




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、优质的PPT必备区块篇素材汇总Integrated phone and PDAPrimarily data viewingInteroperability with Outlook and Exchange.NET Compact FrameworkASP.NET mobile controlsMobile Device SolutionsComplex document authoring, editing and readingKeyboard centric at the deskKeyboard and mouse input methodsFull .NET framework av
2、ailableCentrino SolutionsWindows MobileWindows XPComplex document authoring, editing and active readingNote taking and ink annotating Keyboard centric at the desk, pen and keyboard away from the deskKeyboard, mouse plus pen, ink, and speech input methodsFull .NET framework preinstalledPen, ink, hand
3、writing and speech recognition APIsCentrino SolutionsView and some data entryIntegrated PDA with phoneInteroperability with Office, Exchange and SQL Server.NET Compact FrameworkASP.NET mobile controlsIntel Xscale SolutionsWindows CEOne-way networkInformation consumptionSmart Personal ObjectsSmartpho
4、nePocket PC and Pocket PC PhoneNotebook PCTablet PCNetwork DefenseHealth checkupIT checks “health” of clientNetwork Access ControlClients who pass get network accessClients who do not pass are fixed or blocked (aka “quarantined”)Health maintenanceQuarantined clients can be given access to resources
5、to get healthyFrom Home(VPN, Dial up)Returning LaptopsConsultantsGuestsUnhealthyDesktopsMicrosoft Business Solutions ERP PositioningProject Management and Accounting ERP Primarily in US and Latin America Mid-market ERP Typically customized for unique business processesGlobal ERPMultinationalsAdvance
6、d manufacturersMid-market ERPRich out-of-the-box functionalityGuiding PrinciplesProductiveIntegratedExtensibleCapableShort learning curveMinimal administrative overheadTools integrated tightlyAutomates common tasksCustomizable for your processIntegrates with 3rd party toolsRemotely accessibleRobust,
7、 secure, scalableStaging ArchitectureData entryTestApplication CenterCommerce WebCommerceCommerce DataCommerce WebCommerceCommerce DataApplication CenterApplication CenterDataACS ClusterACS ClusterCluster controllerCluster controllerDataLive Communications Client RoadmapLC 1.2 Client PlatformMultipa
8、rty IMP2P Voice and VideoMPOP GroupsRoamingSIP supportGPO policy managementLC 1.5 Client PlatformRoll up of QFEsMPOP AdditionsFederation/Archiving NotificationHA AdditionsLC 2.0 Client PlatformNext generation of RTC experiencesMore coming!20032H04LonghornEnterprise Deployment UpdateInternetFirewallF
9、irewallFirewallRuntime ServersCorporate LAN Internal ServersCrawl/SearchLoad Balanced WebInfrastructure ServersDevelopment ServersTest ServersBusiness Data ServersBusiness UsersDatabase and Staging ServersStaging ServersDatabase ServersOffline ServersIndicates Staged Data FlowCommunicate and collabo
10、rate in a more secure mannerwithout sacrificing information worker productivityWindows XP SP2Block virus or malicious code at the “point of entry”At RiskThe SoftUnderbellySecurity Issues Today1 Source: Forrester Research2 Source: Information Week, 26 November 20013 Source: Netcraft summary4 Source:
11、CERT, 20035 Source: CSI/FBI Computer Crime and Security Survey6 Source: Computer Security Institute (CSI) Computer Crime and Security Survey 20027 Source: CERT, 20028 Source: Gartner Group14B devices on the Internet by 2010135M remote users by 2005265% increase in dynamic Web sites3From 2000 to 2002
12、 reported incidents rose from 21, 756 to 82,0944Nearly 80 percent of 445 respondents surveyed said the Internet has become a frequent point of attack, up from 57 percent just four years ago5 90% detected security breaches685% detected computer viruses695% of all breaches avoidable with an alternativ
