SlideShare a Scribd company logo
1 of 60
Windows Server 2008  新安全功能探討 呂政周 精誠恆逸教育訓練處 資深講師 http://edu.uuu.com.tw - -
課程大綱 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],- -
前言 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],- -
作業系統安全 - -
Windows Server 2008  安全的開發生命週期 對程式開發人員作定期與強制的安全教育 安全顧問針對所有系統元件為開發人員提供安全的建議 在設計階段對各種威脅模式納入考量 程式碼安全性檢視與測試 Common Criteria  認證
The bad guys are everywhere! ,[object Object],[object Object],[object Object],[object Object],[object Object]
Protect the OS When Running
The threats ,[object Object],[object Object],[object Object],[object Object],[object Object],- -
Code integrity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],- -
Hash validation scope - - Windows binaries Yes WHQL-certified third-party drivers Yes Unsigned drivers By policy Third-party application binaries No
More on signatures ,[object Object],- - x64 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],x32 ,[object Object],[object Object],[object Object],[object Object]
Recovering from CI failures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],- -
Integrated Windows Defender ,[object Object],[object Object],[object Object],[object Object]
Internet Explorer 7 ,[object Object],[object Object],[object Object]
Phishing Filter in IE Dynamic Protection Against Fraudulent Websites ,[object Object],[object Object],[object Object],[object Object],[object Object],Level 1:  Warn   Suspicious Website  Signaled Level 2:  Block   Confirmed Phishing Site  Signaled and Blocked
存取控制安全 - -
User Account Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
UAC: Fundamental Change to Windows Operation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Control Over Device Installation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Using Network Access Protection 1 Windows Client Policy Servers such as: Patch, AV MSFT NPS  DHCP, VPN Switch/Router  Client requests access to network and presents current health state 1 Corporate Network
Using Network Access Protection 1 Windows Client 2 Policy Servers such as: Patch, AV MSFT NPS  DHCP, VPN Switch/Router  Client requests access to network and presents current health state 1 2 Dynamic Host Configuration Protocol (DHCP), virtual private network (VPN) or Switch/Router relays health status to Microsoft Network Policy Server (RADIUS) Corporate Network
Using Network Access Protection 1 Windows Client 2 3 Policy Servers such as: Patch, AV MSFT NPS  DHCP, VPN Switch/Router  Client requests access to network and presents current health state 1 2 DHCP, VPN or Switch/Router relays health status to Microsoft Network Policy Server (RADIUS) 3 Network Policy Server (NPS) validates against IT-defined health policy Corporate Network
Using Network Access Protection 1 Windows Client 2 3 Policy Servers such as: Patch, AV Not policy compliant MSFT NPS  4 DHCP, VPN Switch/Router  Restricted Network Client requests access to network and presents current health state 1 2 DHCP, VPN or Switch/Router relays health status to Microsoft Network Policy Server (RADIUS) 3 Network Policy Server (NPS) validates against IT-defined health policy 4 If not policy compliant, client is put in a restricted  virtual local area network (VLAN) and given access to fix up resources to download patches, configurations, signatures (Repeat 1 - 4) Fix Up Servers Example: Patch Corporate Network
Using Network Access Protection 1 Windows Client 2 3 Policy Servers such as: Patch, AV Not policy compliant Policy compliant MSFT NPS  5 4 DHCP, VPN Switch/Router  Restricted Network Client requests access to network and presents current health state 1 2 DHCP, VPN or Switch/Router relays health status to Microsoft Network Policy Server (RADIUS) 3 Network Policy Server (NPS) validates against IT-defined health policy 4 If not policy compliant, client is put in a restricted VLAN and given access to fix up resources to download patches, configurations, signatures (Repeat 1 - 4) Fix Up Servers Example: Patch 5 If policy compliant, client is granted full access to corporate network Corporate Network
Windows Firewall Advanced Security  Filter both incoming and  outgoing traffic
Windows Firewall Advanced Security  New Microsoft ®  Management Console (MMC) snap-in for GUI configuration
Windows Firewall Advanced Security  Integrated firewall and IP security (IPsec) settings
Windows Firewall Advanced Security  Several ways to configure exceptions
