经典素材库合集(超级绝版)1_第1页
经典素材库合集(超级绝版)1_第2页
经典素材库合集(超级绝版)1_第3页
经典素材库合集(超级绝版)1_第4页
经典素材库合集(超级绝版)1_第5页
已阅读5页,还剩68页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、第一篇 区块篇Integrated phone and PDAPrimarily data viewingInteroperability with Outlook and Exchange.NET Compact FrameworkASP.NET mobile controlsMobile Device SolutionsComplex document authoring, editing and readingKeyboard centric at the deskKeyboard and mouse input methodsFull .NET framework availableC

2、entrino SolutionsWindows MobileWindows XPComplex document authoring, editing and active readingNote taking and ink annotating Keyboard centric at the desk, pen and keyboard away from the deskKeyboard, mouse plus pen, ink, and speech input methodsFull .NET framework preinstalledPen, ink, handwriting

3、and speech recognition APIsCentrino SolutionsView and some data entryIntegrated PDA with phoneInteroperability with Office, Exchange and SQL Server.NET Compact FrameworkASP.NET mobile controlsIntel Xscale SolutionsWindows CEOne-way networkInformation consumptionSmart Personal ObjectsSmartphonePocket

4、 PC and Pocket PC PhoneNotebook PCTablet PCNetwork DefenseHealth checkupIT checks “health” of clientNetwork Access ControlClients who pass get network accessClients who do not pass are fixed or blocked (aka “quarantined”)Health maintenanceQuarantined clients can be given access to resources to get h

5、ealthyFrom Home(VPN, Dial up)Returning LaptopsConsultantsGuestsUnhealthyDesktopsMicrosoft Business Solutions ERP PositioningProject Management and Accounting ERP Primarily in US and Latin America Mid-market ERP Typically customized for unique business processesGlobal ERPMultinationalsAdvanced manufa

6、cturersMid-market ERPRich out-of-the-box functionalityGuiding PrinciplesProductiveIntegratedExtensibleCapableShort learning curveMinimal administrative overheadTools integrated tightlyAutomates common tasksCustomizable for your processIntegrates with 3rd party toolsRemotely accessibleRobust, secure,

7、 scalableStaging ArchitectureData entryTestApplication CenterCommerce WebCommerceCommerce DataCommerce WebCommerceCommerce DataApplication CenterApplication CenterDataACS ClusterACS ClusterCluster controllerCluster controllerDataLive Communications Client RoadmapLC 1.2 Client PlatformMultiparty IMP2

8、P Voice and VideoMPOP GroupsRoamingSIP supportGPO policy managementLC 1.5 Client PlatformRoll up of QFEsMPOP AdditionsFederation/Archiving NotificationHA AdditionsLC 2.0 Client PlatformNext generation of RTC experiencesMore coming!20032H04LonghornEnterprise Deployment UpdateInternetFirewallFirewallF

9、irewallRuntime ServersCorporate LAN Internal ServersCrawl/SearchLoad Balanced WebInfrastructure ServersDevelopment ServersTest ServersBusiness Data ServersBusiness UsersDatabase and Staging ServersStaging ServersDatabase ServersOffline ServersIndicates Staged Data FlowCommunicate and collaborate in

10、a more secure mannerwithout sacrificing information worker productivityWindows XP SP2Block virus or malicious code at the “point of entry”At RiskThe SoftUnderbellySecurity Issues Today1 Source: Forrester Research2 Source: Information Week, 26 November 20013 Source: Netcraft summary4 Source: CERT, 20

11、035 Source: CSI/FBI Computer Crime and Security Survey6 Source: Computer Security Institute (CSI) Computer Crime and Security Survey 20027 Source: CERT, 20028 Source: Gartner Group14B devices on the Internet by 2010135M remote users by 2005265% increase in dynamic Web sites3From 2000 to 2002 reporte

12、d incidents rose from 21, 756 to 82,0944Nearly 80 percent of 445 respondents surveyed said the Internet has become a frequent point of attack, up from 57 percent just four years ago5 90% detected security breaches685% detected computer viruses695% of all breaches avoidable with an alternative config

13、uration7Approximately 70 percent of all Web attacks occur at the application layer8Application Layer AttacksIdentity TheftWeb Site DefacementUnauthorized AccessModification of Data, Logs and RecordsTheft of Proprietary InformationService DisruptionImplicationsCompliance:Sarbanes OxleyGramm Leach Bli

