Trustworthy Computing
|
|
|
- Colleen Greer
- 9 years ago
- Views:
Transcription
1 Stefan Thom Senior Software Development Engineer and Security Architect for IEB, Microsoft Rob Spiger, Senior Security Strategist Trustworthy Computing
2 Agenda Windows 8 TPM Scenarios Hardware Choices with Windows Windows 8 TPM Provisioning Platform Crypto Provider TPM Base Services Boot Measurements and Attestation PCP ToolKit 2
3 TPM Scenarios with Windows 8 3 Attestation Measurements are recorded during the boot process and proven to a 3 rd party BitLocker Drive Encryption - The OS volume is encrypted and booting it requires TPM boot measurements match and an optional PIN is provided during boot Platform Crypto Provider Certificates can be created with their private key bound to the TPM 3 rd party applications can use the TPM like any other Key Storage Provider in Windows 8 Virtual Smart Card The TPM acts like a permanently inserted Smart Card. 3 rd Party Applications Applications send TPM commands to the device through the TPM Base Services API in Windows
4 Windows 8 support for applications using TPM TPM Applications Direct TPM Commands Win32_TPM Class Key Storage Provider TPM Provisioning Virtual Smart Card Internal TPM 1.2/TPM 2.0 Abstraction Layer Attestation And BitLocker TPM Base Services API Microsoft TPM Stack (resource virtualization & power management) TPM 1.2 TPM 2.0 4
5 Windows Hardware Landscape Windows 8 Certified Windows 7 Logo x86/x64 CPU x86/x64 CPU Connected Standby Scenario ARM Processor 5
6 Getting the TPM Provisioned Windows (automatic) if things are configured correctly Administrators: Use tpm.msc and Prepare the TPM if the status is not Ready for use Launch tpminit.exe with administrator privileges from command line or an application Interactively does the process of provisioning for applications using the Windows 8 UX Might involve a reboot (or two) and actions during the boot process Use the Win32_TPM Class Provisioning Method Provision(Boolean ForceClear_Allowed, Boolean PhysicalPresencePrompts_Allowed) Your application controls the user experience and needs to do the interaction with users 6
7 Windows 8 Automatic TPM 1.2 Provisioning Not Ready Not Ready Ready Provisioning Flag = True Provisioning Flag = True Provisioning Flag = True Disabled Enabled Enabled Deactivated Activated Activated 7 Ownership Not Taken Ownership Not Taken Ownership Taken
8 Windows 8 Automatic TPM 2.0 Provisioning Not Ready Ready TPM Visible to OS TPM Visible to OS EmptyAuth Set EmptyAuth Set 8 EmptyAuth Set
9 Platform Crypto Provider (PCP) Requires the TPM to be in a Ready state Works with TPM 1.2 or TPM 2.0 and runs in-process Provides the standard Crypto Next Generation interface using the TPM May specify the Platform Crypto Provider in a certificate template Tracing Developers can trace PCP TPM commands by setting REG_SZ value ProviderTraces under the key HKLM\SYSTEM\CurrentControlSet\Services\TPM with a folder name The process needs write permissions for the directory 9
10 Bcrypt RNG Platform Crypto Provider Exposes the TPM random number generator through the CNG RNG interface Works with TPM 1.2 or TPM 2.0 and runs in-process Only uses the TPM as a source (unlike the default Windows provider that uses many sources) Depending how much entropy the TPM can generate in a single command it could take many TPM commands to generate entropy. The limit permitted is 4096 bytes per a call. You can stir the TPMs entropy with up to 256 bytes too. 10
11 NCrypt RSA Platform Key Storage Provider Supports a subset of the Microsoft software provider Fully supports all actions used by certificate enrollment Does not support exportable keys without any authorization Does support exportable keys that require a migration authorization for controlled export Supports a bunch of additional methods and properties allowing use of the TPM s functionality Keys bound to PCR values Having the TPM constrain the key usage for a specific purpose like encryption or signing Creating attestation information about a key to show it exists in a TPM May be used by custom enrollment agents 11
