SlideShare uma empresa Scribd logo
1 de 23
Endpoint Device Control in Windows 7 and Beyond © 2010 Monterey Technology Group Inc. ,[object Object],[object Object]
Preview of Key Points Device Control Device Installation Restrictions  Encryption BitLocker to Go © 2010 Monterey Technology Group Inc.
Device Installation Restrictions  © 2010 Monterey Technology Group Inc.
Device Installation Restrictions  Block ALL removable devices Includes things like mice and keyboards Not realistic for most environments © 2010 Monterey Technology Group Inc.
Device Installation Restrictions  Block ALL removable storage Also not realistic for most environments © 2010 Monterey Technology Group Inc.
Device Installation Restrictions  2 ways to specify devices Device ID Device Setup Class 2 approaches Blacklist  Not much value Whitelist Makes more sense Disable installation of all devices by default Enable specific devices or classes of devices © 2010 Monterey Technology Group Inc.
Device Installation Restrictions  Whitelist Enable  Caveat: does not apply to devices already installed Difference between installed and connected Testing caveat  © 2010 Monterey Technology Group Inc.
Device Installation Restrictions  Whitelist Enable installation of specific devices Must understand “device identification strings” http://msdn.microsoft.com/en-us/library/ff541224.aspx Hardware IDs Exact make, model, and revision of the device Make and model but not specific revision Compatible IDs Generic hardware ID used for assigning generic drivers from MS Enable installation of specific device classes Must understand “Device Setup Classes” http://msdn.microsoft.com/en-us/library/ff541509(v=VS.85).aspx Some are system defined, vendors can also make up new ones © 2010 Monterey Technology Group Inc.
Device Installation Restrictions  Whitelist How do you figure out device ID or class? System defined classes: http://msdn.microsoft.com/en-us/library/ff553426(v=VS.85).aspx Control Panelevice Manager Device properties dialog Details tab © 2010 Monterey Technology Group Inc.
Device Installation Restrictions  Whitelist Enable devices or classes with “Allow installation of devices using drivers that match…” policies © 2010 Monterey Technology Group Inc.
Device Installation Restrictions  Whitelist Test Against non USB devices like eSATA drives Against devices you want to allow installation of Mice Keyboards Monitors Against devices you want to prohibit © 2010 Monterey Technology Group Inc.
Device Installation Restrictions  Support Issues Message displayed to user How to handle exceptions? Are you a least privilege workstation environment? Enable “Configure policy to allow administrators to override device installation restrictions” Otherwise you will have to make temporary GPO exception policies Possible problem when user travelling “Time (in seconds) to force reboot when…” © 2010 Monterey Technology Group Inc.
Device Installation Restrictions  All or nothing What about controlling read/write access to removable storage? Removable Storage Access Control read/write access to different classes of removable storage © 2010 Monterey Technology Group Inc.
Removable Storage Access © 2010 Monterey Technology Group Inc.
Combining Device Restrictions and Removable Storage Access Possibleto enforce device whitelistthat allows particular type of USB drive  Limit read/write access for that class of device © 2010 Monterey Technology Group Inc.
BitLocker to Go Applies to removable drives Encryption key Smartcard Stored on computer  BitLocker must be enabled on system drive Password Allows BitLocker encrypted devices to be shared Can require backup to AD for recovery purposes BitLocker To Go Reader available for pre Windows 7 computers © 2010 Monterey Technology Group Inc.
BitLocker to Go Policies Deny write access to removable drives not protected by BitLocker Configure use of passwords for removable data drives Choose how BitLocker-protected removable drives can be recovered © 2010 Monterey Technology Group Inc.
Bottom Line Device installation restrictions  May work for very homogenized, non power user environments BitLocker To Go Password based encryption of removable drives Significant caveats, labor and limitations © 2010 Monterey Technology Group Inc.
Limitations and Caveats BitLocker to Go Requires Enterprise / Ultimate Win 7 No write support pre Win 7 BitLocker to Go Reader Read access cumbersome, must copy files to desktop No Support for CD/DVD © 2010 Monterey Technology Group Inc.
Limitations and Caveats No logging, reporting, auditing Controls installation not connection Defining whitelisted devices cumbersome and laborious No control based on type of files or content What about temporary exceptions for emergencies when user is off-line? What about pre Windows 7? © 2010 Monterey Technology Group Inc.
Brought to you by Speakers Chris Chevalier, Senior Product Manager Chris Merritt, Director of Solution Marketing © 2010 Monterey Technology Group Inc.
Want to Learn More? Lumension www.lumension.com  info@lumension.com http://blog.lumension.com © 2010 Monterey Technology Group Inc.
Endpoint Device Control in Windows 7 and Beyond

