Protect Sensitive Data Using Encryption Technologies. Ravi Sankar Technology Evangelist Microsoft Corporation

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Protect Sensitive Data Using Encryption Technologies. Ravi Sankar Technology Evangelist Microsoft Corporation http://ravisankar.spaces.live."

Transcription

1 Protect Sensitive Data Using Encryption Technologies Ravi Sankar Technology Evangelist Microsoft Corporation

2 Where is the User Data Stored? Q: Where is the biggest data exposure risk? SQL

3 Clients Documents Where do users keep their documents? User Profile Outlook, Sharepoint, Desktop, Temp, IE Per-machine Data Search index, offline file cache, pagefile Non-standard Locations ISV & in-house apps

4 What are the data protection options? BitLocker Drive Encryption Encrypting File System Rights Management Service But don t forget Data backup Data minimizing Data classification

5 Each year, hundreds of thousands of computers without appropriate safeguards are lost, stolen, or improperly decommissioned around the world

6 BitLocker TM / EFS in Vista

7 Disk Layout & Key Storage Operating System Volume Contains: Encrypted OS Encrypted Page File Encrypted Temp Files Encrypted Data Encrypted Hibernation File Where s the Encryption Key? 1. SRK (Storage Root Key) contained in TPM 2. SRK encrypts the VMK (Volume Master Key). 3. VMK encrypts FVEK (Full Volume Encryption Key) used for the actual data encryption. 4. FVEK and VMK are stored encrypted on the Operating System Volume. Operating System Volume System FVEK 3 4 VMK 2 SRK 1 System Volume (1.5GB) Contains: MBR Boot Manager Boot Utilities

8 BDE Protection Methods Factors BDE Function and Remarks TPM TPM + PIN TPM + Startup Key Startup Key Transparently validates early boot components on OS startup Best ease of use Protects against HW-only attacks Vulnerable to some HW attacks User must enter 4-20 digit PIN on OS startup BDE validates PIN and early boot components Protects against software-only and many hardware attacks Vulnerable to TPM breaking attacks Looks for USB flash drive with Startup Key BDE validates saved key and early boot components Protects against many HW attacks Protects against TPM attacks Looks for USB with Startup Key BDE validates saved key Protects against many HW attacks Vulnerable to lost token and pre-os attacks

9 BitLocker Scenario 1

10 BitLocker Scenario 2

11 BitLocker Scenario 3 Normal Vs. BitLocker Decommission Nothing ****** * Reformat drive Delete keys Admin wipes drive

12 Encrypting File System Encrypts each file Requires NTFS Smart card support for user/ recovery key

13 Confidential information is leaked out by accidental forwarding of s and other documents

14 Does your policy support enforcement..?

15 End User Scenarios Safeguard Sensitive Information with RMS Protect , documents, and Web content Secure s Outlook 2003 Windows RMS Keep corporate off the Internet Prevent forwarding of confidential information Templates to centrally manage policies Secure Documents Word 2003, PowerPoint 2003 Excel 2003, Windows RMS Control access to sensitive info Set access level - view, change, print... Determine length of access Log and audit who has accessed rights-protected information Secure Intranets IE w/rma, Windows RMS Users without Office 2003 can view rightsprotected files Enforces assigned rights: view, print, export, copy/paste & time-based expiration

16 Federated Rights Management Contoso Adatum Account Federation Server Federation Trust Web SSO Resource Federation Server Together AD FS and AD RMS enable users from different domains to securely share documents based on federated identities AD RMS is fully claimsaware and can interpret AD FS claims Office SharePoint Server 2007 can be configured to accept federated identity claims

17 RMS does not protect against analog attacks

18 Windows Vista/Server 2008 Information Protection Scenarios BitLocker EFS RMS Laptops Branch office server Local single-user file & folder protection Local multi-user file & folder protection Remote file & folder protection Untrusted network admin Remote document policy enforcement Some cases can result in overlap. (e.g. Multi-user roaming laptops with untrusted network admins)

BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation

BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation BitLocker Drive Encryption Hardware Enhanced Data Protection Shon Eizenhoefer, Program Manager Microsoft Corporation Agenda Security Background BitLocker Drive Encryption TPM Overview Building a BitLocker

More information

Agenda. BitLocker Drive. BitLocker Drive Encryption Hardware Enhanced Data Protection. BitLocker And TPM Features

Agenda. BitLocker Drive. BitLocker Drive Encryption Hardware Enhanced Data Protection. BitLocker And TPM Features BitLocker Drive Encryption Hardware Enhanced Data Protection Shon Eizenhoefer, Program Manager Microsoft Corporation Agenda Security Background BitLocker Drive Encryption TPM Overview Building a BitLocker

More information

Introduction to BitLocker FVE

Introduction to BitLocker FVE Introduction to BitLocker FVE (Understanding the Steps Required to enable BitLocker) Exploration of Windows 7 Advanced Forensic Topics Day 3 What is BitLocker? BitLocker Drive Encryption is a full disk

More information

Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation

Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation Security Overview for Windows Vista Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation Agenda User and group changes Encryption changes Audit changes User rights New and modified

More information

Security and Compliance. Robert Nottoli Principal Technology Specialist Microsoft Corporation robnotto@microsoft.com

Security and Compliance. Robert Nottoli Principal Technology Specialist Microsoft Corporation robnotto@microsoft.com Security and Compliance Robert Nottoli Principal Technology Specialist Microsoft Corporation robnotto@microsoft.com DISCLAIMER FOR DOCUMENTATION REGARDING PRE-RELEASED SOFTWARE This document supports a

More information

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security

More information

ICT Professional Optional Programmes

ICT Professional Optional Programmes ICT Professional Optional Programmes Skills Team are a Microsoft Academy with new training rooms and IT labs in our purpose built training centre in Ealing, West London. We offer a range of year-long qualifications

More information

Disk Encryption. Aaron Howard IT Security Office

Disk Encryption. Aaron Howard IT Security Office Disk Encryption Aaron Howard IT Security Office Types of Disk Encryption? Folder Encryption Volume or Full Disk Encryption OS / Boot Volume Data Volume Managed or Unmanaged Key Backup and Data Assurance

More information

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory Tom Olzak October 2007 If your business is like mine, laptops regularly disappear. Until recently, centrally managed

More information

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Tech Tip by Philip Cox Source: searchsecuritychannel.com As an information security consultant, one of my jobs is to help my clients

More information

Encrypting stored data. Tuomas Aura T-110.4206 Information security technology

Encrypting stored data. Tuomas Aura T-110.4206 Information security technology Encrypting stored data Tuomas Aura T-110.4206 Information security technology Outline 1. Scenarios 2. File encryption 3. Encrypting file system 4. Full disk encryption 5. Data recovery Simple applications

More information

DriveLock and Windows 8

DriveLock and Windows 8 Why alone is not enough CenterTools Software GmbH 2013 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

DriveLock and Windows 7

DriveLock and Windows 7 Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide

EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide BitLocker Deployment Guide Document Version 0.0.0.5 http://www.wave.com ERAS v 2.8 Wave Systems Corp. 2010 Contents Contents... 2

More information

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015 Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure Addressing the Concerns of the IT Professional Rob Weber February 2015 Page 2 Table of Contents What is BitLocker?... 3 What is

More information

Do "standard tools" meet your needs when it comes to providing security for mobile PCs and data media?

