SlideShare uma empresa Scribd logo
1 de 16
•Unified malware protection for business
desktops, lap tops and server operating systems
that’s easier to control
•Unified Protection
•Simplified Administration
•Visibility and Control
Unified
Protection
Real time virus
protection
Advanced
malware
protection
Simplified
Administration
One policy to
manage client
agent
protection
Integrate with
your existing
infrastructure
Visibility and
Control
Customized
alerts
State
assessment
scans and
security alerts
Discuss five Security Features for Server 2008
1: BitLocker Driver Encryption
2: User Account Control
3: Read Only Domain Controller
4: Network Access Protection (NAP)
5: Cryptography Next Generation (CNG)
WHAT IS A SERVER?
A server is a computer program that provides
services to other computer programs
Microsoft Windows Server 2008 is the most
advanced Windows Server operating system
yet, designed to power the next generation of
networks, applications, and Web services.
Example of
Installation with
BitLocker as
optional
component
BitLocker Drive Encryption
BitLocker performs two
functions:
BitLocker encrypts all data
stored on the Windows
operating system volume
BitLocker uses a Trusted
Platform Module (TPM)
Full-volume encryption
Verification of the integrity of early startup
components
A recovery mechanism
Support for a secure decommissioning process
How does it work?
With Full-Volume encryption,
everything written to a
BitLocker-protected volume is
encrypted
BitLocker uses the TPM to verify
the integrity of early boot
components and boot
configuration data.
User is prompted to store a
"recovery password" that can be
used to unlock a locked BitLocker
volume in case of system failure
of security breach.
BitLocker helps ensure that data
is never stored on disk in a way
that would be useful to an
attacker, thief or new hardware
owner
•UAC is a new technology for Microsoft Server 2008 and Windows
Vista
•Additional settings are available by configuring Group policy
settings
•UAC provides authentication protection against malicious
software
Example of
dialog box
for UAC
Read Only
Feature
•RODCs only
support
unidirectional
replication of
Active Directory
changes
DNS
Protection
•A DNS server
running on an
RODC doesn’t
support
dynamic
updates.
Administrator
Role
Separation
•A Domain user
can have
Administrator
role
Password
Protection
•RODC can
cache
passwords.
Network Access Protection
•Components and
Resources for NAP
•Server Components
for NAP
What
Is
(NAP)
ABOUT CNG
Cryptographic Agility
Certification and Compliance
Suite B support
Legacy Support
Kernel Mode Support
Auditing
Replaceable Random Number Generators
Thread Safety
Mode of Operation
Key Storage and Retrieval
1. How does NAP work?
2. What does the acronym NAP stand for?
3. What is a server?
4. How does the US government use the innovations of CNG?
5. Why do we use cryptography?
6. What two products are using UAC?
7. What Does UAC stand for?
8. What does RODC stand for?
9. What is the main purpose of RODC?
10. Does BitLocker come installed on Windows Server 2008?
Bibliography
1. “The Windows Vista and Windows Server 2008 Developer Story: Windows Vista Application for User
Account Control (UAC)” April 2007 Retrieved on 2007-10-08 Wikipedia
http://en.wikipedia.org/wiki/User_Account_Control
2. Microsoft Server 2008 (2009 Microsoft Corporation ) TechNet http://technet.microsoft.com/en-
us/windowsserver/2008/default.aspx
3. “Fore Front Client Security excerpt “ Microsoft Partner Program retrieved 02-05-09
https://partner.microsoft.com/global/40029561
4. Microsoft Fore Front Client Security
http://www.microsoft.com/forefront/clientsecurity/en/us/overview.aspx
5. (Network Access Protection) Wikipedia “ Windows Network Access Protection Web page”
http://en.wikipedia.org/wiki/Network_Access_Protection
6. Microsoft TechNet “Networking and Access Technologies “ (NAP ) http://technet.microsoft.com/en-
us/network/bb545879.aspx
7. (Read Only Domain Controller) Microsoft TechNet http://technet.microsoft.com/en-
us/library/cc772234.aspx
8. Microsoft Developer Network “CNG “http://msdn.microsoft.com/en-us/library/aa376210(VS.85).aspx
9. Microsoft TechNet “CNG” http://technet.microsoft.com/en-us/library/cc730763.aspx
10. BitLocker Wikipedia http://en.wikipedia.org/wiki/BitLocker_Drive_Encryption

Mais conteúdo relacionado

Mais procurados

Genian NAC Datasheet
Genian NAC Datasheet Genian NAC Datasheet
Genian NAC Datasheet GENIANS, INC.
 