NG TCP/IP Next Generation TCP/IP in Vista and “Longhorn” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
應用程式安全 與 程式執行安全 - -
The threats ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],- -
Service hardening - - It’s about the principle of least privilege— it’s good for people, and it’s good for services Service refactoring ,[object Object],[object Object],Service profiling ,[object Object],[object Object],[object Object]
Refactoring ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Memory Main service runs as LocalService Privileged LocalSystem
Profiling ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Restricting services SCM computes service SID SCM adds the SID to service process’s token SCM creates write-restricted token SCM removes unneeded privileges from process token Service places ACL on resource—only service can write to it
Restricting services: know this ,[object Object],[object Object],[object Object],Note!  This is a voluntary process. The service is choosing to restrict itself. It’s good development practice because it reduces the likelihood of a service being abused by malware, but it isn’t a full-on system-wide restriction mechanism. Third-party services can still run wild and free…
Windows Server 2008 Services Hardening Kernel Drivers User-mode Drivers D D D D D
Windows Server 2008 Services Hardening Kernel Drivers User-mode Drivers ,[object Object],D D D D D
Windows Server 2008 Services Hardening Kernel Drivers User-mode Drivers Service  1 Service  2 Service  3 Service … Service  … Service  A Service  B ,[object Object],[object Object],D D D D D
Windows Server 2008 Services Hardening ,[object Object],[object Object],[object Object],Kernel Drivers User-mode Drivers Service  1 Service  2 Service  3 Service … Service  … Service  A Service  B D D D D D D D D
Granular Audit Policy
Object Access Auditing Object  Access Attempt: Object Server: %1 Handle ID: %2 Object Type: %3 Process ID: %4 Image File Name: %5 Access Mask: %6
Object Access Auditing An operation was performed on an object. Subject :                                                                   Security ID: %1                  Account Name: %2                           Account Domain: %3                  Logon ID: %4           Object:                  Object Server: %5                  Object Type: %6                  Object Name: %7                  Handle ID: %9 Operation:                  Operation Type: %8                  Accesses: %10                  Access Mask: %11                  Properties: %12                  Additional Info: %13                  Additional Info2: %14
Added Auditing For ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Address Space Load Randomization (ASLR) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
資料傳遞安全 與 資料儲存安全 - -
Terminal Services Gateway Perimeter network Internet Corp LAN External Firewall Internal Firewall Hotel Tunnels RDP over HTTPS Home Terminal  Server Internet Terminal Server Terminal Services Gateway Server E-mail Server Business partner / client site Roaming wireless
RMS, EFS, and BitLocker ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CNG:  Cryptography Next Generation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Offline Files Encrypted Per User
Encrypted Pagefile
Regulatory Compliance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Supports NSA Suite B www.nsa.gov/ia/industry/crypto_suite_b.cfm ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Trusted Platform Module TPM Chip Version 1.2 ,[object Object],[object Object],[object Object],[object Object],[object Object]
Code Integrity ,[object Object],[object Object]
BitLocker™ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
結論
Defense-in-Depth - - ,[object Object],[object Object],Security policies, procedures, and education Policies, procedures, and awareness Guards, locks, tracking devices Physical security Application hardening Application OS hardening, authentication,  update management, antivirus updates, auditing Host Network segments, IPSec, NIDS Internal network Firewalls, boarder routers, VPNs with quarantine procedures Perimeter Strong passwords, ACLs, encryption, EFS, backup and restore strategy Data
Defense-in-Depth ( 續 ) - - Policies, procedures, and awareness Physical security Perimeter Internal network Network defenses Host Application Data Client defenses Server defenses Host Application Data
- - © 2007 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

