NOTE FROM THE EDITOR
We received some great feedback from many of you on the Windows 7 Deployment Learning Portal. If you haven't checked it out yet, the portal is designed to help you identify the strengths and gaps in your knowledge around Windows 7 deployment and provide some targeted learning to help you reach the top of your game. If you have downloaded or plan to download Internet Explorer 9 Beta, make sure to visit the new Internet Explorer 9 Beta spotlight in the right rail of the Windows 7 TechCenter for an overview of the Beta, an FAQ, a video demonstration, and other resources created specifically for IT professionals. They are great tools for ensuring you get the most from your beta experience. If you're still using Internet Explorer 6 and want to know more about migration and assessing compatibility when moving to Windows 7 and Internet Explorer 8, watch the replay of last week's roundtable where myself and a panel comprised of your IT pro peers plus subject matter experts answered questions submitted by our live audience on a variety of topics from compatibility assessment tools to recommendations on policy, code, and virtualization solutions to mitigate compatibility issues. Finally, for those of you who have successfully deployed Windows 7 in your organization, or who are making your final preparations to do so, this month's newsletter is focused on security and locking down your desktop. From deploying BitLocker without a Trusted Platform Module (TPM) chip to best practices around securing Office 2010, I think we have some cool stuff for you this month. As always, feel free to send you comments, questions and feedback to me. Have a great month and I hope to see you in Berlin! Stephen Rose |
|
|
|
NEW RESOURCES New Desktop Virtualization Zone on TechNet Migrating from Internet Explorer 6 to Internet Explorer 8? Learn from the Pros! Internet Explorer 9 Beta Technical Overview Internet Explorer 9 Beta Frequently Asked Questions Internet Explorer 9 Beta Video Demonstration Windows PowerShell: The Many Options for Out |
|
|
|
SOMETHING TO BLOG ABOUT
Hello! I am very excited to announce the release of the new Desktop Virtualization Top Task on the Springboard Series. Are you migrating to Windows 7? Do you want to virtualize your corporate applications? Are you looking to virtualize your desktops? You have come to the right place! Companies are increasingly turning to virtualization as the answer to their desktop challenges. Desktop virtualization involves decoupling the different computing layers and storing some or all of them in a data center. Through virtualization, employees can access their applications and data very safely over a network, minimizing the risk of data loss. On the IT side, virtualization accelerates deployment of new capabilities without needing to acquire new hardware and configure components. It also helps reduce application testing requirements and compatibility issues and simplifies disaster recovery and compliance. With Microsoft Desktop Virtualization, we have broken the bonds between the OS, application, and data and user settings by providing solutions in all of these areas, enabling you to deploy the best mix for your organization's needs. Here is the short list of Microsoft Desktop Virtualization solutions and how you can use them in your organization:
Find guidance on how to deploy and configure all of these solutions—bookmark Desktop Virtualization on TechNet and check back often for new resources! Microsoft Office 2010 Advances in Security – Keeping Data Safe You've secured your Windows 7 desktop, now it's time to lock down Office 2010. Office security has become more important over the last several years as malicious programmers have increasingly turned their attention from the operating system to applications and web properties. Prior to the Office 2010 release, designing a secure Office configuration that limited business risk often resulted in significantly compromised functionality or a terrible user experience. You could minimize the attack surface of desktop applications by disabling potentially risky functionality, but the loss in functionality usually meant less productivity and thus a negative effect on your organization's overall performance. When confronted with this situation, most organizations chose to allow information workers to make critical security decisions. If a document contained ActiveX controls or macros from an unknown source, users were prompted about whether they wanted to enable the controls, and they were not allowed to access the document until they responded. Office 2010 significantly changes that user experience paradigm with important functionality like Protected View, based on Microsoft's Practical Windows Sandboxing techniques. Protected View acts as a "peephole" for users to view documents BEFORE the trust decision has to be made. This new capability has been so well received that Office is already responding to requests from other application providers to help them improve the security profile of their applications. Protected View is just one of the many new or updated capabilities that you'll need to be aware of in order to manage your environment. Other prominent topics include File Validation, CNG Cryptography, File Blocking, and Password Complexity. For good background on these and other Office 2010 security topics, visit this good set of blog posts put together by the Office Trustworthy Computing team. The single most important thing you can do to prepare yourself, and to stay current, is to check out these resources. Here you'll always find the latest Office 2010 security guidance and related blog posts, plus a great video on "Advances in Office Security" from Tech•Ed North America 2010. Maybe most importantly, you can download the Beta for the Office 2010 Security Baseline, which also includes the Office 2010 Security Guide. The baseline and guide provide prescriptive guidance in the form of Group Policy setting recommendations, best practices, and step-by-step procedures to help you plan for and secure the Office 2010 release. |