Secure nets-and-data
Secure nets-and-dataSecure nets-and-data
Secure nets-and-dataKevin Mayo
 
z/OS Authorized Code Scanner
z/OS Authorized Code Scannerz/OS Authorized Code Scanner
z/OS Authorized Code ScannerLuigi Perrone
 
Enterprise Node - Securing Your Environment
Enterprise Node - Securing Your EnvironmentEnterprise Node - Securing Your Environment
Enterprise Node - Securing Your EnvironmentKurtis Kemple
 
PCI DSS in Pictures and What to Expect in PCI 3.0
PCI DSS in Pictures and What to Expect in PCI 3.0PCI DSS in Pictures and What to Expect in PCI 3.0
PCI DSS in Pictures and What to Expect in PCI 3.0Praveen Vackayil
 
Mastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installationMastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installationnetworkershome
 
Paper Explaination : NoHype : Virtualized Cloud Infrastructure without the Vi...
Paper Explaination : NoHype : Virtualized Cloud Infrastructure without the Vi...Paper Explaination : NoHype : Virtualized Cloud Infrastructure without the Vi...
Paper Explaination : NoHype : Virtualized Cloud Infrastructure without the Vi...Samarth Godara
 
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...Anthony Burke
 
Virtualization: Security and IT Audit Perspectives
Virtualization: Security and IT Audit PerspectivesVirtualization: Security and IT Audit Perspectives
Virtualization: Security and IT Audit PerspectivesJason Chan
 
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...Microsoft TechNet - Belgium and Luxembourg
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéMarketingArrowECS_CZ
 
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Cloudflare
 
The ultimate guide to software updates on embedded linux devices
The ultimate guide to software updates on embedded linux devicesThe ultimate guide to software updates on embedded linux devices
The ultimate guide to software updates on embedded linux devicesMender.io
 
ActiveManage product brief 2002
ActiveManage product brief 2002ActiveManage product brief 2002
ActiveManage product brief 2002Vinny Pasceri
 
Lecture 5 software to control network
Lecture 5 software to control networkLecture 5 software to control network
Lecture 5 software to control networkTanveer Malik
 
Kerio Control 7 Overview
Kerio Control 7 OverviewKerio Control 7 Overview
Kerio Control 7 Overviewrkoscak
 

Mais procurados (20)

Genian NAC Datasheet
Genian NAC Datasheet Genian NAC Datasheet
Genian NAC Datasheet
 
Secure nets-and-data
Secure nets-and-dataSecure nets-and-data
Secure nets-and-data
 
z/OS Authorized Code Scanner
z/OS Authorized Code Scannerz/OS Authorized Code Scanner
z/OS Authorized Code Scanner
 
VipCoin
VipCoinVipCoin
VipCoin
 
Enterprise Node - Securing Your Environment
Enterprise Node - Securing Your EnvironmentEnterprise Node - Securing Your Environment
Enterprise Node - Securing Your Environment
 
Windows server hardening 1
Windows server hardening 1Windows server hardening 1
Windows server hardening 1
 
Top 10 IaaS Highlights for Developers
Top 10 IaaS Highlights for DevelopersTop 10 IaaS Highlights for Developers
Top 10 IaaS Highlights for Developers
 
PCI DSS in Pictures and What to Expect in PCI 3.0
PCI DSS in Pictures and What to Expect in PCI 3.0PCI DSS in Pictures and What to Expect in PCI 3.0
PCI DSS in Pictures and What to Expect in PCI 3.0
 
Mastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installationMastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installation
 
checkpoint
checkpointcheckpoint
checkpoint
 
Paper Explaination : NoHype : Virtualized Cloud Infrastructure without the Vi...
Paper Explaination : NoHype : Virtualized Cloud Infrastructure without the Vi...Paper Explaination : NoHype : Virtualized Cloud Infrastructure without the Vi...
Paper Explaination : NoHype : Virtualized Cloud Infrastructure without the Vi...
 