12 TPM Base Services API (TBS) Permits applications to send TPM 1.2 or TPM 2.0 commands directly Resource virtualization Available in kernel mode or user mode Methods: Tbsi_Context_Create Tbsip_Context_Close Tbsi_Get_TCG_Log Tbsi_Revoke_Attestation Tbsi_GetDeviceInfo Tbsip_Submit_Command 12
13 Trusted boot architecture 1 UEFI Boot 1 Boot Policy 3 2 Win 8 OS Loader AM Policy TPM 3 Windows Kernel ELAM Software 4 2 3rd Party Software 4 Windows Logon Anti- Malware Client Quote Healthy? Attestation Service
14 Boot Process up to Windows Boot Manager Unified Extensible Firmware Interface (UEFI) Boot UEFI Environment UEFI Drivers UEFI Windows Boot Manager Power On TPM Startup Specific Firmware Compatibility Support Module (CSM) Conventional BIOS Environment Option ROMs Conventional BIOS Boot Master Boot Record Boot Block Boot Sector 14 Windows Boot Manager
15 Boot Process from Boot Manager Boot from Hibernation Measured in TPM by Win8 WinResume Hibernation File Windows 8 Operating Running Hibernating Hibernation File Windows Boot Manager Windows Kernel WinLoad Measured in TPM by Windows 8 Full Boot Process Core Windows Kernel Early Launch Anti-Malware Drivers Early Launch Driver Policy Measured in TPM by Windows 8 Boot Drivers Anti-malware Runtime Driver Storage Driver Other Early Launch Anti-Malware Drivers Stopped Normal Drivers 15
16 Attestation for Full Boot TPM Startup Specific Firmware Full Boot Process UEFI BIOS An Attestation identity key is provisioned for the platform Windows Boot Manager WinLoad Kernel Startup Early Launch Anti-Malware Drivers Early Launch Driver Policy Anti-malware Runtime Driver Handoff Windows 8 Operating Running Anti-malware Runtime Driver Policy Enforcement Proof is a Boot Log and a Quote of PCR values Provisioning process verifies the attestation key only exists in the TPM 16 Attestation keys are used to sign the current PCR values, the result is a Quote Can be reviewed by a remote verifier to determine if the client system is trustworthy
17 What executes in Hibernation/Resume Cycles Archive Boot Log with Quote of the PCRs Full Boot Process TPM Startup Increment TPM Restart Counter Increment TPM 17 Restart Counter Specific Firmware UEFI BIOS Windows Boot Manager Possible Extra Boot with Offline Event TPM Startup Increment TPM Restart Counter Another Boot Resuming from Hibernation TPM Startup Specific Firmware Specific Firmware UEFI BIOS UEFI BIOS Record TPM Restart Counter Something else booted? Windows Boot Manager Record TPM Restart Counter WinLoad Hibernation File Tampering? WinResume Kernel Startup Early Launch Anti-Malware Drivers Early Launch Driver Policy Anti-malware Runtime Driver Handoff Restored Hibernation File Windows 8 Operating Running Anti-malware Runtime Driver Policy Enforcement Stored Hibernation File Windows 8 Operating Running Anti-malware Runtime Driver Policy Enforcement
18 What if anti-malware stops enforcing policy? Anti-malware might not be able to continuously enforce policy Might need to do something it doesn t trust Event Counter skips value after calling RevokeAttestation Archive Boot Log with Quote of the PCRs Full Boot Process TPM Startup Specific Firmware UEFI BIOS Windows Boot Manager Event Counter Increment & Measurement WinLoad WinResume Kernel Start Hibernation File Windows 8 Operating Running Anti-malware Runtime Driver Policy Enforcement 18 Can call Windows RevokeAttestation API Changes the value of PCR[12] so the boot log & quote don t match Increments the Event Counter the archive log doesn t match the value in the TPM on hibernation/resume Proof is a Boot Log and a Quote of PCR values PCR[12] Mismatch after calling RevokeAttestation