More Related Content

What's hot

SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementDsunte Wilson
 
Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6Sarah Isaacs
 
Ece seminar 20070927
Ece seminar 20070927Ece seminar 20070927
Ece seminar 20070927Todd Deshane
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSree Harsha Boyapati
 
Whats New in OSSIM v2.3?
Whats New in OSSIM v2.3? Whats New in OSSIM v2.3?
Whats New in OSSIM v2.3? AlienVault
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlAidy Tificate
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control أحلام انصارى
 
Deployment websese
Deployment webseseDeployment websese
Deployment websesethanglx
 
Sweden dst tpam 2014
Sweden dst tpam 2014Sweden dst tpam 2014
Sweden dst tpam 2014Ronny Stavem
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingDsunte Wilson
 
VC-Stat Datasheet
VC-Stat DatasheetVC-Stat Datasheet
VC-Stat DatasheetClearOne
 
2010 db security
2010 db security2010 db security
2010 db securityWayne Evans
 
Design for security in operating system
Design for security in operating systemDesign for security in operating system
Design for security in operating systemBhagyashree Barde
 
Operating System Security
Operating System SecurityOperating System Security
Operating System SecurityRamesh Upadhaya
 

What's hot (20)

SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
 
Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6
 
Ece seminar 20070927
Ece seminar 20070927Ece seminar 20070927
Ece seminar 20070927
 
MBESProductSheet (1)
MBESProductSheet (1)MBESProductSheet (1)
MBESProductSheet (1)
 
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices GuidelinesSymantec Endpoint Protection Enterprise Edition Best Practices Guidelines
Symantec Endpoint Protection Enterprise Edition Best Practices Guidelines
 
Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
Andrey Bogdanov, Dmitry Khovratovich, and Christian RechbergerAndrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger
 
Sudheendra
SudheendraSudheendra
Sudheendra
 
What is HDF
What is HDFWhat is HDF
What is HDF
 
Whats New in OSSIM v2.3?
Whats New in OSSIM v2.3? Whats New in OSSIM v2.3?
Whats New in OSSIM v2.3?
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access Control
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
 
Deployment websese
Deployment webseseDeployment websese
Deployment websese
 
Sweden dst tpam 2014
Sweden dst tpam 2014Sweden dst tpam 2014
Sweden dst tpam 2014
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
 
VC-Stat Datasheet
VC-Stat DatasheetVC-Stat Datasheet
VC-Stat Datasheet
 
Core Trace PCI DSS Compliance
Core Trace PCI DSS ComplianceCore Trace PCI DSS Compliance
Core Trace PCI DSS Compliance
 
2010 db security
2010 db security2010 db security
2010 db security
 
Design for security in operating system
Design for security in operating systemDesign for security in operating system
Design for security in operating system
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 
Stormwatch micration
Stormwatch micrationStormwatch micration
Stormwatch micration
 

Viewers also liked

Bjosnocorao[1]
Bjosnocorao[1]Bjosnocorao[1]
Bjosnocorao[1]cab3032
 
Comohacertesaber Mbenedetti
Comohacertesaber MbenedettiComohacertesaber Mbenedetti
Comohacertesaber Mbenedettimasde30
 
1214 使用 Windows Server 2008 架構 Media Service
1214 使用 Windows Server 2008 架構 Media Service1214 使用 Windows Server 2008 架構 Media Service
1214 使用 Windows Server 2008 架構 Media ServiceTimothy Chen
 
De Online Werkelijkheid Voor Apothekers
De Online Werkelijkheid Voor ApothekersDe Online Werkelijkheid Voor Apothekers
De Online Werkelijkheid Voor ApothekersMartijn Hulst
 
Tenteniguada (isla Canaria)
Tenteniguada (isla Canaria)Tenteniguada (isla Canaria)
Tenteniguada (isla Canaria)nimiaazucena
 
Classificados Procura Se Casa
Classificados   Procura Se CasaClassificados   Procura Se Casa
Classificados Procura Se CasaOsmar Algarte
 
NEAVE E SWARM OF ANGELS
NEAVE E SWARM OF ANGELSNEAVE E SWARM OF ANGELS
NEAVE E SWARM OF ANGELSsim08
 
MUVE e Telelavoro
MUVE e TelelavoroMUVE e Telelavoro
MUVE e Telelavorogueste1b21a
 
Tv2.0 Hector Milla
Tv2.0 Hector MillaTv2.0 Hector Milla
Tv2.0 Hector MillaHector Milla
 
Cazadores De Serpientes En Africa
Cazadores De Serpientes En AfricaCazadores De Serpientes En Africa
Cazadores De Serpientes En Africanimiaazucena
 
Las terrazas de Cala Vadella, Ibiza, España
Las terrazas de Cala Vadella, Ibiza, EspañaLas terrazas de Cala Vadella, Ibiza, España
Las terrazas de Cala Vadella, Ibiza, EspañaGlobal Estates
 