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
 
Virtualization: Security and IT Audit Perspectives
Virtualization: Security and IT Audit PerspectivesVirtualization: Security and IT Audit Perspectives
Virtualization: Security and IT Audit Perspectives
 
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
Securing a Windows Infrastructure using Windows Server 2012 & Windows 8 Built...
 
Business Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možnéBusiness Mobility - otevřete svou mysl k tomu, co je možné
Business Mobility - otevřete svou mysl k tomu, co je možné
 
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
 
The ultimate guide to software updates on embedded linux devices
The ultimate guide to software updates on embedded linux devicesThe ultimate guide to software updates on embedded linux devices
The ultimate guide to software updates on embedded linux devices
 
ActiveManage product brief 2002
ActiveManage product brief 2002ActiveManage product brief 2002
ActiveManage product brief 2002
 
Lecture 5 software to control network
Lecture 5 software to control networkLecture 5 software to control network
Lecture 5 software to control network
 
Kerio Control 7 Overview
Kerio Control 7 OverviewKerio Control 7 Overview
Kerio Control 7 Overview
 

Destaque

From the window
From the windowFrom the window
From the windownnakvi
 
VMware Network design project example
VMware Network design project exampleVMware Network design project example
VMware Network design project exampleDaniel Nilles
 
Beaconhouse School System Middle, PECHS, Karachi
Beaconhouse School System Middle, PECHS, KarachiBeaconhouse School System Middle, PECHS, Karachi
Beaconhouse School System Middle, PECHS, Karachidfcpakistan
 
Case study of an active directory deployment
Case study of an active directory deploymentCase study of an active directory deployment
Case study of an active directory deploymentManish Godawat
 
VLAN and its implementation
VLAN  and its implementation VLAN  and its implementation
VLAN and its implementation Mohit Kumar
 
Active Directory Services
Active Directory ServicesActive Directory Services
Active Directory ServicesVarun Arora
 
강원도팬션 미국관광비자체류기간
강원도팬션 미국관광비자체류기간강원도팬션 미국관광비자체류기간
강원도팬션 미국관광비자체류기간hjsoidjgo
 
China auto parts and components manufacturing industry in depth market resear...
China auto parts and components manufacturing industry in depth market resear...China auto parts and components manufacturing industry in depth market resear...
China auto parts and components manufacturing industry in depth market resear...Qianzhan Intelligence
 
Ph slideshow for u of m lecture
Ph slideshow for u of m lecturePh slideshow for u of m lecture
Ph slideshow for u of m lectureTE Studio
 
Augmenting MySQL with NoSQL options - Data Lifecycles
Augmenting MySQL with NoSQL options - Data LifecyclesAugmenting MySQL with NoSQL options - Data Lifecycles
Augmenting MySQL with NoSQL options - Data LifecyclesDavid Murphy
 
China banking industry market research and prospect forecast report
China banking industry market research and prospect forecast reportChina banking industry market research and prospect forecast report
China banking industry market research and prospect forecast reportQianzhan Intelligence
 
Arthur Bodolec of Feedly on Designing With Your Ears
Arthur Bodolec of Feedly on Designing With Your EarsArthur Bodolec of Feedly on Designing With Your Ears
Arthur Bodolec of Feedly on Designing With Your EarsUserTesting
 
Bank of America Acquiring Countrywide Financial
Bank of America Acquiring Countrywide FinancialBank of America Acquiring Countrywide Financial
Bank of America Acquiring Countrywide FinancialQuarterlyEarningsReports3
 
How Can I Grow Tall
How Can I Grow TallHow Can I Grow Tall
How Can I Grow Tallwiesneskib
 