13、e configuration7Approximately 70 percent of all Web attacks occur at the application layer8Application Layer AttacksIdentity TheftWeb Site DefacementUnauthorized AccessModification of Data, Logs and RecordsTheft of Proprietary InformationService DisruptionImplicationsCompliance:Sarbanes OxleyGramm L
14、each BlilelyUS Patriot ActHIPAAThe Privacy Act (CA)Basel 2 (EU)Data Protection Act (EU)Litigation Piracy HR Issues Shareholder SuitsCustomer ImpactTypes Of SRP RulesPath RuleCompares path of run to an allowed path listUse when you have a folder with many files for the same applicationEssential in wh
15、en SRPs are strictHash RuleCompares the MD5 or SHA1 hash of a the one attempted to be runUse when you want to allow/prohibit a certain version of a being runCertificate RuleChecks for digital signature on application (i.e. Authenticode)Use when you want to restrict both win32 applications and Active
16、X contentInternet Zone RuleControls how Internet Zones can be accessedUse when in high security environments to control access to web applicationsSQL Server 2005 ThemesSupportability & QualityEnterprise EnhancementsUnified & Flexible AdministrationPatch SolutionsPrevention, Readiness, RecoveryEase o
17、f usePatch InstallsPatch in integrated stepIntegrated Database Services and Business IntelligenceFlexible install managementAdd value to one-step Failover ClusteringExpanded scripting supportTraditional FirewallsWide open to advanced attacksPerformance versussecurity tradeoffLimited capacityfor grow
18、thHard to manageCode Red, NimdaSSL-based attacksSecurity is complexIT is already overloadedBandwidth too expensiveToo many moving partsNot easily upgradeableDont scale with businessChoosing the Right Type of Assessment Vulnerability Scanning Focuses on known weaknesses Of the three, requires the lea
19、st expertise Generally easy to automatePenetration TestingFocuses on known and unknown weaknessesRequires advanced technical expertiseCarries tremendous legal burden in certain countries/organizations IT Security Audits Focuses on security policies and procedures Of the three, requires the most expe
20、rtise When done right is the most effective type of assessmentPerimeter Security EvolutionWide open to advanced attacksApplication-level protectionPerformance versussecurity tradeoffSecurity and performanceLimited capacityfor growthExtensibility and scalabilityHard to manageEasier to useThe advanced
21、 application layer firewall, VPN and Web cache solution that enables customers to maximize IT investments by improving network security and performanceAdvanced protectionApplication layer security designed to protect Microsoft applicationsFast, secure accessEmpowers you to connect users to relevant
22、information on yournetwork in a cost efficient mannerEase of useEfficiently deploy, manage, and enable new usage scenariosIntroducing: ISA Server 2004Fast, secure accessEmpowers you to connect users to relevant info. on your networkISA Server 2004 New FeaturesContinued commitment to integrationEnhan
23、cedarchitecture High speed data transport Utilizes latest Windows and PC hardware SSL bridging unloads downstream serversWeb cache Updated policy rules Serve content locally Pre-fetch content during low activity periodsInternet accesscontrol User- and group-based Web usage policy Extensible by third
24、 partiesComprehensiveauthentication New support for RADIUS and RSA SecurID User- & group-based access policy Third party extensibilitySystem Service AccountsLocal Service and Network ServiceNo password to manageRuns with only slightly more permissions than Authenticated User Local Service cannot aut
25、henticate across the network, Network Service authenticates as the computer accountLocal System No password to manage Bypasses security checksUser AccountsRun with less privilege than Local System Stores password as an LSA secretCan be complex to configureWhats New With IPSec?Management IP Security