Leccionesadministrativas
LeccionesadministrativasLeccionesadministrativas
Leccionesadministrativasdamarcar
 
Matt 26 30 45 Cherishing The Cross (Good Friday 2008)
Matt 26 30 45  Cherishing The Cross (Good Friday 2008)Matt 26 30 45  Cherishing The Cross (Good Friday 2008)
Matt 26 30 45 Cherishing The Cross (Good Friday 2008)hungpham
 

Viewers also liked (20)

Bjosnocorao[1]
Bjosnocorao[1]Bjosnocorao[1]
Bjosnocorao[1]
 
Comohacertesaber Mbenedetti
Comohacertesaber MbenedettiComohacertesaber Mbenedetti
Comohacertesaber Mbenedetti
 
1214 使用 Windows Server 2008 架構 Media Service
1214 使用 Windows Server 2008 架構 Media Service1214 使用 Windows Server 2008 架構 Media Service
1214 使用 Windows Server 2008 架構 Media Service
 
De Online Werkelijkheid Voor Apothekers
De Online Werkelijkheid Voor ApothekersDe Online Werkelijkheid Voor Apothekers
De Online Werkelijkheid Voor Apothekers
 
Hotelenlajungla
HotelenlajunglaHotelenlajungla
Hotelenlajungla
 
Viatge
ViatgeViatge
Viatge
 
Tenteniguada (isla Canaria)
Tenteniguada (isla Canaria)Tenteniguada (isla Canaria)
Tenteniguada (isla Canaria)
 
Googlereader
GooglereaderGooglereader
Googlereader
 
Classificados Procura Se Casa
Classificados   Procura Se CasaClassificados   Procura Se Casa
Classificados Procura Se Casa
 
NEAVE E SWARM OF ANGELS
NEAVE E SWARM OF ANGELSNEAVE E SWARM OF ANGELS
NEAVE E SWARM OF ANGELS
 
Viatge
ViatgeViatge
Viatge
 
MUVE e Telelavoro
MUVE e TelelavoroMUVE e Telelavoro
MUVE e Telelavoro
 
Tv2.0 Hector Milla
Tv2.0 Hector MillaTv2.0 Hector Milla
Tv2.0 Hector Milla
 
Cazadores De Serpientes En Africa
Cazadores De Serpientes En AfricaCazadores De Serpientes En Africa
Cazadores De Serpientes En Africa
 
Ag1 Aula9 2008
Ag1 Aula9 2008Ag1 Aula9 2008
Ag1 Aula9 2008
 
Las terrazas de Cala Vadella, Ibiza, España
Las terrazas de Cala Vadella, Ibiza, EspañaLas terrazas de Cala Vadella, Ibiza, España
Las terrazas de Cala Vadella, Ibiza, España
 
Gov Semi2008 02
Gov Semi2008 02Gov Semi2008 02
Gov Semi2008 02
 
San Priamo
San PriamoSan Priamo
San Priamo
 
Leccionesadministrativas
LeccionesadministrativasLeccionesadministrativas
Leccionesadministrativas
 
Matt 26 30 45 Cherishing The Cross (Good Friday 2008)
Matt 26 30 45  Cherishing The Cross (Good Friday 2008)Matt 26 30 45  Cherishing The Cross (Good Friday 2008)
Matt 26 30 45 Cherishing The Cross (Good Friday 2008)
 

Similar to 0828 Windows Server 2008 新安全功能探討

Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalQuek Lilian
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramBeyondTrust
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilitiesphanleson
 
Microsoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesMicrosoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesInformation Technology
 
Microsoft OS Vulnerabilities
Microsoft OS VulnerabilitiesMicrosoft OS Vulnerabilities
Microsoft OS VulnerabilitiesSecurityTube.Net
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security EnhancementsPresentologics
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Sophos Benelux
 
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docxWorksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docxgriffinruthie22
 
Web sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdfWeb sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdfaquacareser
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersITExamAnswers.net
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide Array Networks
 
W7 Enterprise
W7 EnterpriseW7 Enterprise
W7 Enterprisearalves
 
W7 for IT Professionals
W7 for IT ProfessionalsW7 for IT Professionals
W7 for IT Professionalsguest632c73
 