Do standard tools meet your needs when it comes to providing security for mobile PCs and data media? Product Insight Do "standard tools" meet your needs when it comes to providing security for mobile PCs and data media? Author Version Document Information Utimaco Product Management Device Security 4.30.00

More information

Windows 7. Noen nyheter. Olav Tvedt, Deployment Ranger Microsoft

Windows 7. Noen nyheter. Olav Tvedt, Deployment Ranger Microsoft Windows 7 Noen nyheter Olav Tvedt, Deployment Ranger Microsoft Agenda Sikkerhet for mobile brukere Bitlocker Bitlocker to go Applocker Branch Cache Sikkerhet For Mobile Brukere Securing Anywhere Access

More information

In order to enable BitLocker, your hard drive must be partitioned in a particular manner.

In order to enable BitLocker, your hard drive must be partitioned in a particular manner. ENABLE BITLOCKER ON WINDOWS VISTA - WITHOUT A TPM Requirements: You must be running Vista Enterprise or Vista Ultimate to enable BitLocker. Any other version of Vista is not compatible. It is recommended

More information

MarkMlnasi Byron Hynes

MarkMlnasi Byron Hynes A ul ^HP &1 ^n* JÜ& MarkMlnasi Byron Hynes i 1 8 O 7,^ j Wiley Publishing, Inc. Mark Minasi U Windows Administrator X. Library Table of Contents Introduction Chapter 1 Administering Vista Security: The

More information

Course 20688A: Managing and Maintaining Windows 8

Course 20688A: Managing and Maintaining Windows 8 Course 20688A: Managing and Maintaining Windows 8 Length: 5 Days Audience(s): IT Professionals Level: 200 Delivery Method: Instructor-led (classroom) About this Course In this course, students learn how

More information

Implementing Active Directory Rights Management Services with Exchange and SharePoint

Implementing Active Directory Rights Management Services with Exchange and SharePoint Course 50403B: Implementing Active Directory Rights Management Services with Exchange and SharePoint Course Details Course Outline Module 1: Why Rights Management? This module provides an overview of Microsoft

More information

Windows 7. Qing Liu Qing.Liu@chi.frb.org Michael Stevens Michael.Stevens@chi.frb.org

Windows 7. Qing Liu Qing.Liu@chi.frb.org Michael Stevens Michael.Stevens@chi.frb.org Windows 7 Qing Liu Qing.Liu@chi.frb.org Michael Stevens Michael.Stevens@chi.frb.org 1 Overview 1. Financial Institution s Preliminary Steps 2. User Interface 3. Data Protection 4. User and Group Changes

More information

ADMINISTERING WINDOWS VISTA SECURITY: THE BIG SURPRISES

ADMINISTERING WINDOWS VISTA SECURITY: THE BIG SURPRISES ADMINISTERING WINDOWS VISTA SECURITY: THE BIG SURPRISES Introduction. Chapter 1 Administering Vista Security: The Little Surprises. Restoring the Administrator. Making Your Own Administrator. Activating

More information

Managing BitLocker Encryption

Managing BitLocker Encryption Managing BitLocker Encryption WWW.CREDANT.COM Introduction Organizations are facing a data security crisis. Despite decades of investment in security, breaches of sensitive information continue to dominate

More information

70-685: Enterprise Desktop Support Technician

70-685: Enterprise Desktop Support Technician 70-685: Enterprise Desktop Support Technician Course Introduction Course Introduction Chapter 01 - Identifying Cause and Resolving Desktop Application Issues Identifying Cause and Resolving Desktop Application

More information

How to Encrypt your Windows 7 SDS Machine with Bitlocker

How to Encrypt your Windows 7 SDS Machine with Bitlocker How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly

More information

Files, Folders, and Shares

Files, Folders, and Shares Files, Folders, and Shares One of the core functions of any server is to serve resources such as files and folders. In Windows Server 2008 R2, File Services is one of the key roles you can add. If you

More information

In order for BitLocker to be used with a TPM chip, you may need to activate this in BIOS of the laptop.