26、Monitor Command-line management with Netsh Logical addresses for local IP configuration Security Stronger cryptographic master key (Diffie-Hellman) Computer startup security Persistent policy for enhanced security Ability to exclude the name of the CA from certificate requests Better default exempti
27、on handlingInteroperability IPSec functionality over network address translation (NAT) Improved IPSec integration with Network Load BalancingISA Server 2004 New FeaturesNew management tools and user interfaceMulti-networkarchitectureUnlimited network definitions and typesFirewall policy applied to a
28、ll trafficPer network routing relationshipsNetwork templatesand wizardsWizard automates nwk routing relationshipsSupports 5 common network topologiesEasily customized for sophisticated scenariosVisual policy editorUnified firewall/VPN policy w/one rule-baseDrag/drop editing w/scenario-driven wizards
29、XML-based configuration import-exportEnhancedtrouble-shootingAll new monitoring dashboardReal-time log viewerContent sensitive task panesEase of UseEfficiently deploy, manage, and enable new usage scenariosHow To Use Windows UpdateTo configure Automatic Updates:Select Keep my computer up to dateOpen
30、 the System application in Control Panel1On the Automatic Updates tab, select theoption you want32Office UpdateBenefitsLimitationSingle location for office patches and updatesEasy to useCan be configured to update consumer orenterprise systemsDoes not support Automatic Updates; updating must be init
31、iated manuallyOffice Update Web site:How To Use Office UpdateGo to 1Click Check for Updates2Install the Office Update Installation Engine (if not already installed)3Select the updates you want to install4Click Start Installation5How To Use SUSOn the SUS serverConfigure the SUS server at :/SUSAdminOn
32、 each SUS clientConfigure Automatic Updates on the client to use the SUS server Use Group Policy, manually configure each client, oruse scriptsSet the SUS server synchronization scheduleReview, test, and approve updates123How To Use MBSADownload and install MBSA (once only)1Launch MBSA2Select the co
33、mputer(s) to scan3Select relevant options4Click Start scan5View the Security Report6Software Update Service Deployment Best Practices (1)Review each security patch Download and install the patchTest each security patch before deploymentConfigure a test labUse a test SUS serverConsider using Virtual
34、PCs in the test labUse a standard acceptance testing procedureSoftware Update Service Deployment Best Practices (2)Complete the deploymentPilot the deploymentConfigure a child SUS server to approve updatesConfigure a GPO so that the patch is downloaded from the pilot SUS server only by specified wor
35、kstationsIf the pilot fails, remove approval from the SUS server and manually uninstall the patchHow To Use SMS To Deploy PatchesOpen the SMS Administrator Console1Right-click All Windows XP Computers, and then select All Tasks Distribute Software Updates3Use the wizard to create a new package and p
36、rogram4Browse to the patch to be deployed5Configure options for how and when the patch will be deployed to clients6Expand the Site Database node2SMS MBSA IntegrationScans SMS clients for missing security updates using mbsacli.exe /hfSMS directs client to run local MBSA scan1SMS server parses data to
37、 determine which computers need which security updates3Administrator pushes missing updates only to clients that require them4Client performs scan, returns data to SMS server2MBSA BenefitsScans systems forMissing security patchesPotential configuration issuesWorks with a broad range ofMicrosoft soft