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docxWeek 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docxcockekeshia
 
FOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptxFOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptxssuser20fcbe
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesAmazon Web Services
 
System Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewSystem Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewAmit Gatenyo
 
"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're InfectedTripwire
 

Similar to 0828 Windows Server 2008 新安全功能探討 (20)

Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 
Ch08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System VulnerabilitiesCh08 Microsoft Operating System Vulnerabilities
Ch08 Microsoft Operating System Vulnerabilities
 
Microsoft Operating System Vulnerabilities
Microsoft Operating System VulnerabilitiesMicrosoft Operating System Vulnerabilities
Microsoft Operating System Vulnerabilities
 
Microsoft OS Vulnerabilities
Microsoft OS VulnerabilitiesMicrosoft OS Vulnerabilities
Microsoft OS Vulnerabilities
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security Enhancements
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docxWorksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
Worksheet 4 LANWAN Compliance and Auditinglook on the docume.docx
 
Web sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdfWeb sever environmentA Web server is a program that uses HTTP (Hy.pdf
Web sever environmentA Web server is a program that uses HTTP (Hy.pdf
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
 
SP1_Battlecard
SP1_BattlecardSP1_Battlecard
SP1_Battlecard
 
W7 Enterprise
W7 EnterpriseW7 Enterprise
W7 Enterprise
 
W7 for IT Professionals
W7 for IT ProfessionalsW7 for IT Professionals
W7 for IT Professionals
 
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docxWeek 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
Week 7Worksheet 4 LANWAN Compliance and AuditingCourse L.docx
 
FOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptxFOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptx
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best Pratices
 
System Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewSystem Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 Overview
 
"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected
 

More from Timothy Chen

Google Q3 2008 Quarterly Earnings Summary
Google Q3 2008 Quarterly Earnings SummaryGoogle Q3 2008 Quarterly Earnings Summary
Google Q3 2008 Quarterly Earnings SummaryTimothy Chen
 
Windows Server 2008 伺服器虛擬化解決方案
Windows Server 2008 伺服器虛擬化解決方案Windows Server 2008 伺服器虛擬化解決方案
Windows Server 2008 伺服器虛擬化解決方案Timothy Chen
 
Windows Server 2008 伺服器虛擬化解決方案
Windows Server 2008 伺服器虛擬化解決方案Windows Server 2008 伺服器虛擬化解決方案
Windows Server 2008 伺服器虛擬化解決方案Timothy Chen
 
0514 Windows Server 2008 事件管理機制
0514 Windows Server 2008 事件管理機制0514 Windows Server 2008 事件管理機制
0514 Windows Server 2008 事件管理機制Timothy Chen
 
0514 Windows Server 2008 事件管理機制
0514 Windows Server 2008 事件管理機制0514 Windows Server 2008 事件管理機制
0514 Windows Server 2008 事件管理機制Timothy Chen
 
0513 深入Windows Server 2008 系統核心
0513 深入Windows Server 2008  系統核心0513 深入Windows Server 2008  系統核心
0513 深入Windows Server 2008 系統核心Timothy Chen
 
0509 Windows Serevr 2008 新世代網路應用程式
0509 Windows Serevr 2008 新世代網路應用程式0509 Windows Serevr 2008 新世代網路應用程式
0509 Windows Serevr 2008 新世代網路應用程式Timothy Chen
 
0506 Windows Server 2008 終端機服務
0506 Windows Server 2008 終端機服務0506 Windows Server 2008 終端機服務
0506 Windows Server 2008 終端機服務Timothy Chen
 
0505 Windows Server 2008 一日精華營 Part II
0505 Windows Server 2008 一日精華營 Part II0505 Windows Server 2008 一日精華營 Part II
0505 Windows Server 2008 一日精華營 Part IITimothy Chen
 
0505 Windows Server 2008 一日精華營 PartI
0505 Windows Server 2008 一日精華營 PartI0505 Windows Server 2008 一日精華營 PartI
0505 Windows Server 2008 一日精華營 PartITimothy Chen
 