Mais conteúdo relacionado

Mais de Lumension

2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
Lumension
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
Lumension
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Lumension
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
Lumension
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
Lumension
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
Lumension
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
Lumension
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
Lumension
 

Mais de Lumension (20)

2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint RiskGreatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You MigrateWindows XP is Coming to an End: How to Stay Secure Before You Migrate
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
 
Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You? Adobe Hacked Again: What Does It Mean for You?
Adobe Hacked Again: What Does It Mean for You?
 
Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats Real World Defense Strategies for Targeted Endpoint Threats
Real World Defense Strategies for Targeted Endpoint Threats
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize RiskAPTs: The State of Server Side Risk and Steps to Minimize Risk
APTs: The State of Server Side Risk and Steps to Minimize Risk
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions2014 Ultimate Buyers Guide to Endpoint Security Solutions
2014 Ultimate Buyers Guide to Endpoint Security Solutions
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?Data Protection Rules are Changing: What Can You Do to Prepare?
Data Protection Rules are Changing: What Can You Do to Prepare?
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant VulnerabilitiesJava Insecurity: How to Deal with the Constant Vulnerabilities
Java Insecurity: How to Deal with the Constant Vulnerabilities
 
BYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security RisksBYOD & Mobile Security: How to Respond to the Security Risks
BYOD & Mobile Security: How to Respond to the Security Risks
 
3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk3 Executive Strategies to Reduce Your IT Risk
3 Executive Strategies to Reduce Your IT Risk
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
 
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-VirusDefending Your Corporate Endpoints How to Go Beyond Anti-Virus
Defending Your Corporate Endpoints How to Go Beyond Anti-Virus
 
2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?
 
Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint ReportGreatest IT Security Risks of 2013: Annual State of the Endpoint Report
Greatest IT Security Risks of 2013: Annual State of the Endpoint Report
 
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation ThreatsWeaponised Malware & APT Attacks: Protect Against Next-Generation Threats
Weaponised Malware & APT Attacks: Protect Against Next-Generation Threats
 
Sensational Headlines or Real Threats? What New Attacks Mean For You.
Sensational Headlines or Real Threats? What New Attacks Mean For You. Sensational Headlines or Real Threats? What New Attacks Mean For You.
Sensational Headlines or Real Threats? What New Attacks Mean For You.
 
Stopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater InsanityStopping the Adobe, Apple and Java Software Updater Insanity
Stopping the Adobe, Apple and Java Software Updater Insanity
 
Best Practices in Device Control: An In-Depth Look at Enforcing Data Protecti...
Best Practices in Device Control: An In-Depth Look at Enforcing Data Protecti...Best Practices in Device Control: An In-Depth Look at Enforcing Data Protecti...
Best Practices in Device Control: An In-Depth Look at Enforcing Data Protecti...
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Endpoint Device Control in Windows 7 and Beyond