38、wareAllows an administrator to centrally scan multiple computers simultaneously MBSA is a free tool, and can bedownloaded from MBSA ConsiderationsMBSA reports important vulnerabilitiesPassword weaknessesGuest account not disabledAuditing not configuredUnnecessary services installedIIS vulnerabilitie
39、sIE zone settingsAutomatic Updates configurationInternet Connection Firewall configurationMBSA Scan OptionsMBSA has three scan optionsMBSA graphical user interface (GUI)MBSA standard command-lineinterface (mbsacli.exe)HFNetChk scan (mbsacli.exe /hf)Business Case ForPatch ManagementWhen determining t
40、he potential financial impact of poor patch management, considerDowntimeRemediation timeQuestionable data integrityLost credibilityNegative public relationsLegal defensesStolen intellectual property“We commend Microsoft for providing enhanced security guidance to its customers as well as for solicit
41、ing user input as part of the process of producing that guidance“Clint KreitnerPresident/CEO“NIST reviewed and provided technical comments & advice, that was incorporated in this guidance”Timothy GranceManagerSystems and Network Security GroupCommentsSecurely make e-mail available to outside employe
42、esExchange publishingYou Need ToSecurely make internal applications available on the InternetWeb and Server PublishingEnable partners to access relevant information on my networkIntegrated S2S VPN and FWSecure and flexible remote access, while protecting my corporate networkIntegrated RRAS VPN and F
43、WSecurely connect my branch offices to the corporate officeIntegrated FW, VPN, CacheControl Internet Access and protect my clients from malicious Internet trafficFW, Web ProxyEnsure fast access to the most frequently used web contentCachingISA DeliversRelational ReportingMultiple fact tablesFull ric
44、hness the dimensionsattributes Transaction level accessStar, snowflake, 3NF Complex relationships: Multi-grains, many-to-many, role playing, indirectRecursive self joinsSlowly changing dimensionsThe Unified Dimensional Model The Best Of Relational And OLAPOLAP CubesMultidimensional navigationHierarc
45、hical presentationFriendly entity namesPowerful MDX calculationsCentral KPI framework“Actions” Language translations Multiple perspectivesPartitionsAggregations Distributed sourcesVisual Studio Team SystemChange ManagementWork Item TrackingReportingProject SiteVisual StudioTeam FoundationIntegration
46、 ServicesProject ManagementProcess and Architecture GuidanceVisual Studio Industry PartnersDynamic Code AnalyzerVisual StudioTeam ArchitectStatic Code AnalyzerCode ProfilerUnit TestingCode CoverageVisio and UML ModelingTeam Foundation ClientVS ProClass ModelingLoad TestingManual TestingTest Case Man
47、agementApplication ModelingLogical Infra. ModelingDeployment ModelingVisual StudioTeam DeveloperVisual StudioTeam TestApplication ModelingLogical Infra. ModelingDeployment ModelingClass ModelingSQL Server CatalogReport ServerXML Web Service InterfaceReport ProcessingDeliveryDelivery Targets(E-mail,
48、SharePoint,Custom)RenderingOutput Formats (HTML, Excel, PDF, Custom)Data ProcessingData Sources(SQL, OLE DB, XML/A, ODBC, Oracle, Custom)SecuritySecurity Services(NT, Passport, Custom)OfficeCustom ApplicationBrowserSQL Server 2000 Reporting Services ArchitectureCM ProfileRuns customizablepost connec
49、t scriptScript runs RQC notifierwith “results string”ListenerRQS receives Notifier“results string”Compares results topossible resultsRemoves time-out ifresponse received butclient out of dateRemoves quarantine filterif client up to dateQuarantine VSAsTimer limits timewindow to receive notify before
50、auto disconnectQ-filter sets temporary route filter to quarantine accessInternetRAS ClientRRAS ServerIAS ServerQuarantineRQC.exe and RQS.exe are in the Windows Server 2003 Resource KitQuarantine ArchitectureWhat is VS Team Foundation?Source Code ControlWork Item TrackingBuild AutomationProject SiteR