Destaque (20)

From the window
From the windowFrom the window
From the window
 
Mini Project- Virtual Network Project
Mini Project- Virtual Network ProjectMini Project- Virtual Network Project
Mini Project- Virtual Network Project
 
VMware Network design project example
VMware Network design project exampleVMware Network design project example
VMware Network design project example
 
Beaconhouse School System Middle, PECHS, Karachi
Beaconhouse School System Middle, PECHS, KarachiBeaconhouse School System Middle, PECHS, Karachi
Beaconhouse School System Middle, PECHS, Karachi
 
Case study of an active directory deployment
Case study of an active directory deploymentCase study of an active directory deployment
Case study of an active directory deployment
 
VLAN and its implementation
VLAN  and its implementation VLAN  and its implementation
VLAN and its implementation
 
Active Directory Services
Active Directory ServicesActive Directory Services
Active Directory Services
 
Cisco project ideas
Cisco   project ideasCisco   project ideas
Cisco project ideas
 
강원도팬션 미국관광비자체류기간
강원도팬션 미국관광비자체류기간강원도팬션 미국관광비자체류기간
강원도팬션 미국관광비자체류기간
 
China auto parts and components manufacturing industry in depth market resear...
China auto parts and components manufacturing industry in depth market resear...China auto parts and components manufacturing industry in depth market resear...
China auto parts and components manufacturing industry in depth market resear...
 
Ephata 611
Ephata 611Ephata 611
Ephata 611
 
Qodamah's Recommendation
Qodamah's RecommendationQodamah's Recommendation
Qodamah's Recommendation
 
Ph slideshow for u of m lecture
Ph slideshow for u of m lecturePh slideshow for u of m lecture
Ph slideshow for u of m lecture
 
Augmenting MySQL with NoSQL options - Data Lifecycles
Augmenting MySQL with NoSQL options - Data LifecyclesAugmenting MySQL with NoSQL options - Data Lifecycles
Augmenting MySQL with NoSQL options - Data Lifecycles
 
Perdre Sa Cellulite
Perdre Sa CellulitePerdre Sa Cellulite
Perdre Sa Cellulite
 
China banking industry market research and prospect forecast report
China banking industry market research and prospect forecast reportChina banking industry market research and prospect forecast report
China banking industry market research and prospect forecast report
 
Arthur Bodolec of Feedly on Designing With Your Ears
Arthur Bodolec of Feedly on Designing With Your EarsArthur Bodolec of Feedly on Designing With Your Ears
Arthur Bodolec of Feedly on Designing With Your Ears
 
Bank of America Acquiring Countrywide Financial
Bank of America Acquiring Countrywide FinancialBank of America Acquiring Countrywide Financial
Bank of America Acquiring Countrywide Financial
 
How Can I Grow Tall
How Can I Grow TallHow Can I Grow Tall
How Can I Grow Tall
 
하트
하트하트
하트
 

Semelhante a Server 2008 Project

Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Sophos Benelux
 
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys LimitedScoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys LimitedWes Moskal-Fitzpatrick
 
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft MonitoringSystem Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft MonitoringAmit Gatenyo
 
Active Directory and Virtualization
Active Directory and VirtualizationActive Directory and Virtualization
Active Directory and VirtualizationAniket Pandey
 
UtrechtJUG_Exploring statefulmicroservices in a cloud-native world.pptx
UtrechtJUG_Exploring statefulmicroservices in a cloud-native world.pptxUtrechtJUG_Exploring statefulmicroservices in a cloud-native world.pptx
UtrechtJUG_Exploring statefulmicroservices in a cloud-native world.pptxGrace Jansen
 
DevoxxBelgium_StatefulCloud.pptx
DevoxxBelgium_StatefulCloud.pptxDevoxxBelgium_StatefulCloud.pptx
DevoxxBelgium_StatefulCloud.pptxGrace Jansen
 
Securing Your MongoDB Deployment
Securing Your MongoDB DeploymentSecuring Your MongoDB Deployment
Securing Your MongoDB DeploymentMongoDB
 