  • 1.
  • 2. Preview of Key Points Device Control Device Installation Restrictions Encryption BitLocker to Go © 2010 Monterey Technology Group Inc.
  • 3. Device Installation Restrictions © 2010 Monterey Technology Group Inc.
  • 4. Device Installation Restrictions Block ALL removable devices Includes things like mice and keyboards Not realistic for most environments © 2010 Monterey Technology Group Inc.
  • 5. Device Installation Restrictions Block ALL removable storage Also not realistic for most environments © 2010 Monterey Technology Group Inc.
  • 6. Device Installation Restrictions 2 ways to specify devices Device ID Device Setup Class 2 approaches Blacklist Not much value Whitelist Makes more sense Disable installation of all devices by default Enable specific devices or classes of devices © 2010 Monterey Technology Group Inc.
  • 7. Device Installation Restrictions Whitelist Enable Caveat: does not apply to devices already installed Difference between installed and connected Testing caveat © 2010 Monterey Technology Group Inc.
  • 8. Device Installation Restrictions Whitelist Enable installation of specific devices Must understand “device identification strings” http://msdn.microsoft.com/en-us/library/ff541224.aspx Hardware IDs Exact make, model, and revision of the device Make and model but not specific revision Compatible IDs Generic hardware ID used for assigning generic drivers from MS Enable installation of specific device classes Must understand “Device Setup Classes” http://msdn.microsoft.com/en-us/library/ff541509(v=VS.85).aspx Some are system defined, vendors can also make up new ones © 2010 Monterey Technology Group Inc.
  • 9. Device Installation Restrictions Whitelist How do you figure out device ID or class? System defined classes: http://msdn.microsoft.com/en-us/library/ff553426(v=VS.85).aspx Control Panelevice Manager Device properties dialog Details tab © 2010 Monterey Technology Group Inc.
  • 10. Device Installation Restrictions Whitelist Enable devices or classes with “Allow installation of devices using drivers that match…” policies © 2010 Monterey Technology Group Inc.
  • 11. Device Installation Restrictions Whitelist Test Against non USB devices like eSATA drives Against devices you want to allow installation of Mice Keyboards Monitors Against devices you want to prohibit © 2010 Monterey Technology Group Inc.
  • 12. Device Installation Restrictions Support Issues Message displayed to user How to handle exceptions? Are you a least privilege workstation environment? Enable “Configure policy to allow administrators to override device installation restrictions” Otherwise you will have to make temporary GPO exception policies Possible problem when user travelling “Time (in seconds) to force reboot when…” © 2010 Monterey Technology Group Inc.
  • 13. Device Installation Restrictions All or nothing What about controlling read/write access to removable storage? Removable Storage Access Control read/write access to different classes of removable storage © 2010 Monterey Technology Group Inc.
  • 14. Removable Storage Access © 2010 Monterey Technology Group Inc.
  • 15. Combining Device Restrictions and Removable Storage Access Possibleto enforce device whitelistthat allows particular type of USB drive Limit read/write access for that class of device © 2010 Monterey Technology Group Inc.
  • 16. BitLocker to Go Applies to removable drives Encryption key Smartcard Stored on computer BitLocker must be enabled on system drive Password Allows BitLocker encrypted devices to be shared Can require backup to AD for recovery purposes BitLocker To Go Reader available for pre Windows 7 computers © 2010 Monterey Technology Group Inc.
  • 17. BitLocker to Go Policies Deny write access to removable drives not protected by BitLocker Configure use of passwords for removable data drives Choose how BitLocker-protected removable drives can be recovered © 2010 Monterey Technology Group Inc.
  • 18. Bottom Line Device installation restrictions May work for very homogenized, non power user environments BitLocker To Go Password based encryption of removable drives Significant caveats, labor and limitations © 2010 Monterey Technology Group Inc.
  • 19. Limitations and Caveats BitLocker to Go Requires Enterprise / Ultimate Win 7 No write support pre Win 7 BitLocker to Go Reader Read access cumbersome, must copy files to desktop No Support for CD/DVD © 2010 Monterey Technology Group Inc.
  • 20. Limitations and Caveats No logging, reporting, auditing Controls installation not connection Defining whitelisted devices cumbersome and laborious No control based on type of files or content What about temporary exceptions for emergencies when user is off-line? What about pre Windows 7? © 2010 Monterey Technology Group Inc.
  • 21. Brought to you by Speakers Chris Chevalier, Senior Product Manager Chris Merritt, Director of Solution Marketing © 2010 Monterey Technology Group Inc.
  • 22. Want to Learn More? Lumension www.lumension.com info@lumension.com http://blog.lumension.com © 2010 Monterey Technology Group Inc.