14、lelyUS Patriot ActHIPAAThe Privacy Act (CA)Basel 2 (EU)Data Protection Act (EU)Litigation File Sharing Piracy HR Issues Shareholder SuitsCustomer ImpactTypes Of SRP RulesPath RuleCompares path of file being run to an allowed path listUse when you have a folder with many files for the same applicatio

15、nEssential in when SRPs are strictHash RuleCompares the MD5 or SHA1 hash of a file to the one attempted to be runUse when you want to allow/prohibit a certain version of a file from being runCertificate RuleChecks for digital signature on application (i.e. Authenticode)Use when you want to restrict

16、both win32 applications and ActiveX contentInternet Zone RuleControls how Internet Zones can be accessedUse when in high security environments to control access to web applicationsSQL Server 2005 ThemesSupportability & QualityEnterprise EnhancementsUnified & Flexible AdministrationPatch SolutionsPre

17、vention, Readiness, RecoveryEase of usePatch InstallsPatch in integrated stepIntegrated Database Services and Business IntelligenceFlexible install managementAdd value to one-step Failover ClusteringExpanded scripting supportTraditional FirewallsWide open to advanced attacksPerformance versussecurit

18、y tradeoffLimited capacityfor growthHard to manageCode Red, NimdaSSL-based attacksSecurity is complexIT is already overloadedBandwidth too expensiveToo many moving partsNot easily upgradeableDont scale with businessChoosing the Right Type of Assessment Vulnerability Scanning Focuses on known weaknes

19、ses Of the three, requires the least expertise Generally easy to automatePenetration TestingFocuses on known and unknown weaknessesRequires advanced technical expertiseCarries tremendous legal burden in certain countries/organizations IT Security Audits Focuses on security policies and procedures Of

20、 the three, requires the most expertise When done right is the most effective type of assessmentPerimeter Security EvolutionWide open to advanced attacksApplication-level protectionPerformance versussecurity tradeoffSecurity and performanceLimited capacityfor growthExtensibility and scalabilityHard

21、to manageEasier to useThe advanced application layer firewall, VPN and Web cache solution that enables customers to maximize IT investments by improving network security and performanceAdvanced protectionApplication layer security designed to protect Microsoft applicationsFast, secure accessEmpowers

22、 you to connect users to relevant information on yournetwork in a cost efficient mannerEase of useEfficiently deploy, manage, and enable new usage scenariosIntroducing: ISA Server 2004Fast, secure accessEmpowers you to connect users to relevant info. on your networkISA Server 2004 New FeaturesContin

23、ued commitment to integrationEnhancedarchitecture High speed data transport Utilizes latest Windows and PC hardware SSL bridging unloads downstream serversWeb cache Updated policy rules Serve content locally Pre-fetch content during low activity periodsInternet accesscontrol User- and group-based We

24、b usage policy Extensible by third partiesComprehensiveauthentication New support for RADIUS and RSA SecurID User- & group-based access policy Third party extensibilitySystem Service AccountsLocal Service and Network ServiceNo password to manageRuns with only slightly more permissions than Authentic

25、ated User Local Service cannot authenticate across the network, Network Service authenticates as the computer accountLocal System No password to manage Bypasses security checksUser AccountsRun with less privilege than Local System Stores password as an LSA secretCan be complex to configureWhats New

26、With IPSec?Management IP Security Monitor Command-line management with Netsh Logical addresses for local IP configuration Security Stronger cryptographic master key (Diffie-Hellman) Computer startup security Persistent policy for enhanced security Ability to exclude the name of the CA from certifica

27、te requests Better default exemption handlingInteroperability IPSec functionality over network address translation (NAT) Improved IPSec integration with Network Load BalancingISA Server 2004 New FeaturesNew management tools and user interfaceMulti-networkarchitectureUnlimited network definitions and

28、 typesFirewall policy applied to all trafficPer network routing relationshipsNetwork templatesand wizardsWizard automates nwk routing relationshipsSupports 5 common network topologiesEasily customized for sophisticated scenariosVisual policy editorUnified firewall/VPN policy w/one rule-baseDrag/drop

29、 editing w/scenario-driven wizardsXML-based configuration import-exportEnhancedtrouble-shootingAll new monitoring dashboardReal-time log viewerContent sensitive task panesEase of UseEfficiently deploy, manage, and enable new usage scenariosHow To Use Windows UpdateTo configure Automatic Updates:Sele

30、ct Keep my computer up to dateOpen the System application in Control Panel1On the Automatic Updates tab, select theoption you want32Office UpdateBenefitsLimitationSingle location for office patches and updatesEasy to useCan be configured to update consumer orenterprise systemsDoes not support Automa