0502 Windwos Server 2008 Card Space 新一代身份驗證機制
0502 Windwos Server 2008 Card Space 新一代身份驗證機制0502 Windwos Server 2008 Card Space 新一代身份驗證機制
0502 Windwos Server 2008 Card Space 新一代身份驗證機制Timothy Chen
 
1204 Windows Server 2008 檔案儲存與分行管理技術
1204 Windows Server 2008 檔案儲存與分行管理技術1204 Windows Server 2008 檔案儲存與分行管理技術
1204 Windows Server 2008 檔案儲存與分行管理技術Timothy Chen
 
0425 Windows Server 2008 與 WSS下之表單工作與工作流程的整合
0425 Windows Server 2008 與 WSS下之表單工作與工作流程的整合0425 Windows Server 2008 與 WSS下之表單工作與工作流程的整合
0425 Windows Server 2008 與 WSS下之表單工作與工作流程的整合Timothy Chen
 
0416 Windows Server 2008 Native IPv6 新功能介紹
0416 Windows Server 2008 Native IPv6 新功能介紹0416 Windows Server 2008 Native IPv6 新功能介紹
0416 Windows Server 2008 Native IPv6 新功能介紹Timothy Chen
 
0328 Windows Server 2008 應用程式相容性
0328 Windows Server 2008 應用程式相容性0328 Windows Server 2008 應用程式相容性
0328 Windows Server 2008 應用程式相容性Timothy Chen
 
1130 Windows server 2008 - IIS 7.0 伺服器效能管理
1130 Windows server 2008 - IIS 7.0 伺服器效能管理1130 Windows server 2008 - IIS 7.0 伺服器效能管理
1130 Windows server 2008 - IIS 7.0 伺服器效能管理Timothy Chen
 
1116 Windows server 2008 - 使用 IIS 7.0 建置安全站台
1116 Windows server 2008 - 使用 IIS 7.0 建置安全站台1116 Windows server 2008 - 使用 IIS 7.0 建置安全站台
1116 Windows server 2008 - 使用 IIS 7.0 建置安全站台Timothy Chen
 
Tech Net Taiwan Resources Intro
Tech Net Taiwan Resources IntroTech Net Taiwan Resources Intro
Tech Net Taiwan Resources IntroTimothy Chen
 
1026 Windows Server 2008 Active Directory 版權管理服務
1026 Windows Server 2008 Active Directory 版權管理服務1026 Windows Server 2008 Active Directory 版權管理服務
1026 Windows Server 2008 Active Directory 版權管理服務Timothy Chen
 
1107 Windows server 2008 - IIS 7.0 架構與建置
1107 Windows server 2008 - IIS 7.0 架構與建置1107 Windows server 2008 - IIS 7.0 架構與建置
1107 Windows server 2008 - IIS 7.0 架構與建置Timothy Chen
 

More from Timothy Chen (20)

Google Q3 2008 Quarterly Earnings Summary
Google Q3 2008 Quarterly Earnings SummaryGoogle Q3 2008 Quarterly Earnings Summary
Google Q3 2008 Quarterly Earnings Summary
 
Windows Server 2008 伺服器虛擬化解決方案
Windows Server 2008 伺服器虛擬化解決方案Windows Server 2008 伺服器虛擬化解決方案
Windows Server 2008 伺服器虛擬化解決方案
 
Windows Server 2008 伺服器虛擬化解決方案
Windows Server 2008 伺服器虛擬化解決方案Windows Server 2008 伺服器虛擬化解決方案
Windows Server 2008 伺服器虛擬化解決方案
 
0514 Windows Server 2008 事件管理機制
0514 Windows Server 2008 事件管理機制0514 Windows Server 2008 事件管理機制
0514 Windows Server 2008 事件管理機制
 
0514 Windows Server 2008 事件管理機制
0514 Windows Server 2008 事件管理機制0514 Windows Server 2008 事件管理機制
0514 Windows Server 2008 事件管理機制
 
0513 深入Windows Server 2008 系統核心
0513 深入Windows Server 2008  系統核心0513 深入Windows Server 2008  系統核心
0513 深入Windows Server 2008 系統核心
 
0509 Windows Serevr 2008 新世代網路應用程式
0509 Windows Serevr 2008 新世代網路應用程式0509 Windows Serevr 2008 新世代網路應用程式
0509 Windows Serevr 2008 新世代網路應用程式
 