|
|
|
TIPS AND TRICKS
Moving to Windows 7 enables organizations to realize great user productivity and IT benefits. In this article, I wanted to share information about the security benefits, and specifically, seven practices and easy to configure policies that can make your desktop environment safer and more controlled. 1. Control your desktop network access. Windows 7 enhances the firewall and provides granular control over inbound and outbound connections based on where the user is: domain (work), private (home), and public, including determining notification levels for the user. A little-known fact is that, with Windows7, there is a new capability that enables having more than one profile active. Because users typically connect to both local network (work or home) as well as the Internet (public), different rules should apply. Simply type "Windows Firewall with Advanced Security" on your Start menu to see the options. All firewalls events can be viewed in the monitoring tab and aggregated through Windows Event Log. Learn more > 2. Fine-tune wireless network settings. Another very useful, albeit not new, network setting is specific to Wireless Networks. You can control the wireless networks that corporate laptops can access, setting the configuration for preferred networks and prohibiting "risky" connections to ad hoc (computer-to-computer) networks in public places, thereby preventing the use of Internet Connection Sharing on your corporate network. Learn more > 3. Block access to devices. Another good existing policy is the ability to control device installation on desktops. You can set pre-approved devices and block everything else. Learn more > 4. Forcing encryption on removable drives is another extremely useful capability that can be implemented in conjunction with the previous policy. Many people know about BitLocker Drive Encryption, which allows you to encrypt the hard drive to protect data in the case of laptop theft or loss. BitLocker To Go (newly available in Windows 7 Enterprise) extends that by letting you encrypt removable drives. Plus, you can set a policy that stops data writes to removable drives unless they are first encrypted. A password will be required to access the data, so that users can share data with colleagues and others securely, with no concerns of losing the drive. Learn more > 5. Standard user is now feasible for most users. Previous versions of Windows offered a limited experience for standard users. In Windows 7, most users can do just fine as standard users. They can still connect to new networks, change display settings and time zones, and even install printers and Internet Explorer plug-ins. Windows 7 users will typically need administrator rights only for installing new applications, aside from legacy applications that "require" administrative rights to operate (and those can be addressed with various compatibility solutions). 6. User Account Control (UAC) is better than you think. Even if a user needs administrator rights, UAC will keep most programs running without administrator privileges, and will prompt user for approval when a program requires an escalation. The amount of prompt has been greatly reduces in Windows 7. Even better, instead of assigning administrative rights to the domain user, create a second local administrator account. This way Windows will prompt for the administrator credentials every time it needs to escalate (e.g., when installing an application). The user will be more cautious about typing those credentials than simply clicking Yes as with the first option. Learn more > 7. AppLocker – control the applications users install. Assuming your users (or a subset of them) really need to download and install applications on their own, you should consider limiting those with AppLocker (available on Windows 7 Enterprise). The rules are flexible: from allowing specific applications and versions, to any program that's from a known vendor. When rules are based on vendors, the learning curve is rather low as there is usually a rather small number of vendors that you would want to let users install. For the rest, it is better that they contact you. For internal applications (even executables), you can easily create a certificate and sign them with signtool.exe (included in the Windows SDK. Documentation on MSDN). Learn more > Ran Oelgiesser is a Senior Product Manager in the Windows Client team leading product management for Windows Security. Ran has 12 years of experience in information security and enterprise IT solutions. |
|
|
|
COMMUNITY UPDATE
Much has been written about the Windows 7 BitLocker Drive Encryption solution. For maximum protection, Microsoft recommends that BitLocker is deployed on systems which are fitted with a Trusted Platform Module (TPM) and there are many articles on both TechNet and influencer sites that endorse this as a best practice approach. While I am in completely agreement, evidence also suggests that huge numbers of machines are shipped without a TPM module installed. I am often approached by customers who want the benefits of drive encryption, but are confused and unsure on how to deploy it in an insecure environment or on sensitive machines. In this short article, I aim to address these issues and, at the same time, suggest a few best practices.
Firstly in order to use BitLocker you must have either the Enterprise or Ultimate edition of Windows 7. Although installed as part of the operating system (OS), BitLocker is disabled by default. To enable the feature, simply go to Control Panel | System and Security | BitLocker. Here you can select the disk to encrypt, turn on BitLocker, and follow the wizard.