19 Attestation for Hibernation Resume Cycle Stored Hibernation File Another Boot Resuming from Hibernation TPM Startup Increment TPM Restart Counter Specific Firmware UEFI BIOS Windows Boot Manager Record TPM Restart Counter Event Counter Increment & Measurement WinResume Restored Hibernation File Windows 8 Operating Running Anti-malware Runtime Driver Policy Enforcement Proof is a Boot Log and a Quote of PCR values Can be reviewed by a remote verifier to determine if the client system is trustworthy Continuous boot logs can be confirmed by successive TPM restart counter measurements in the archived logs If the Event Counter skips a value, the RevokeAttestation was called in previous boot Archived Boot Logs and Quotes from previous boots 19
20 Trust Boundary Trust Boundary Trust Boundary Separator Measurement Trust Boundary Boot Process Measurements Optional Revoke Attestation Action Power-on components through Boot Manager Boot Manager, WinLoad & Resume Configuration Restart Counter Event Counter WinLoad / Resume Config Kernel Options Early Launch Antimalware Data Invalidated BootMgr.mui WinLoad WinResume WinLoad.mui WinResume.mui Windows Kernel Boot Drivers Boot Mgr.mui WinLoad WinResume Boot Mgr.mui WinLoad WinResume 20 Restart Count++ Event Counter Incremented Event Counter Incremented
21 Creating AIKs 21
22 Resources TPM Platform Crypto Provider Toolkit: TPM 2.0 Library Specification: Understanding and Evaluating Virtual Smart Cards: Windows 8 TPM Base Services API documentation: Windows 8 Hardware Certification Requirements: 23
23 Q & A Stefan Thom ([email protected]) Rob Spiger ([email protected]) 24
24 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
Hi and welcome to the Microsoft Virtual Academy and
Hi and welcome to the Microsoft Virtual Academy and 2012 Microsoft Corporation 1 the start of the Windows 8 Security Insights training. My name is Milad Aslaner I m part of the Premier Field Engineering
Session ID: Session Classification:
Session ID: Session Classification: Protecting Data with Encryption Access Control Protect Sensitive Data Protect and Manage Threats Groundbreaking Malware Resistance Protects the client, data, and corporate
Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation
Boot Manager Security Policy Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation v 1.3 6/8/11 1 INTRODUCTION... 1 1.1 Cryptographic Boundary for BOOTMGR... 1 2 SECURITY POLICY...
UEFI on Dell BizClient Platforms
UEFI on Dell BizClient Platforms Authors: Anand Joshi Kurt Gillespie This document is for informational purposes only and may contain typographical errors and technical inaccuracies. The content is provided
Penetration Testing Windows Vista TM BitLocker TM
Penetration Testing BitLocker TM Drive Encryption Douglas MacIver Penetration Engineer System Integrity Group, Corporation Hack In The Box 2006/09/21 2006 Corporation. All rights reserved. Trustworthy
Data At Rest Protection
Data At Rest Protection Dell Data Protection Encryption Full Volume Encryption Whitepaper October 2011 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL
Security Policy for FIPS 140 2 Validation
BitLocker Windows OS Loader Security Policy for FIPS 140 2 Validation BitLocker Windows OS Loader (winload) in Microsoft Windows 8.1 Enterprise Windows Server 2012 R2 Windows Storage Server 2012 R2 Surface
UEFI Implications for Windows Server
presented by UEFI Implications for Windows Server Taipei UEFI Plugfest March 18-22, 2013 Presented by Arie van der Hoeven (Microsoft Corporation) Updated 2011-06-01 Taipei UEFI Plugfest March 2013 www.uefi.org
Lifecycle Controller Platform Update/Firmware Update in Dell PowerEdge 12th Generation Servers
Lifecycle Controller Platform Update/Firmware Update in Dell PowerEdge 12th Generation Servers This Dell Technical White Paper provides detailed information about the capabilities of Lifecycle Controller
Overview of Windows 10 Requirements for TPM, HVCI and SecureBoot
presented by Overview of Windows 10 Requirements for TPM, HVCI and SecureBoot UEFI Spring Plugfest May 18-22, 2015 Gabe Stocco, Scott Anderson, Suhas Manangi Updated 2011-06-01 UEFI Plugfest May 2015 www.uefi.org
University of Rochester Sophos SafeGuard Encryption for Windows Support Guide