51、eportingMicrosoft BI Product SuiteAnalysis ServicesOLAP & Data MiningData TransformationServicesSQL ServerRelational EngineReporting ServicesManagement ToolsDev Tools Visual Studio .NetExcelOWCVisioMap PointData AnalyzerSharePoint PortalServerProject ServerWindows ServerMBS BI ApplicationsCurrent Ar
52、chitectureTCP/IPRTC Client APIUser AppRTPSIPPINTT.120Server ArchitectureApplicationManaged APIsApplicationManaged APIsWinsockStorageADDispatcherData Store InterfacesSPL Script EngineRegistrar/PresenceSIP ProxyServerApplication InteractionApplication1 CRMApplication2 BillingApplication3 LoggingReques
53、tModifiedRequestTITLEAvailableTodayMicrosoft Windows Security Resource KitAssessing Network SecurityJune 23, 2004EAP architectureTLSGSS_APIKerberosPEAPIKEMD5EAPPPPAnythingmethodlayerEAPlayermedialayerMS-CHAPv2TLSSecurIDPartner Solutions OfferingsVALUE Proposition:Get more business value from your in
54、vestment in OfficeFinanceSarbanes-OxleyBusiness ScorecardExcel Add-in for SQL Server Analysis ServicesOperationsSix SigmaHRRecruitingSalesProposalsSolution AcceleratorsMicrosoft ProductsOffice Solution AcceleratorsVALUE Proposition:Get more business value from your investment in OfficeYour PeopleEPM
55、 Involves.Your BusinessProcesses Your OrganizationYour Software Technology & ToolsEnterprise Project ManagementAn orchestration of your people, processes, organization with technologyYour Business ProcessesGovernancePrioritizationBudgetingHuman Resources etc InitiativesImplement Microsoft OfficeProj
56、ect 2003 for the EnterpriseDecisions- Corporate Goals and ObjectivesExecutivesFinanceSales and MarketingR&DIT / ISYour OrganizationStrategic Initiatives HRDevelopment ProjectsOperational ImprovementsOn Average 45-50% of all Projects are linked to Strategic Objectives.Representative Risks And Tactics
57、Tactical SolutionsEnterprise RisksEmbodyTrustworthyComputingSecure Environmental RemediationUnpatched DevicesNetwork Segmentation Through IPSecUnmanaged DevicesSecure Remote UserRemote and Mobile UsersTwo-Factor for Remote Access and AdministratorsSingle-Factor AuthenticationManaged Source Initiativ
58、esFocus Controls Across Key AssetsRemote Access SecurityThreatRequirementSolutionMalicioususersTwo factor authenticationSmart Cardsfor RASMalicioussoftwareEnforce remote system security configurationConnection Manager, custom scripts and tools provided in the Windows 2003 resource kitCorporate Secur
59、ity Group OrganizationCorporate Security GroupThreat, RiskAnalysis, and PolicyAssessment andComplianceMonitoring, Intrusion Detection, and Incident ResponseShared ServicesOperationsThreat and RiskAnalysisPolicyDevelopmentProductEvaluationDesignReviewStructureStandardsSecurityManagementSecurityAssess
60、mentCompliance andRemediationMonitoring andIntrusion DetectionRapid Responseand ResolutionForensicsITInvestigationsPhysical andRemote AccessCertificateAdministrationSecurityToolsInitiativeManagementServer FunctionsOperational InfrastructureServer Workloads FocusApplication/Web ServerUnix integration
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025年中国可伸缩乒乓球网格行业市场全景分析及前景机遇研判报告
- 2025年中国咖啡机清洁液行业市场全景分析及前景机遇研判报告
- 癌症康复期用药指南
- 中国防雷避雷产品行业市场深度分析及行业发展趋势报告
- 2019-2025年中国定制酒行业市场深度分析及发展前景预测报告
- 网围栏可行性研究报告
- 中国电动自行车电商行业发展监测及市场发展潜力预测报告
- 2025年中国豆腐行业市场深度分析及发展前景预测报告
- 起重安装项目投资可行性研究分析报告(2024-2030版)
- 2025年 云南省观光车驾驶-特种设备作业N2证考试练习题附答案
- 小学生汇报讲课件
- 2025浙江嘉兴市海宁市嘉睿人力招聘5人笔试参考题库附带答案详解析版
- 2025年安徽蚌埠市龙子湖区东方人力资源有限公司招聘笔试参考题库含答案解析
- 党课课件含讲稿:《关于加强党的作风建设论述摘编》辅导报告
- GB/T 19023-2025质量管理体系成文信息指南
- 2025中考历史高频点速记大全
- 多余物管理制度
- 2024北京朝阳区三年级(下)期末语文试题及答案
- 灌肠技术操作课件
- 电梯维保服务投标方案
- 证券从业资格考试金融市场基础知识
评论
0/150
提交评论