0506 Windows Server 2008 終端機服務
0506 Windows Server 2008 終端機服務0506 Windows Server 2008 終端機服務
0506 Windows Server 2008 終端機服務
 
0505 Windows Server 2008 一日精華營 Part II
0505 Windows Server 2008 一日精華營 Part II0505 Windows Server 2008 一日精華營 Part II
0505 Windows Server 2008 一日精華營 Part II
 
0505 Windows Server 2008 一日精華營 PartI
0505 Windows Server 2008 一日精華營 PartI0505 Windows Server 2008 一日精華營 PartI
0505 Windows Server 2008 一日精華營 PartI
 
0502 Windwos Server 2008 Card Space 新一代身份驗證機制
0502 Windwos Server 2008 Card Space 新一代身份驗證機制0502 Windwos Server 2008 Card Space 新一代身份驗證機制
0502 Windwos Server 2008 Card Space 新一代身份驗證機制
 
1204 Windows Server 2008 檔案儲存與分行管理技術
1204 Windows Server 2008 檔案儲存與分行管理技術1204 Windows Server 2008 檔案儲存與分行管理技術
1204 Windows Server 2008 檔案儲存與分行管理技術
 
0425 Windows Server 2008 與 WSS下之表單工作與工作流程的整合
0425 Windows Server 2008 與 WSS下之表單工作與工作流程的整合0425 Windows Server 2008 與 WSS下之表單工作與工作流程的整合
0425 Windows Server 2008 與 WSS下之表單工作與工作流程的整合
 
0416 Windows Server 2008 Native IPv6 新功能介紹
0416 Windows Server 2008 Native IPv6 新功能介紹0416 Windows Server 2008 Native IPv6 新功能介紹
0416 Windows Server 2008 Native IPv6 新功能介紹
 
0328 Windows Server 2008 應用程式相容性
0328 Windows Server 2008 應用程式相容性0328 Windows Server 2008 應用程式相容性
0328 Windows Server 2008 應用程式相容性
 
1130 Windows server 2008 - IIS 7.0 伺服器效能管理
1130 Windows server 2008 - IIS 7.0 伺服器效能管理1130 Windows server 2008 - IIS 7.0 伺服器效能管理
1130 Windows server 2008 - IIS 7.0 伺服器效能管理
 
1116 Windows server 2008 - 使用 IIS 7.0 建置安全站台
1116 Windows server 2008 - 使用 IIS 7.0 建置安全站台1116 Windows server 2008 - 使用 IIS 7.0 建置安全站台
1116 Windows server 2008 - 使用 IIS 7.0 建置安全站台
 
Tech Net Taiwan Resources Intro
Tech Net Taiwan Resources IntroTech Net Taiwan Resources Intro
Tech Net Taiwan Resources Intro
 
1026 Windows Server 2008 Active Directory 版權管理服務
1026 Windows Server 2008 Active Directory 版權管理服務1026 Windows Server 2008 Active Directory 版權管理服務
1026 Windows Server 2008 Active Directory 版權管理服務
 
1107 Windows server 2008 - IIS 7.0 架構與建置
1107 Windows server 2008 - IIS 7.0 架構與建置1107 Windows server 2008 - IIS 7.0 架構與建置
1107 Windows server 2008 - IIS 7.0 架構與建置
 