Sophos SafeGuard Encryption for Windows Support Guide University Information Technology Security & Policy September 15, 2015 Version Date Modification 1.0 September 15, 2015 Initial guide 1.1 1.2 1.3 1.4
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory
Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Tom Olzak October 2007 If your business is like mine, laptops regularly disappear. Until recently, centrally managed
A Virtualized Linux Integrity Subsystem for Trusted Cloud Computing
A Virtualized Linux Integrity Subsystem for Trusted Cloud Computing Stefan Berger Joint work with: Kenneth Goldman, Dimitrios Pendarakis, David Safford, Mimi Zohar IBM T.J. Watson Research Center 09/21/2011
DriveLock and Windows 8
Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
Windows BitLocker Drive Encryption Step-by-Step Guide
Windows BitLocker Drive Encryption Step-by-Step Guide Microsoft Corporation Published: September 2006 Abstract Microsoft Windows BitLocker Drive Encryption is a new hardware-enhanced feature in the Microsoft
DriveLock and Windows 7
Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust. Dan Griffin DefCon 2013
Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust Dan Griffin DefCon 2013 Time-Bound Keys Announcements New tool: TimedKey.exe New whitepaper: Trusted Tamperproof Time on Mobile
Using BitLocker As Part Of A Customer Data Protection Program: Part 1
Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Tech Tip by Philip Cox Source: searchsecuritychannel.com As an information security consultant, one of my jobs is to help my clients
Encrypting with BitLocker for disk volumes under Windows 7
Encrypting with BitLocker for disk volumes under Windows 7 Summary of the contents 1 Introduction 2 Hardware requirements for BitLocker Driver Encryption 3 Encrypting drive 3.1 Operating System Drive 3.1.1
How to Encrypt your Windows 7 SDS Machine with Bitlocker
How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly
A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 16 Fixing Windows Problems Objectives Learn what to do when a hardware device, application, or Windows component gives a problem Learn what to do
Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation
Security Overview for Windows Vista Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation Agenda User and group changes Encryption changes Audit changes User rights New and modified
BitLocker Network Unlock & BitLocker support for Encrypted Drives
presented by BitLocker Network Unlock & BitLocker support for Encrypted Drives UEFI Winter Plugfest February 21-23, 2011 Presented by Narendra Acharya (Microsoft) Updated 2011-06-01 www.uefi.org 1 Agenda
DELL. Unified Server Configurator Security Overview. A Dell Technical White Paper. By Raja Tamilarasan, Wayne Liles, Marshal Savage and Weijia Zhang
DELL A Dell Technical White Paper Unified Server Configurator Security Overview By Raja Tamilarasan, Wayne Liles, Marshal Savage and Weijia Zhang THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND
Cautions When Using BitLocker Drive Encryption on PRIMERGY
Cautions When Using BitLocker Drive Encryption on PRIMERGY July 2008 Fujitsu Limited Table of Contents Preface...3 1 Recovery mode...4 2 Changes in hardware configurations...5 3 Prior to hardware maintenance
In order to enable BitLocker, your hard drive must be partitioned in a particular manner.
ENABLE BITLOCKER ON WINDOWS VISTA - WITHOUT A TPM Requirements: You must be running Vista Enterprise or Vista Ultimate to enable BitLocker. Any other version of Vista is not compatible. It is recommended
How to enable Disk Encryption on a laptop
How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Version 9.0 User Guide 302-001-755 REV 01 Copyright 2007-2015 EMC Corporation. All rights reserved. Published in USA. Published
Acronym Term Description
This glossary contains definitions of terms created by TCG, or terms that have a particular meaning in trusted computing, or terms that cause particular confusion in trusted computing. Acronym Term Description
Get Success in Passing Your Certification Exam at first attempt!