Enterprise Cloud Security
Enterprise Cloud SecurityEnterprise Cloud Security
Enterprise Cloud SecurityMongoDB
 
Preparing for Neo - Singapore OutSystems User Group October 2022 Meetup
Preparing for Neo - Singapore OutSystems User Group October 2022 MeetupPreparing for Neo - Singapore OutSystems User Group October 2022 Meetup
Preparing for Neo - Singapore OutSystems User Group October 2022 MeetupYashrajNayak4
 
Managing bitlocker with MBAM
Managing bitlocker with MBAMManaging bitlocker with MBAM
Managing bitlocker with MBAMOlav Tvedt
 
RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011RES Software Nederland
 
AAI-4847 Full Disclosure on the Performance Characteristics of WebSphere Appl...
AAI-4847 Full Disclosure on the Performance Characteristics of WebSphere Appl...AAI-4847 Full Disclosure on the Performance Characteristics of WebSphere Appl...
AAI-4847 Full Disclosure on the Performance Characteristics of WebSphere Appl...WASdev Community
 
Microservice Architecture
Microservice ArchitectureMicroservice Architecture
Microservice ArchitectureEngin Yoeyen
 
Module 03 installing, upgrading, and migrating to windows 7
Module 03   installing, upgrading, and migrating to windows 7Module 03   installing, upgrading, and migrating to windows 7
Module 03 installing, upgrading, and migrating to windows 7aesthetics00
 
endpoint-central-it-admin.pptx
endpoint-central-it-admin.pptxendpoint-central-it-admin.pptx
endpoint-central-it-admin.pptxTriLe786508
 
Active Directory 2019 v2.pptx
Active Directory 2019 v2.pptxActive Directory 2019 v2.pptx
Active Directory 2019 v2.pptxPradeep Kapkoti
 
NGINX Controller: Configuration, Management, and Troubleshooting at Scale – EMEA
NGINX Controller: Configuration, Management, and Troubleshooting at Scale – EMEANGINX Controller: Configuration, Management, and Troubleshooting at Scale – EMEA
NGINX Controller: Configuration, Management, and Troubleshooting at Scale – EMEANGINX, Inc.
 
Research Assignment For Active Directory
Research Assignment For Active DirectoryResearch Assignment For Active Directory
Research Assignment For Active DirectoryJessica Myers
 

Semelhante a Server 2008 Project (20)

Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys LimitedScoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
 
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft MonitoringSystem Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
System Center Operations Manager (SCOM) 2007 R2 & Non Microsoft Monitoring
 
Bcit win8 ws2012 session
Bcit win8 ws2012 sessionBcit win8 ws2012 session
Bcit win8 ws2012 session
 
Active Directory and Virtualization
Active Directory and VirtualizationActive Directory and Virtualization
Active Directory and Virtualization
 
UtrechtJUG_Exploring statefulmicroservices in a cloud-native world.pptx
UtrechtJUG_Exploring statefulmicroservices in a cloud-native world.pptxUtrechtJUG_Exploring statefulmicroservices in a cloud-native world.pptx
UtrechtJUG_Exploring statefulmicroservices in a cloud-native world.pptx
 
Sudheendra
SudheendraSudheendra
Sudheendra
 
DevoxxBelgium_StatefulCloud.pptx
DevoxxBelgium_StatefulCloud.pptxDevoxxBelgium_StatefulCloud.pptx
DevoxxBelgium_StatefulCloud.pptx
 
Securing Your MongoDB Deployment
Securing Your MongoDB DeploymentSecuring Your MongoDB Deployment
Securing Your MongoDB Deployment
 
Enterprise Cloud Security
Enterprise Cloud SecurityEnterprise Cloud Security
Enterprise Cloud Security
 
Preparing for Neo - Singapore OutSystems User Group October 2022 Meetup
Preparing for Neo - Singapore OutSystems User Group October 2022 MeetupPreparing for Neo - Singapore OutSystems User Group October 2022 Meetup
Preparing for Neo - Singapore OutSystems User Group October 2022 Meetup
 