31、tic Updates; updating must be initiated manuallyOffice Update Web site: :/How To Use Office Update1Click Check for Updates2Install the Office Update Installation Engine (if not already installed)3Select the updates you want to install4Click Start Installation5How To Use SUSOn the SUS serverConfigure

32、 the SUS server at :/SUSAdminOn each SUS clientConfigure Automatic Updates on the client to use the SUS server Use Group Policy, manually configure each client, oruse scriptsSet the SUS server synchronization scheduleReview, test, and approve updates123How To Use MBSADownload and install MBSA (once

33、only)1Launch MBSA2Select the computer(s) to scan3Select relevant options4Click Start scan5View the Security Report6Software Update Service Deployment Best Practices (1)Review each security patch Download and install the patchTest each security patch before deploymentConfigure a test labUse a test SU

34、S serverConsider using Virtual PCs in the test labUse a standard acceptance testing procedureSoftware Update Service Deployment Best Practices (2)Complete the deploymentPilot the deploymentConfigure a child SUS server to approve updatesConfigure a GPO so that the patch is downloaded from the pilot S

35、US server only by specified workstationsIf the pilot fails, remove approval from the SUS server and manually uninstall the patchHow To Use SMS To Deploy PatchesOpen the SMS Administrator Console1Right-click All Windows XP Computers, and then select All Tasks Distribute Software Updates3Use the wizar

36、d to create a new package and program4Browse to the patch to be deployed5Configure options for how and when the patch will be deployed to clients6Expand the Site Database node2SMS MBSA IntegrationScans SMS clients for missing security updates using mbsacli.exe /hfSMS directs client to run local MBSA

37、 scan1SMS server parses data to determine which computers need which security updates3Administrator pushes missing updates only to clients that require them4Client performs scan, returns data to SMS server2MBSA BenefitsScans systems forMissing security patchesPotential configuration issuesWorks with

38、 a broad range ofMicrosoft softwareAllows an administrator to centrally scan multiple computers simultaneously MBSA is a free tool, and can bedownloaded from MBSA ConsiderationsMBSA reports important vulnerabilitiesPassword weaknessesGuest account not disabledAuditing not configuredUnnecessary servi

39、ces installedIIS vulnerabilitiesIE zone settingsAutomatic Updates configurationInternet Connection Firewall configurationMBSA Scan OptionsMBSA has three scan optionsMBSA graphical user interface (GUI)MBSA standard command-lineinterface ()HFNetChk scan ( /hf)Business Case ForPatch ManagementWhen dete

40、rmining the potential financial impact of poor patch management, considerDowntimeRemediation timeQuestionable data integrityLost credibilityNegative public relationsLegal defensesStolen intellectual property“We commend Microsoft for providing enhanced security guidance to its customers as well as fo

41、r soliciting user input as part of the process of producing that guidance“Clint KreitnerPresident/CEO“NIST reviewed and provided technical comments & advice, that was incorporated in this guidance”Timothy GranceManagerSystems and Network Security GroupCommentsSecurely make e-mail available to outsid

42、e employeesExchange publishingYou Need ToSecurely make internal applications available on the InternetWeb and Server PublishingEnable partners to access relevant information on my networkIntegrated S2S VPN and FWSecure and flexible remote access, while protecting my corporate networkIntegrated RRAS

43、VPN and FWSecurely connect my branch offices to the corporate officeIntegrated FW, VPN, CacheControl Internet Access and protect my clients from malicious Internet trafficFW, Web ProxyEnsure fast access to the most frequently used web contentCachingISA DeliversRelational ReportingMultiple fact table

44、sFull richness the dimensionsattributes Transaction level accessStar, snowflake, 3NF Complex relationships: Multi-grains, many-to-many, role playing, indirectRecursive self joinsSlowly changing dimensionsThe Unified Dimensional Model The Best Of Relational And OLAPOLAP CubesMultidimensional navigati

45、onHierarchical presentationFriendly entity namesPowerful MDX calculationsCentral KPI framework“Actions” Language translations Multiple perspectivesPartitionsAggregations Distributed sourcesVisual Studio Team SystemChange ManagementWork Item TrackingReportingProject SiteVisual StudioTeam FoundationIn

46、tegration ServicesProject ManagementProcess and Architecture GuidanceVisual Studio Industry PartnersDynamic Code AnalyzerVisual StudioTeam ArchitectStatic Code AnalyzerCode ProfilerUnit TestingCode CoverageVisio and UML ModelingTeam Foundation ClientVS ProClass ModelingLoad TestingManual TestingTest