Get Success in Passing Your Certification Exam at first attempt! Vendor: Microsoft Exam Code: 70-687 Exam Name: Microsoft Configuring Windows 8 Exam Version: Demo QUESTION: 1 A company has an Active Directory
Operating System Security
Operating System Security Klaus Schütz Windows OS Security Microsoft Redmond Before I start My VP love(d) me A frustrated friend 1 Agenda Evolution of Threats Client vs. Server Security Operating System
MBAM Self-Help Portals
MBAM Self-Help Portals Authoring a self-help portal workflow for BitLocker Recovery Using Microsoft BitLocker Administration and Monitoring (MBAM) Technical White Paper Published: September 2011 Priyaa
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure Addressing the Concerns of the IT Professional Rob Weber February 2015 Page 2 Table of Contents What is BitLocker?... 3 What is
VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
Windows Server 2008 R2 Essentials
Windows Server 2008 R2 Essentials Installation, Deployment and Management 2 First Edition 2010 Payload Media. This ebook is provided for personal use only. Unauthorized use, reproduction and/or distribution
Embedded Trusted Computing on ARM-based systems
1 / 26 Embedded Trusted Computing on ARM-based systems Martin Schramm, M.Eng. 10.04.2014 Agenda 2 of 26 [email protected] Embedded computing platforms have become omnipresent intend to alleviate
Check Point FDE integration with Digipass Key devices
INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Version 8.2 Service Pack 1 User Guide 302-001-235 REV 01 Copyright 2007-2015 EMC Corporation. All rights reserved. Published
Enabling SSL and Client Certificates on the SAP J2EE Engine
Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine
Software-based TPM Emulator for Linux
Software-based TPM Emulator for Linux Semester Thesis Mario Strasser Department of Computer Science Swiss Federal Institute of Technology Zurich Summer Semester 2004 Mario Strasser: Software-based TPM
Windows Embedded 7 E versus Windows Embedded 7 P
Windows Embedded 7 E versus Windows Embedded 7 P Applications and Services Development.Net Framework.Net Framework 3.5 SP1.NET Framework 2.0 Client Profile.NET Framework 3.0.NET Framework 3.0 Client Profile.NET
DIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
Intel Identity Protection Technology with PKI (Intel IPT with PKI)
Intel Identity Protection Technology with PKI (Intel IPT with PKI) Technology Overview White Paper by Paul Carbin Rev 1.0, May 22 2012 Technology Overview Page 1 of 26 Legal Notices and Disclaimers INFORMATION
Windows 7, Enterprise Desktop Support Technician
Windows 7, Enterprise Desktop Support Technician Course Number: 70-685 Certification Exam This course is preparation for the Microsoft Certified IT Professional (MCITP) Exam, Exam 70-685: Pro: Windows
Windows BitLocker TM Drive Encryption Design Guide
Windows BitLocker TM Drive Encryption Design Guide Microsoft Corporation Published: August 2007 Abstract This document describes the various aspects of planning for deploying Windows BitLocker Drive Encryption
Training Guide: Configuring Windows8 8
Training Guide: Configuring Windows8 8 Scott D. Lowe Derek Schauland Rick W. Vanover Introduction System requirements Practice setup instructions Acknowledgments Errata & book support We want to hear from
HP Personal Workstations Step-By- Step Instructions for Upgrading Windows Vista or Windows XP Systems to Windows 7
HP Personal Workstations Step-By- Step Instructions for Upgrading Windows Vista or Windows XP Systems to Windows 7 September 15, 2009 Introduction HP is committed to supporting our customer s operating
TPM for Dell Business Clients Using Self Contained Executable. A Dell Technical White Paper
TPM for Dell Business Clients Using Self Contained Executable A Dell Technical White Paper Authors Vibha Garg is an engineer in the Dell Open Manage Biz Client Organization. Sharmad Naik is an engineer
User Guide Win7Zilla
User Guide Win7Zilla Table of contents Section 1: Installation... 3 1.1 System Requirements... 3 1.2 Software Installation... 3 1.3 Uninstalling Win7Zilla software... 3 Section 2: Navigation... 4 2.1 Main
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
Disk Encryption. Aaron Howard IT Security Office
Disk Encryption Aaron Howard IT Security Office Types of Disk Encryption? Folder Encryption Volume or Full Disk Encryption OS / Boot Volume Data Volume Managed or Unmanaged Key Backup and Data Assurance
70-685: Enterprise Desktop Support Technician
70-685: Enterprise Desktop Support Technician Course Introduction Course Introduction Chapter 01 - Identifying Cause and Resolving Desktop Application Issues Identifying Cause and Resolving Desktop Application
How to Secure Infrastructure Clouds with Trusted Computing Technologies
How to Secure Infrastructure Clouds with Trusted Computing Technologies Nicolae Paladi Swedish Institute of Computer Science 2 Contents 1. Infrastructure-as-a-Service 2. Security challenges of IaaS 3.
