Leaders in Windows Privilege Management. Least Privilege = Least Risk = Least Cost



Similar documents
Best Practices for PC Lockdown and Control Policies. By Dwain Kinghorn

Viewfinity Privilege Management Integration with Microsoft System Center Configuration Manager. By Dwain Kinghorn

Elevated Privileges and User ID in Active Directory Environments

NetWrix USB Blocker. Version 3.6 Administrator Guide

NetWrix USB Blocker Version 3.6 Quick Start Guide

Experience IT. Let us describe the new experience.

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

BMC Performance Manager Windows Security White Paper DCOM / WMI

Pearl Echo Installation Checklist

Client Monitoring with Microsoft System Center Operations Manager 2007

Using Microsoft Operations Manager To Monitor And Maintain Your Farm. Michael Noel.

LEARNING SOLUTIONS website milner.com/learning phone

Only Athena provides complete command over these common enterprise mobility needs.

REDCENTRIC MANAGED ARCHIVE SERVICE SERVICE DEFINITION

Course Agenda: Managing Active Directory with NetIQ Directory and Resource Administrator and NetIQ Exchange Administrator

Remote Infrastructure Support Services & Managed IT Services

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

Session 2: The Business Value of Software License Optimization and ITSM Integration. David Reis, Senior Software Consultant BMC Software

Cursuri Certificare Microsoft

Least Privilege in the Data Center

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide

Microsoft Corporation. Status: Preliminary documentation

Managing Windows Environments with Group Policy 50255D; 5 Days, Instructor-led

Introduction to Endpoint Security

Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment

Applying the Principle of Least Privilege to Windows 7

Centralized Self-service Password Reset: From the Web and Windows Desktop

MS-50255: Managing, Maintaining, and Securing Your Networks Through Group Policy. Course Objectives. Required Exam(s) Price.

Service Desk Technician Service Desk Team Leader None IT

MS 50255B: Managing Windows Environments with Group Policy (4 Days)

Network device management solution

Module 7 Management. Section 7.1: WSUS. CIST2414 Microsoft Server Administrator. Summary. Windows Server 2008 Server Administrator

How ByStorm Software enables NERC-CIP Compliance

Data Sheets RMS infinity

Zubair Alexander's Training History (History of classes taught from June 28, 1996 through today)

Athena Mobile Device Management from Symantec

MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration. Chapter 11 Managing and Monitoring a Windows Server 2008 Network

Lenovo White Paper. Automated Windows 7 Migration No Desk-side Technicians Required

Parallels Mac Management v4.0

NetWrix Privileged Account Manager Version 4.0 Quick Start Guide

Managing Enterprise Devices and Apps using System Center Configuration Manager

NetWrix SQL Server Change Reporter

Centralized Auditing in Windows Derek Melber

IT Strategic Plan INFRASTRUCTURE PROPERTIES AND PLANNING

MS 10135B Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010

Symantec Mobile Management for Configuration Manager 7.2

Centrify Server Suite Management Tools

Cedric Rajendran VMware, Inc. Security Hardening vsphere 5.5

Maximize the Productivity of Your Help Desk With Proxy Networks Remote Support Software

Network device management solution.

Symantec Client Management Suite 7.6 powered by Altiris technology

Microsoft Windows Intune: Cloud-based solution

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Managing and Monitoring Windows 7 Performance Lesson 8

Windows Least Privilege Management and Beyond

Training Guide: Configuring Windows8 8

Running A Fully Controlled Windows Desktop Environment with Application Whitelisting

Release Management PinkVerify v2.1. Mandatory Criteria

MAPILab Search for Exchange. Administrator s Guide. Version 1.3

ACTIVE MICROSOFT CERTIFICATIONS:

Configuring Devices for Use with Cisco Configuration Professional (CCP) 2.5

SHARING FILE SYSTEM RESOURCES

Administering Active Directory. Administering Active Directory. Reading. Review: Organizational Units. Review: Domains. Review: Domain Trees

Dell InTrust Auditing and Monitoring Microsoft Windows

MAPILab Reports for Hardware and Software Inventory Installation Guide. Document version 1.0

Windows XP Service Pack 2 Windows Firewall Group Policy Setup for Executive Software Products

OPAS Prerequisites. Prepared By: This document contains the prerequisites and requirements for setting up OPAS.

An Analysis of Propalms TSE and Microsoft Remote Desktop Services

Centralized Oracle Database Authentication and Authorization in a Directory

SAM Benefits Overview SAM SOFTWARE ASSET MANAGEMENT

Administering System Center 2012 Configuration Manager

Quick Installation Guide

IT/ITES - hosting & managed services

Desktop Management, Profile Migration and Cross Platform Delivery. Technical Overview

Best Practices Report

10964C: Cloud & Datacenter Monitoring with System Center Operations Manager

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off

G-Cloud Service Definition. Canopy Remote Backup for Cloud SaaS

MCSA Objectives. Exam : TS:Exchange Server 2007, Configuring

What s New Guide: Version 5.6

You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1. What should you do?