0828 Windows Server 2008 新安全功能探討

  • 1. Windows Server 2008 新安全功能探討 呂政周 精誠恆逸教育訓練處 資深講師 http://edu.uuu.com.tw - -
  • 2.
  • 3.
  • 5. Windows Server 2008 安全的開發生命週期 對程式開發人員作定期與強制的安全教育 安全顧問針對所有系統元件為開發人員提供安全的建議 在設計階段對各種威脅模式納入考量 程式碼安全性檢視與測試 Common Criteria 認證
  • 6.
  • 7. Protect the OS When Running
  • 8.
  • 9.
  • 10. Hash validation scope - - Windows binaries Yes WHQL-certified third-party drivers Yes Unsigned drivers By policy Third-party application binaries No
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 17.
  • 18.
  • 19.
  • 20. Using Network Access Protection 1 Windows Client Policy Servers such as: Patch, AV MSFT NPS DHCP, VPN Switch/Router Client requests access to network and presents current health state 1 Corporate Network
  • 21. Using Network Access Protection 1 Windows Client 2 Policy Servers such as: Patch, AV MSFT NPS DHCP, VPN Switch/Router Client requests access to network and presents current health state 1 2 Dynamic Host Configuration Protocol (DHCP), virtual private network (VPN) or Switch/Router relays health status to Microsoft Network Policy Server (RADIUS) Corporate Network
  • 22. Using Network Access Protection 1 Windows Client 2 3 Policy Servers such as: Patch, AV MSFT NPS DHCP, VPN Switch/Router Client requests access to network and presents current health state 1 2 DHCP, VPN or Switch/Router relays health status to Microsoft Network Policy Server (RADIUS) 3 Network Policy Server (NPS) validates against IT-defined health policy Corporate Network
  • 23. Using Network Access Protection 1 Windows Client 2 3 Policy Servers such as: Patch, AV Not policy compliant MSFT NPS 4 DHCP, VPN Switch/Router Restricted Network Client requests access to network and presents current health state 1 2 DHCP, VPN or Switch/Router relays health status to Microsoft Network Policy Server (RADIUS) 3 Network Policy Server (NPS) validates against IT-defined health policy 4 If not policy compliant, client is put in a restricted virtual local area network (VLAN) and given access to fix up resources to download patches, configurations, signatures (Repeat 1 - 4) Fix Up Servers Example: Patch Corporate Network
  • 24. Using Network Access Protection 1 Windows Client 2 3 Policy Servers such as: Patch, AV Not policy compliant Policy compliant MSFT NPS 5 4 DHCP, VPN Switch/Router Restricted Network Client requests access to network and presents current health state 1 2 DHCP, VPN or Switch/Router relays health status to Microsoft Network Policy Server (RADIUS) 3 Network Policy Server (NPS) validates against IT-defined health policy 4 If not policy compliant, client is put in a restricted VLAN and given access to fix up resources to download patches, configurations, signatures (Repeat 1 - 4) Fix Up Servers Example: Patch 5 If policy compliant, client is granted full access to corporate network Corporate Network
  • 25. Windows Firewall Advanced Security Filter both incoming and outgoing traffic
  • 26. Windows Firewall Advanced Security New Microsoft ® Management Console (MMC) snap-in for GUI configuration
  • 27. Windows Firewall Advanced Security Integrated firewall and IP security (IPsec) settings
  • 28. Windows Firewall Advanced Security Several ways to configure exceptions
  • 29.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. Restricting services SCM computes service SID SCM adds the SID to service process’s token SCM creates write-restricted token SCM removes unneeded privileges from process token Service places ACL on resource—only service can write to it
  • 36.
  • 37. Windows Server 2008 Services Hardening Kernel Drivers User-mode Drivers D D D D D
  • 38.
  • 39.
  • 40.
  • 42. Object Access Auditing Object Access Attempt: Object Server: %1 Handle ID: %2 Object Type: %3 Process ID: %4 Image File Name: %5 Access Mask: %6
  • 43. Object Access Auditing An operation was performed on an object. Subject :                                                                 Security ID: %1                 Account Name: %2                          Account Domain: %3                 Logon ID: %4          Object:                 Object Server: %5                 Object Type: %6                 Object Name: %7                 Handle ID: %9 Operation:                 Operation Type: %8                 Accesses: %10                 Access Mask: %11                 Properties: %12                 Additional Info: %13                 Additional Info2: %14
  • 44.
  • 45.
  • 47. Terminal Services Gateway Perimeter network Internet Corp LAN External Firewall Internal Firewall Hotel Tunnels RDP over HTTPS Home Terminal Server Internet Terminal Server Terminal Services Gateway Server E-mail Server Business partner / client site Roaming wireless
  • 48.
  • 49.
  • 52.
  • 53.
  • 54.
  • 55.
  • 56.
  • 58.
  • 59. Defense-in-Depth ( 續 ) - - Policies, procedures, and awareness Physical security Perimeter Internal network Network defenses Host Application Data Client defenses Server defenses Host Application Data
  • 60. - - © 2007 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.