In order for BitLocker to be used with a TPM chip, you may need to activate this in BIOS of the laptop. ENABLE BITLOCKER ON WINDOWS VISTA USING TPM Requirements: You must be running Vista Enterprise or Vista Ultimate to enable BitLocker. Any other version of Vista is not compatible. A laptop with an enabled/activated

More information

Windows 7, Enterprise Desktop Support Technician

Windows 7, Enterprise Desktop Support Technician Windows 7, Enterprise Desktop Support Technician Course Number: 70-685 Certification Exam This course is preparation for the Microsoft Certified IT Professional (MCITP) Exam, Exam 70-685: Pro: Windows

More information

How to enable Disk Encryption on a laptop

How to enable Disk Encryption on a laptop How to enable Disk Encryption on a laptop Skills and pre-requisites Intermediate IT skills required. You need to: have access to, and know how to change settings in the BIOS be confident that your data

More information

You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1. What should you do?

You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1. What should you do? QUESTION 1 Your network contains the following: 20 Hyper-V hosts 100 virtual machines 2,000 client computers You need to recommend an update infrastructure design to meet the following requirements: Deploy

More information

The safer, easier way to help you pass any IT exams. Exam : 70-688. Managing and Maintaining Windows 8. Title : 1 / 19

The safer, easier way to help you pass any IT exams. Exam : 70-688. Managing and Maintaining Windows 8. Title : 1 / 19 Exam : 70-688 Title : Managing and Maintaining Windows 8 Version : Demo 1 / 19 1.DRAG DROP Your company recently purchased 25 new laptops. All 25 laptops have the same hardware configuration and do not

More information

Managing Applications, Services, Folders, and Libraries

Managing Applications, Services, Folders, and Libraries Lesson 4 Managing Applications, Services, Folders, and Libraries Learning Objectives Students will learn to: Understand Local versus Network Applications Remove or Uninstall an Application Understand Group

More information

Encrypting with BitLocker for disk volumes under Windows 7

Encrypting with BitLocker for disk volumes under Windows 7 Encrypting with BitLocker for disk volumes under Windows 7 Summary of the contents 1 Introduction 2 Hardware requirements for BitLocker Driver Encryption 3 Encrypting drive 3.1 Operating System Drive 3.1.1

More information

Total Backup Recovery 7

Total Backup Recovery 7 7 TM 7 Enhance business functionality and productivity with guaranteed protection from 7 Server 7 Server is a total backup and recovery solution for Windows. With support for all operating systems, 7 Server

More information

How to enable BitLocker on a Windows Laptop.

How to enable BitLocker on a Windows Laptop. How to enable BitLocker on a Windows Laptop. If the operating system on your Windows laptop matches any in the list below then your device will have Bitlocker installed on your machine as default. This

More information

Total Backup Recovery 7

Total Backup Recovery 7 7 TM 7 Automat backup and restore management for all networked laptops & workstations from a centralized administrating console 7 Advanced Workstation assures that critical business information is well

More information

Encryption Process and Procedures Table of Contents

Encryption Process and Procedures Table of Contents Encryption Process and Procedures Table of Contents Introduction Why do we need software encryption? Online Resources Pre Encryption Activities Process Flow Backing up your computer Run Chkdsk and Defrag

More information

Training Guide: Configuring Windows8 8

Training Guide: Configuring Windows8 8 Training Guide: Configuring Windows8 8 Scott D. Lowe Derek Schauland Rick W. Vanover Introduction System requirements Practice setup instructions Acknowledgments Errata & book support We want to hear from

More information

Hiva-network.com. Microsoft_70-680_v2011-06-22_Kat. Exam A

Hiva-network.com. Microsoft_70-680_v2011-06-22_Kat. Exam A Exam A Microsoft_70-680_v2011-06-22_Kat QUESTION 1 You have a computer that runs Windows 7. The computer has a single volume. You install 15 applications and customize the environment. You complete the

More information

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10 Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS

More information

Deploying Active Directory Rights Management Services at Microsoft

Deploying Active Directory Rights Management Services at Microsoft Deploying Active Directory Rights Management Services at Microsoft Technical White Paper Published: December 2011 The following content may no longer reflect Microsoft s current position or infrastructure.