Upgrading Client Security and Policy Manager in 4 easy steps

Endpoint Security for DeltaV Systems

VMware Horizon Mirage Installation Guide

EXAM Designing and Implementing a Server Infrastructure. Buy Full Product.

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

Implementing and Managing Microsoft Desktop Virtualization

Centrify Suite Enterprise Edition Online Training

DriveLock and Windows 7

Transcription:

Leaders in Windows Privilege Management Least Privilege = Least Risk = Least Cost Presented by: Joe L Italien, Tom Moore

Agenda Introductions/desktop environment overview What is Windows privilege management? Customers and Partners What are the benefits of Privilege Guard? Privilege Guard technical overview and demonstration Questions and answers

A Definition of Least Privilege The least privilege principle requires that each subject in a system be granted the most restrictive set of privileges needed for the performance of authorized tasks. The application of this principle limits the damage that can result from accident, error or unauthorized use Department of Defence Trusted Computer System Evaluation Criteria (Orange Book)

Key Benefits of Privilege Management Enables a standardised, compliant desktop for all users Lower cost through:- Fewer help desk calls Stream-lined management of software Simplified management of privilege requests User satisfaction improvements through fewer frustrations associated with lockdown Improved security, auditing and reporting

Customer Examples Banking Government Energy Manufacturing Aerospace/Defence Others

Partnerships System Integrators Technology Partners

Industry Recognition Privilege Guard allows businesses to lock down end-user desktops in a flexible way to reduce support costs and improve security. By applying a principle of least privilege, Privilege Guard eliminates the problems that prevent businesses from applying universal lockdown policies, while sparing end users the negative effects of lockdown. Tim Stammers September 2010

The Least Risk Windows 7 Desktop Maximum risk occurs when users are given admin rights and do not regularly connect to the domain Even when users receive regular group policy updates, have antivirus software, and other controls are in place, the system is at risk because users with admin rights can over-ride these controls Privilege Guard is the most effective way to deliver the least risk Windows 7 desktop because all users operate under a standard user account and application whitelisting further protects the environment. Source: Gartner Making the Most of Windows 7 Security, dated 24th August 2010 Dan Blum

The Challenge All or Nothing Problem Applications Standard Applications Basic Admin Tasks Software Installation Standard Applications Admin User Standard User High Support Costs High Security Risks Compliance Issues High Support Costs Less Productive Users Poor User Experience

The Privilege Guard Solution Standard Admin User Standard Applications Problem Applications Basic Admin Tasks Software Installation Privilege Guard Deploy all users as standard users Assign privileges to individual applications based on user roles and needs Prevent the execution of unauthorized applications Centrally managed through Active Directory Group Policy Detailed auditing and application forensics

Privilege Guard Benefits Reduces Desktop Management Costs Source: Gartner. Desktop Total Cost of Ownership: 2008 Update. ID Number: G00153705

Privilege Guard Benefits Reduces Desktop Management Costs Increases Desktop Security

Privilege Guard Benefits Reduces Desktop Management Costs Increases Desktop Security Helps Achieve Compliance

Privilege Guard Benefits Reduces Desktop Management Costs Increases Desktop Security Helps Achieve Compliance Rich Experience for Locked Down Users Basic Admin Tasks Device Connectivity Approved Software Installation

Leaders in Windows Privilege Management Least Privilege = Least Risk = Least Cost Presented by: Tom Moore

Agenda Privilege Guard Architecture How to elevate applications under a standard user account Dealing with advanced users that need to 'elevate on demand Application control to block unauthorized applications Application discovery and auditing Questions and answers

Privilege Guard Architecture Active Directory Managed Systems Privilege Guard Management Snap-in (MMC) Software Distribution Server e.g. SCCM Privilege Guard Client Installer Centrally managed from Privilege Guard Management Console Configuration settings managed through Active Directory Group Policy Deploy Privilege Guard Client Installer to client computers

Event Centralisation Central Event Collector Central SQL Database Active Directory Privilege Guard clients with WinRM Privilege Guard Reporting Console Windows Event Forwarding support for XP, Vista, Win 7, Server 03/08 Configuration settings managed through Active Directory Group Policy Events are forwarded to central Event Collector Central database of events with details reports and dashboards

Evaluation Approach Preparation Lab Testing Pilot Deployment Review & Recommendations

Implementation Phase 1 App. Identification Stage 1 Requirements Gathering Project Owner No. of Users Use Cases Timescales AD Structure Discovery Scope Success Criteria Stage 2 Privilege Guard Deployment Agent Install Console Install Discovery Policy Deployment Stage 3 Data Analysis & Reporting Data Collect Data Analysis App Report

Implementation Plan Phase 2 Least Privilege Implementation Stage 4 Policy Creation Policy Design Policy Creation Stage 5 Policy Testing Policy Lab Test Policy Revision Stage 6 Internal Comms User Education User Feedback Stage 7 Deployment Policy Deployment Admin Privileges Removal Review Outcome

Joe.litalien@avecto.com