Slide 29
  • Server Requirements Administration Website & Web Services Windows 2008 Server w/ SP2; Windows 2008 Server R2; (x64|x86) Windows SKUs: Standard, Enterprise, Data Center, or Web Server Web Server Role (Internet Information Services (IIS)) Application Server Role (ASP.NET, etc.) Microsoft.NET Framework version 3.5 SP1 Database Server SQL Server 2008; SQL Server 2008 R2 (Standard, Enterprise, Datacenter) Encrypted Database (TDE) requires Enterprise or Datacenter Hardware Requirements Min requirements for Windows and SQL Server will be satisfactory for all components Disk Foot Print: < 10MB on Server and Client Roles Performance: Minimal over time on Server and Client Roles; + BitLocker Final hardware requirements to be determined Client Requirements Windows 7 Enterprise or Ultimate Hardware Requirements TPM v1.2 for O/S encryption
  • Slide 30
  • MDOP Compatibility & Management Microsoft Application Virtualization (App-V) Microsoft Enterprise Desktop Virtualization (MED-V) Reduce Support Costs Microsoft System Center Desktop Error Monitoring (DEM) Microsoft Diagnostics and Recovery Toolset (DaRT) Improve Asset Management Microsoft Asset Inventory Service (AIS) Improve Policy Control Microsoft Advanced Group Policy Management (AGPM)
  • Slide 31
  • Slide 32
  • www.microsoft.com/teched Sessions On-Demand & CommunityMicrosoft Certification & Training Resources Resources for IT ProfessionalsResources for Developers www.microsoft.com/learning http://microsoft.com/technet http://microsoft.com/msdn http://northamerica.msteched.com Connect. Share. Discuss.
  • Slide 33
  • Slide 34
  • Scan the Tag to evaluate this session now on myTechEd Mobile
  • Slide 35