WINDOWS PROCESSES AND SERVICES
OBJECTIVES: Services o task manager o services.msc Process o task manager o process monitor Task Scheduler Event viewer Regedit Services: A Windows service is a computer program that operates in the background.
Introducing. Markus Erlacher Technical Solution Professional Microsoft Switzerland
Introducing Markus Erlacher Technical Solution Professional Microsoft Switzerland Overarching Release Principles Strong emphasis on hardware, driver and application compatibility Goal to support Windows
BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation
BitLocker Drive Encryption Hardware Enhanced Data Protection Shon Eizenhoefer, Program Manager Microsoft Corporation Agenda Security Background BitLocker Drive Encryption TPM Overview Building a BitLocker
epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Website: www.ftsafe.com
epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Revision History: Date Revision Description June 2013 V1.0 Release of the first version i Software Developer s Agreement All Products of Feitian
Sophos SafeGuard Disk Encryption for Mac Startup guide
Startup guide Document date: January 2011 Content 1 Before you begin... 2 2 Protecting Mac OS X computers... 3 3 Technical support... 4 4 Copyright... 5 1 1 Before you begin 1.1 System requirements Hardware
Windows Phone 8 Security deep dive
October 2012 Windows Phone 8 Security deep dive David Hernie Technical Evangelist Microsoft Belux Office Microsoft Corporation All large screen, dual-core, LTE and NFC Nokia Lumia 920 Nokia Lumia 820 Samsung
HP BUSINESS NOTEBOOK PC F10 SETUP OVERVIEW
HP BUSINESS NOTEBOOK PC F10 SETUP OVERVIEW 2011 Business Notebook Models Technical white paper Table of contents Executive summary... 2 System requirements... 2 Supported models... 2 Enhancements... 2
PARALLELS SERVER 4 BARE METAL README
PARALLELS SERVER 4 BARE METAL README This document provides the first-priority information on Parallels Server 4 Bare Metal and supplements the included documentation. TABLE OF CONTENTS 1 About Parallels
BorderGuard Client. Version 4.4. November 2013
BorderGuard Client Version 4.4 November 2013 Blue Ridge Networks 14120 Parke Long Court, Suite 103 Chantilly, Virginia 20151 703-631-0700 WWW.BLUERIDGENETWORKS.COM All Products are provided with RESTRICTED
Computer Setup User Guide
Computer Setup User Guide Copyright 2008 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Intel is a trademark
Smart Card Certificate Authentication with VMware View 4.5 and Above WHITE PAPER
Smart Card Certificate Authentication with VMware View 4.5 and Above WHITE PAPER Table of Contents.... About This Paper.... 3 Introduction... 3 Smart Card Overview.... 3 Getting Started... 4 Authenticating
HP ProtectTools User Guide
HP ProtectTools User Guide Copyright 2007 Hewlett-Packard Development Company, L.P. Microsoft and Windows are U.S. registered trademarks of Microsoft Corporation. Intel is a trademark or registered trademark
Introducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008
7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned
SSD Guru. Installation and User Guide. Software Version 1.4
SSD Guru Installation and User Guide Software Version 1.4 Contents Welcome!............................................................................. 1 Key features.........................................................................
Security and Compliance. Robert Nottoli Principal Technology Specialist Microsoft Corporation [email protected]
Security and Compliance Robert Nottoli Principal Technology Specialist Microsoft Corporation [email protected] DISCLAIMER FOR DOCUMENTATION REGARDING PRE-RELEASED SOFTWARE This document supports a
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016
ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference May 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government
MALWAREBYTES PLUGIN DOCUMENTATION
Contents Requirements... 2 Installation Scenarios... 2 Malwarebytes 2.xx or 1.75 is already deployed.... 2 Install / Update Malwarebytes Plugin... 3 Configuring Malwarebytes Plugin... 5 About the Screens...