More information

Administering Windows Server 2012

Administering Windows Server 2012 Administering Windows Server 2012 Course Summary Configuring and Troubleshooting Domain Name System Maintaining Active Directory Domain Services Managing User and Service Accounts Implementing a Group

More information

Mobile Device Security and Encryption Standard and Guidelines

Mobile Device Security and Encryption Standard and Guidelines Mobile Device Security and Encryption Standard and Guidelines University Mobile Computing and Device best practices are currently defined as follows: 1) The use of any sensitive or private data on mobile

More information

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken Who Am I? Currently a security researcher at Synopsys, working on application security tools and Coverity s static analysis

More information

www.rohos.com Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

www.rohos.com Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon Secure Windows and Mac login by USB key www.rohos.com Rohos Logon Key Secure two-factor

More information

Introduction to Windows 7 Feature Practice Examination (brought to you by RMRoberts.com)

Introduction to Windows 7 Feature Practice Examination (brought to you by RMRoberts.com) Introduction to Windows 7 Feature Practice Examination (brought to you by RMRoberts.com) This practice examination consists of questions based on the most common Windows 7 features. As a professional,

More information

Secure Storage. Lost Laptops

Secure Storage. Lost Laptops Secure Storage 1 Lost Laptops Lost and stolen laptops are a common occurrence Estimated occurrences in US airports every week: 12,000 Average cost of a lost laptop for a corporation is $50K Costs include

More information

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12 Course Page - Page 1 of 12 Windows 7 Enterprise Desktop Support Technician M-50331 Length: 5 days Price: $2,795.00 Course Description This five-day instructor-led course provides students with the knowledge

More information

BitLocker Encryption for non-tpm laptops

BitLocker Encryption for non-tpm laptops BitLocker Encryption for non-tpm laptops Contents 1.0 Introduction... 2 2.0 What is a TPM?... 2 3.0 Users of non-tpm University laptops... 2 3.1 Existing Windows 7 laptop users... 2 3.2 Existing Windows

More information

Microsoft Exam

Microsoft Exam Volume: 76 Questions Question No : 1 You have a Windows 8.1 Enterprise desktop computer. You add three new 3-terabyte disks. You need to create a new 9-terabyte volume. A. From Disk Management, create

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

Windows 7, Enterprise Desktop Support Technician

Windows 7, Enterprise Desktop Support Technician Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse

More information

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4

More information

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

More information

Managing and Maintaining a Microsoft Windows Server 2003 Environment

Managing and Maintaining a Microsoft Windows Server 2003 Environment Managing and Maintaining a Microsoft Windows Server 2003 Environment Course 2273: Five days; Blended (classroom/e-learning) Introduction Elements of this syllabus are subject to change. This course combines

More information

Windows BitLocker TM Drive Encryption Design Guide

Windows BitLocker TM Drive Encryption Design Guide Windows BitLocker TM Drive Encryption Design Guide Microsoft Corporation Published: August 2007 Abstract This document describes the various aspects of planning for deploying Windows BitLocker Drive Encryption

More information

20688 Managing and Maintaining Windows 8

20688 Managing and Maintaining Windows 8 20688 Managing and Maintaining Windows 8 Audience Profile This course is intended for experienced information technology (IT) professionals that remotely manage and maintain Windows desktops and devices,

More information

Microsoft Windows 8 Beta Exam by Ding Dong

Microsoft Windows 8 Beta Exam by Ding Dong Microsoft Windows 8 Beta Exam by Ding Dong Number: 071-687 Passing Score: 700 Time Limit: 120 min File Version: 1.0.0 http://www.gratisexam.com/ Vertion 1.0.0 This is the Microsoft Windows 8 Beta Exam

More information

"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary

Charting the Course... ... to Your Success! MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test

More information

MS 50292: Administering and Maintaining Windows 7

MS 50292: Administering and Maintaining Windows 7 MS 50292: Administering and Maintaining Windows 7 Description: This five-day instructor-led course provides students with the knowledge and skills to successfully administer, maintain, and troubleshoot

More information

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010 Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010 I. File Encryption Basics A. Encryption replaces data within a file with ciphertext which resembles random data

More information

MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM)

MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) Microsoft BitLocker Administration and Monitoring (MBAM) provides a simplified administrative

More information

Innovative Secure Boot System (SBS) with a smartcard.