47、 Case ManagementApplication ModelingLogical Infra. ModelingDeployment ModelingVisual StudioTeam DeveloperVisual StudioTeam TestApplication ModelingLogical Infra. ModelingDeployment ModelingClass ModelingSQL Server CatalogReport ServerXML Web Service InterfaceReport ProcessingDeliveryDelivery Targets

48、(E-mail, SharePoint,Custom)RenderingOutput Formats (HTML, Excel, PDF, Custom)Data ProcessingData Sources(SQL, OLE DB, XML/A, ODBC, Oracle, Custom)SecuritySecurity Services(NT, Passport, Custom)OfficeCustom ApplicationBrowserSQL Server 2000 Reporting Services ArchitectureCM ProfileRuns customizablepo

49、st connect scriptScript runs RQC notifierwith “results string”ListenerRQS receives Notifier“results string”Compares results topossible resultsRemoves time-out ifresponse received butclient out of dateRemoves quarantine filterif client up to dateQuarantine VSAsTimer limits timewindow to receive notif

50、y before auto disconnectQ-filter sets temporary route filter to quarantine accessInternetRAS ClientRRAS ServerIAS ServerQuarantineRQC.exe and RQS.exe are in the Windows Server 2003 Resource KitQuarantine ArchitectureWhat is VS Team Foundation?Source Code ControlWork Item TrackingBuild AutomationProj

51、ect SiteReportingMicrosoft BI Product SuiteAnalysis ServicesOLAP & Data MiningData TransformationServicesSQL ServerRelational EngineReporting ServicesManagement ToolsDev Tools Visual Studio .NetExcelOWCVisioMap PointData AnalyzerSharePoint PortalServerProject ServerWindows ServerMBS BI ApplicationsC

52、urrent ArchitectureTCP/IPRTC Client APIUser AppRTPSIPPINTT.120Server ArchitectureApplicationManaged APIsApplicationManaged APIsWinsockStorageADDispatcherData Store InterfacesSPL Script EngineRegistrar/PresenceSIP ProxyServerApplication InteractionApplication1 CRMApplication2 BillingApplication3 Logg

53、ingRequestModifiedRequestTITLEAvailableTodayMicrosoft Windows Security Resource KitAssessing Network SecurityJune 23, 2004EAP architectureTLSGSS_APIKerberosPEAPIKEMD5EAPPPPAnythingmethodlayerEAPlayermedialayerMS-CHAPv2TLSSecurIDPartner Solutions OfferingsVALUE Proposition:Get more business value fro

54、m your investment in OfficeFinanceSarbanes-OxleyBusiness ScorecardExcel Add-in for SQL Server Analysis ServicesOperationsSix SigmaHRRecruitingSalesProposalsSolution AcceleratorsMicrosoft ProductsOffice Solution AcceleratorsVALUE Proposition:Get more business value from your investment in OfficeYour

55、PeopleEPM Involves.Your BusinessProcesses Your OrganizationYour Software Technology & ToolsEnterprise Project ManagementAn orchestration of your people, processes, organization with technologyYour Business ProcessesGovernancePrioritizationBudgetingHuman Resources etc InitiativesImplement Microsoft O

56、fficeProject 2003 for the EnterpriseDecisions- Corporate Goals and ObjectivesExecutivesFinanceSales and MarketingR&DIT / ISYour OrganizationStrategic Initiatives HRDevelopment ProjectsOperational ImprovementsOn Average 45-50% of all Projects are linked to Strategic Objectives.Representative Risks An

57、d TacticsTactical SolutionsEnterprise RisksEmbodyTrustworthyComputingSecure Environmental RemediationUnpatched DevicesNetwork Segmentation Through IPSecUnmanaged DevicesSecure Remote UserRemote and Mobile UsersTwo-Factor for Remote Access and AdministratorsSingle-Factor AuthenticationManaged Source

58、InitiativesFocus Controls Across Key AssetsRemote Access SecurityThreatRequirementSolutionMalicioususersTwo factor authenticationSmart Cardsfor RASMalicioussoftwareEnforce remote system security configurationConnection Manager, custom scripts and tools provided in the Windows 2003 resource kitCorpor

59、ate Security Group OrganizationCorporate Security GroupThreat, RiskAnalysis, and PolicyAssessment andComplianceMonitoring, Intrusion Detection, and Incident ResponseShared ServicesOperationsThreat and RiskAnalysisPolicyDevelopmentProductEvaluationDesignReviewStructureStandardsSecurityManagementSecurityAssessmentCompliance andRemediationMonitoring andIntrusion DetectionRapid Responseand ResolutionForensicsITInvestigationsPhysical andRemote AccessCertificateAdministr

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论