One-Stop Intel TXT Activation Guide
One-Stop Intel TXT Activation Guide DELL* PowerEdge 12G Server Systems Intel Trusted Execution Technology (Intel TXT) for Intel Xeon processor-based servers is commonly used to enhance platform security
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Release 8.2 User Guide P/N 302-000-658 REV 01 Copyright 2007-2014 EMC Corporation. All rights reserved. Published in the USA.
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12
Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge
FIPS 140-2 Security Policy LogRhythm 6.0.4 Log Manager
FIPS 140-2 Security Policy LogRhythm 6.0.4 Log Manager LogRhythm 3195 Sterling Circle, Suite 100 Boulder CO, 80301 USA September 17, 2012 Document Version 1.0 Module Version 6.0.4 Page 1 of 23 Copyright
CCEVS Approved Assurance Continuity Maintenance Report
Record ID: VID10486-0004-ACMR TM CCEVS Approved Assurance Continuity Maintenance Report Product: Orchestrator 4.6 EAL: 2 augmented with ALC_FLR.3 Date of Activity: 25 March 2013 References: Documentation
Using the TPM to Solve Today s Most Urgent Cybersecurity Problems
Using the to Solve Today s Most Urgent Cybersecurity Problems May 20, 2014 10:00AM PDT 2 Stacy Cannady, Technical Marketing Trustworthy Computing, Cisco Stacy Cannady, CISSP, is technical marketing - Trustworthy
FIPS 140-2 Security Policy LogRhythm 6.0.4 or 6.3.4 Windows System Monitor Agent
FIPS 140-2 Security Policy LogRhythm 6.0.4 or 6.3.4 Windows System Monitor Agent LogRhythm, Inc. 4780 Pearl East Circle Boulder, CO 80301 May 1, 2015 Document Version 2.0 Module Versions 6.0.4 or 6.3.4
Enhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide
RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com
HP ProtectTools Security Manager Guide
HP ProtectTools Security Manager Guide HP Compaq Business Desktops Copyright 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Microsoft
Hiva-network.com. Microsoft_70-680_v2011-06-22_Kat. Exam A
Exam A Microsoft_70-680_v2011-06-22_Kat QUESTION 1 You have a computer that runs Windows 7. The computer has a single volume. You install 15 applications and customize the environment. You complete the
Trusted Platform Module
Trusted Platform Module TPM Fundamental APTISS, August 2008 Raymond Ng Infineon Technologies Asia Pacific Pte Ltd [email protected] TPM Fundamental Introduction to TPM Functional Component of TPM
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution
EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Release 3.0 User Guide P/N 300-999-671 REV 02 Copyright 2007-2013 EMC Corporation. All rights reserved. Published in the USA.
1 Intel Smart Connect Technology Installation Guide:
1 Intel Smart Connect Technology Installation Guide: 1.1 System Requirements The following are required on a system: System BIOS supporting and enabled for Intel Smart Connect Technology Microsoft* Windows*
Windows 7 BitLocker Drive Encryption Security Policy For FIPS 140-2 Validation
Windows 7 BitLocker Security Policy Page 1 of 16 Windows 7 BitLocker Drive Encryption Security Policy For FIPS 140-2 Validation For Windows 7 Document version 1.0 08/31/2011 1. Table of Contents 1. TABLE
Tuning U2 Databases on Windows. Nik Kesic, Lead Technical Support
Tuning U2 Databases on Windows Nik Kesic, Lead Technical Support Nik Kesic s Bio Joined unidata in 1995 ATS (Advanced Technical Support), U2 Common Clients and DB tools College degree in Telecommunications
Navigating Endpoint Encryption Technologies
Navigating Endpoint Encryption Technologies Whitepaper November 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS
Compatibility with Encryption Products
Technical Brief Compatibility with Encryption Products Overview The purpose of this document is to describe the integration between Persystent Suite 4.5 and disk encryption products such as McAfee Endpoint
EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide
EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide BitLocker Deployment Guide Document Version 0.0.0.5 http://www.wave.com ERAS v 2.8 Wave Systems Corp. 2010 Contents Contents... 2