Innovative Secure Boot System (SBS) with a smartcard. Managed Security Services Desktop Security Services Secure Notebook Desktop Security Services. Secure Notebook. Today s business environment demands mobility, and the notebook computer has become an indispensable

More information

Total Backup Recovery 7

Total Backup Recovery 7 7 TM 7 Simplify and automate backup and recovery manageability while maintaining business continuity 7 Advanced Server is FarStone s next generation backup and recovery utility to protect your business

More information

Total Backup Recovery 7

Total Backup Recovery 7 7 7 Enhance business functionality and productivity with guaranteed protection from 7 Server 7 Server is a total backup and recovery solution for Windows. With support for all operating systems, 7 Server

More information

Encryption: Ensuring Information Security

Encryption: Ensuring Information Security Encryption: Ensuring Information Security Colin Chisholm CISSP, GCIH Information Security Analyst Associate Information Security & Systems / Compliance cchisholm@northwestern.edu Agenda Encryption - Explanation

More information

(Exam 70-680): Configuring

(Exam 70-680): Configuring Microsoft MCTS Self-Paced Training Kit (Exam 70-680): Configuring Windows? Ian McLean Orin Thomas Contents Introduction Lab Setup Instructions Hardware Requirements Using the DVD xxv How to Install the

More information

Windows BitLocker Drive Encryption Step-by-Step Guide

Windows BitLocker Drive Encryption Step-by-Step Guide Windows BitLocker Drive Encryption Step-by-Step Guide Microsoft Corporation Published: September 2006 Abstract Microsoft Windows BitLocker Drive Encryption is a new hardware-enhanced feature in the Microsoft

More information

This module explains how to configure and troubleshoot DNS, including DNS replication and caching.

This module explains how to configure and troubleshoot DNS, including DNS replication and caching. Module 1: Configuring and Troubleshooting Domain Name System This module explains how to configure and troubleshoot DNS, including DNS replication and caching. Configuring the DNS Server Role Configuring

More information

25. DECUS München e.v. Symposium 2002 2C02. EFS / Recovery

25. DECUS München e.v. Symposium 2002 2C02. EFS / Recovery 25. DECUS München e.v. Symposium 2002 2C02 EFS / Recovery Josef Beeking Compaq Computer GmbH Overview How EFS Works Recovery Basics Windows 2000 Standalone Scenarios Windows 2000 Domain Scenarios Windows.NET

More information

Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation

Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation Boot Manager Security Policy Windows Server 2008 R2 Boot Manager Security Policy For FIPS 140-2 Validation v 1.3 6/8/11 1 INTRODUCTION... 1 1.1 Cryptographic Boundary for BOOTMGR... 1 2 SECURITY POLICY...

More information

Guideline to Back Up Your Computer And Important Files

Guideline to Back Up Your Computer And Important Files Guideline to Back Up Your Computer And Important Files What is backing up? To backup is to make spare copies of file and store them separately to the originals. Why should you do it? In the world of computers

More information

Additional details >>> HERE <<<

Additional details >>> HERE <<< Additional details >>> HERE http://urlzz.org/pwdreset/pdx/natu4621/

More information

Introducing Windows 8

Introducing Windows 8 Introducing Windows 8 Introduction Very Aggressive Change Building block for the future and future of devices Biggest Obstacle: Where is!?!? The New User Experience Start Screen Full screen Start Menu