As shown in the figure above, you are then prompted to either enter a password (preferably complex) or use a smart card. If you choose the latter a personal Identification (PIN) number will also be required.
Once encrypted, BitLocker asks if you would like to back up your recovery key. This is critical in case you forget your password. You can either print your key or back it up to a file for archiving. In enterprise environments, recovery keys can be archived in Active Directory and managed via Group Policy (as shown below).
It should be noted that, in the above scenarios where BitLocker is deployed without a TPM, the BitLocker keys remain vulnerable in RAM and, as such, could be exposed to potential threats, including RAM theft and rootkits. With a RAM attack, a hacker must be able to gain physical access to a machine in order to perform the attack. A possible scenario here could be a malicious employee who has industrial espionage on their mind. I am often therefore asked, "I want to use BitLocker but don't have a TPM, what can I do?" Before anything, you need to reduce the risk of attack. This can be done by following a few simple procedures. First, disable Hibernation. This is a Windows Power Management feature which essentially dumps the contents of RAM to a file on the root of your hard disk called Hiberfill.sys. The benefits of this technology include faster shutdown and start up times. Now we seem to have a tradeoff situation—speed vs. security. In order to mitigate this vulnerability, you could do one of the following: 1. Disable the computer's ability to hibernate and physically shut the machine down. This can be done in Windows Power Options | Edit Plan Settings | Advanced Settings as shown below: 2. Another way to accomplish this is to use the Windows Power Configuration tool. To do this, open a command prompt and type Remember that BitLocker is a data at rest (DAR) encryption solution and, as such, will not protect you from every threat. But, with a little planning, you can significantly reduce risks. Another potential vulnerability is the ability for a hacker to access sensitive documents on a BitLocker encrypted volumes by mapping network drives. In order to mitigate this threat, you can combine BitLocker with another Windows 7 encryption feature, Encrypting File System (EFS). To enable EFS, follow these steps: 1. Encrypt your drive with BitLocker as shown using the steps above. 2. Place your sensitive data in a folder structure on the encrypted volume. 3. Right click the folder and click Advanced. 4. Click Encrypt contents to secure data.
In conclusion, BitLocker combined with a TPM provides a rock solid DAR solution. However, in circumstances organizations or individuals that want to use BitLocker technologies, but have computers which are not fitted with a TPM module, can take a few additional steps to help ensure better security. Andy Malone is the CEO of Quality Training Ltd and founder of both the Dive Deeper Technology and Cybercrime Security events. Based in Scotland, Andy is a popular international event speaker and technology evangelist with over 15 years' experience delivering technical and security content to thousands of IT pros worldwide at various technical conferences, such as Microsoft Tech•Ed, IT Pro-Connections and Tech-days. Andy will be speaking at both Tech•Ed Africa in Durban in October and Tech•Ed Europe in Berlin in November. You can check out his blog at http://quality-training.co.uk/blog/. |
|
|
|
TWEET ALERT In support of our efforts to stay on top of the latest tips and trends, here is who we are following for our summer Twitter reading list:
If you would like to be considered for this column, send a message to Stephen Rose via Twitter @stephenlrose and tell him, in 140 characters or less, why we should feature you next month. Also, for the latest information on what's going on here at Microsoft follow the Springboard Series @MSSpringboard. |
|
|
|
EVENTS AND TRAINING Springboard Series Tour: Deployment Workshops for Windows, Office and Microsoft Desktop Optimization Pack (MDOP) Microsoft Certified Career Conference—Advance your Career with Windows 7 Expertise |
|
|
|
UPCOMING WEBCASTS Business Insights Webcast: Windows Deployment (Level 100) MSDN Webcast: Integrating Sensor and Location Support (Level 200) MSDN Webcast: Using Pinned Sites in Internet Explorer 9 on Windows 7 (Level 200) MSDN Webcast: Better User Experience with Windows 7 Multitouch and Gestures (Level 200) TechNet Simulcast Event: Windows 7 Deployment Firestarter (Level 200) |
|
|
|
SNEAK PEEK: FOR INSIDERS ONLY The following resources will be released in September on the Springboard Series on TechNet. Bookmark or subscribe to the Windows Client Headlines feed and receive automatic notification when these and other resources, announcements, and downloads are released.
|
|
These are my subscriptions to top tech newsletters. I had this published in here so that my inbox won't get bulky. Feel free to browse! If you want recommend any tech sites or blog, you are most welcome!
|
Pages
New Desktop Virtualization Zone on TechNet
Subscribe to:
Post Comments (Atom)











No comments:
Post a Comment