More information

Deploying EFS: Part 2

Deploying EFS: Part 2 Deploying EFS: Part 2 John Morello You can think of any Encrypting File System (EFS) deployment as having essentially two parts: the back-end design portion focusing on certificate management and recovery

More information

Total Backup Recovery 7

Total Backup Recovery 7 7 TM 7 Simplify and automate backup and recovery manageability while maintaining business continuity 7 Advanced Server is FarStone s next generation backup and recovery utility to protect your business

More information

Microsoft Windows Server 2008: Data Protection

Microsoft Windows Server 2008: Data Protection Chapter 5 Microsoft Windows Server 2008: Data Protection Solutions in this chapter: BitLocker Active Directory Rights Management Services Authorization Summary Solutions Fast Track Frequently Asked Questions

More information

Windows 7 Overview. M arkus Erlacher. Technical Solution Professional

Windows 7 Overview. M arkus Erlacher. Technical Solution Professional Windows 7 Overview M arkus Erlacher Technical Solution Professional Microsoft Switzerland What Business Customers Told Us Voice of Cust omers Windows 7 Time is money. I just can t have a slow or unreliable

More information

Jay Ferron. Blog.mir.net. CEHi, CWSP, CISM, CISSP, CVEi. MCITP, MCT, MVP, NSA IAM. Jay@ferron.com

Jay Ferron. Blog.mir.net. CEHi, CWSP, CISM, CISSP, CVEi. MCITP, MCT, MVP, NSA IAM. Jay@ferron.com Jay Ferron CEHi, CWSP, CISM, CISSP, CVEi. MCITP, MCT, MVP, NSA IAM Jay@ferron.com Blog.mir.net Tools to use How do we make our job easer? What tools are there at low or no cost? What do you use today?

More information

How to migrate to Windows 10. Migration methods and lessons learned

How to migrate to Windows 10. Migration methods and lessons learned How to migrate to Windows 10 Migration methods and lessons learned Who am I? David Biot Competence Center Lead IT Lifecycle Management > 7 years of experience with client and server management David.Biot@xylos.com

More information

MBAM Self-Help Portals

MBAM Self-Help Portals MBAM Self-Help Portals Authoring a self-help portal workflow for BitLocker Recovery Using Microsoft BitLocker Administration and Monitoring (MBAM) Technical White Paper Published: September 2011 Priyaa

More information

LEARNING SOLUTIONS website milner.com/learning email training@milner.com phone 800 875 5042

LEARNING SOLUTIONS website milner.com/learning email training@milner.com phone 800 875 5042 Course 6451B: Planning, Deploying and Managing Microsoft System Center Configuration Manager 2007 Length: 3 Days Published: June 29, 2012 Language(s): English Audience(s): IT Professionals Level: 300 Technology:

More information

Hype vs. Reality in Windows Server 2008 and Vista Are they More Secure. Beth Quinlan MCT, MCSE: Security, CISSP

Hype vs. Reality in Windows Server 2008 and Vista Are they More Secure. Beth Quinlan MCT, MCSE: Security, CISSP Hype vs. Reality in Windows Server 2008 and Vista Are they More Secure Beth Quinlan MCT, MCSE: Security, CISSP bquinlan@columbus.rr.com 614-348-7869 Agenda Windows Vista Windows Security Center Windows

More information

Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.

Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed. CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! 50331 - Windows 7, Enterprise Desktop Support Technician Duration: 5 days About this Course This five-day

More information

70-680 Q&A. DEMO Version

70-680 Q&A. DEMO Version TS:Windows 7,Configuring Q&A DEMO Version Copyright (c) 2011 Chinatag LLC. All rights reserved. Important Note Please Read Carefully For demonstration purpose only, this free version Chinatag study guide

More information

Windows Server. Introduction to Windows Server 2008 and Windows Server 2008 R2

Windows Server. Introduction to Windows Server 2008 and Windows Server 2008 R2 Copyright 2006-2013 MilliByte SS Windows Server DƏRS Introduction to Windows Server 2008 and Windows Server 2008 R2 Functionality of Windows Server 2008 Windows Server 2008 Editions 1 Microsoft Hyper-V

More information

6445A - Implementing and Administering Windows Small Business Server 2008

6445A - Implementing and Administering Windows Small Business Server 2008 6445A - Implementing and Administering Windows Small Business Server 2008 Course Number: 6445A Course Length: 5 Days Course Overview This 5 day course provides students with the necessary knowledge to

More information

How Drive Encryption Works

How Drive Encryption Works WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................

More information

Training Name Installing and Configuring Windows Server 2012

Training Name Installing and Configuring Windows Server 2012 Training Name Installing and Configuring Windows Server 2012 Exam Code 70 410 At Course Completion After completing this course, students will be able to: Install and configure Windows Server 2012. Describe

More information

Why Endpoint Encryption Can Fail to Deliver

Why Endpoint Encryption Can Fail to Deliver Endpoint Data Encryption That Actually Works The Essentials Series Why Endpoint Encryption Can Fail to Deliver sponsored by W hy Endpoint Encryption Can Fail to Deliver... 1 Tr aditional Solutions... 1

More information

CONTENTS. Windows To Go: Empower And Secure The Mobile Workforce

CONTENTS. Windows To Go: Empower And Secure The Mobile Workforce Windows To Go: Empower And Secure The Mobile Workforce CONTENTS 2 Windows To Go: Support New Levels of Secure Mobility 3 Benefits of IT-Managed Windows Workspaces 5 Mobile Workforce Use Cases 5 Superior

More information

SecureAge SecureDs Data Breach Prevention Solution

SecureAge SecureDs Data Breach Prevention Solution SecureAge SecureDs Data Breach Prevention Solution In recent years, major cases of data loss and data leaks are reported almost every week. These include high profile cases like US government losing personal

More information

Windows 7 MCITP (MCSA) Bootcamp

Windows 7 MCITP (MCSA) Bootcamp Windows 7 MCITP (MCSA) Bootcamp Duration: 5 days Course Price: $3,395 Software Assurance Eligible Course Description Windows 7 Bootcamp Overview This accelerated, instructor-led bootcamp will prepare qualified

More information

Microsoft 70-414 Exam

Microsoft 70-414 Exam Volume: 92 Questions Topic 1, Contoso Ltd Overview Contoso, Ltd. is a recruiting and staffing company that has offices throughout North America. The company has a main office and six branch offices. The

More information

Active Directory Services with Windows Server

Active Directory Services with Windows Server About this Course Active Directory Services with Windows Server Get Hands on instruction and practice administering Active Directory technologies in Windows Server 2012 and Windows Server 2012 R2 in this

More information

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey GoldKey Product Info Detailed Product Catalogue for GoldKey Do not leave your Information Assets at risk Read On... GoldKey: Reinventing the Security Strategy The Changing Landscape of Data Security With

More information

Encrypted File Systems. Don Porter CSE 506

Encrypted File Systems. Don Porter CSE 506 Encrypted File Systems Don Porter CSE 506 Goals Protect confidentiality of data at rest (i.e., on disk) Even if the media is lost or stolen Protecting confidentiality of in-memory data much harder Continue

More information

Session ID: Session Classification:

Session ID: Session Classification: Session ID: Session Classification: Protecting Data with Encryption Access Control Protect Sensitive Data Protect and Manage Threats Groundbreaking Malware Resistance Protects the client, data, and corporate

More information

TPM. (Trusted Platform Module) Installation Guide V3.3.0. for Windows Vista

TPM. (Trusted Platform Module) Installation Guide V3.3.0. for Windows Vista TPM (Trusted Platform Module) Installation Guide V3.3.0 for Windows Vista Table of contents 1 Introduction 1.1 Convention... 4 1.2 TPM - An Overview... 5 2 Using TPM for the first time 2.1 Enabling TPM...

More information