Managing bitlocker with MBAM
Managing bitlocker with MBAMManaging bitlocker with MBAM
Managing bitlocker with MBAM
 
RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011RES Software Online Seminar 10 mei 2011
RES Software Online Seminar 10 mei 2011
 
AAI-4847 Full Disclosure on the Performance Characteristics of WebSphere Appl...
AAI-4847 Full Disclosure on the Performance Characteristics of WebSphere Appl...AAI-4847 Full Disclosure on the Performance Characteristics of WebSphere Appl...
AAI-4847 Full Disclosure on the Performance Characteristics of WebSphere Appl...
 
Microservice Architecture
Microservice ArchitectureMicroservice Architecture
Microservice Architecture
 
Module 03 installing, upgrading, and migrating to windows 7
Module 03   installing, upgrading, and migrating to windows 7Module 03   installing, upgrading, and migrating to windows 7
Module 03 installing, upgrading, and migrating to windows 7
 
endpoint-central-it-admin.pptx
endpoint-central-it-admin.pptxendpoint-central-it-admin.pptx
endpoint-central-it-admin.pptx
 
Active Directory 2019 v2.pptx
Active Directory 2019 v2.pptxActive Directory 2019 v2.pptx
Active Directory 2019 v2.pptx
 
NGINX Controller: Configuration, Management, and Troubleshooting at Scale – EMEA
NGINX Controller: Configuration, Management, and Troubleshooting at Scale – EMEANGINX Controller: Configuration, Management, and Troubleshooting at Scale – EMEA
NGINX Controller: Configuration, Management, and Troubleshooting at Scale – EMEA
 
Research Assignment For Active Directory
Research Assignment For Active DirectoryResearch Assignment For Active Directory
Research Assignment For Active Directory
 

Último

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Server 2008 Project

  • 1. •Unified malware protection for business desktops, lap tops and server operating systems that’s easier to control •Unified Protection •Simplified Administration •Visibility and Control
  • 2. Unified Protection Real time virus protection Advanced malware protection Simplified Administration One policy to manage client agent protection Integrate with your existing infrastructure Visibility and Control Customized alerts State assessment scans and security alerts
  • 3.
  • 4. Discuss five Security Features for Server 2008 1: BitLocker Driver Encryption 2: User Account Control 3: Read Only Domain Controller 4: Network Access Protection (NAP) 5: Cryptography Next Generation (CNG)
  • 5. WHAT IS A SERVER? A server is a computer program that provides services to other computer programs Microsoft Windows Server 2008 is the most advanced Windows Server operating system yet, designed to power the next generation of networks, applications, and Web services.
  • 7. BitLocker Drive Encryption BitLocker performs two functions: BitLocker encrypts all data stored on the Windows operating system volume BitLocker uses a Trusted Platform Module (TPM)
  • 8. Full-volume encryption Verification of the integrity of early startup components A recovery mechanism Support for a secure decommissioning process
  • 9. How does it work? With Full-Volume encryption, everything written to a BitLocker-protected volume is encrypted BitLocker uses the TPM to verify the integrity of early boot components and boot configuration data. User is prompted to store a "recovery password" that can be used to unlock a locked BitLocker volume in case of system failure of security breach. BitLocker helps ensure that data is never stored on disk in a way that would be useful to an attacker, thief or new hardware owner
  • 10. •UAC is a new technology for Microsoft Server 2008 and Windows Vista •Additional settings are available by configuring Group policy settings •UAC provides authentication protection against malicious software Example of dialog box for UAC
  • 11. Read Only Feature •RODCs only support unidirectional replication of Active Directory changes DNS Protection •A DNS server running on an RODC doesn’t support dynamic updates. Administrator Role Separation •A Domain user can have Administrator role Password Protection •RODC can cache passwords.
  • 12. Network Access Protection •Components and Resources for NAP •Server Components for NAP What Is (NAP)
  • 13.
  • 14. ABOUT CNG Cryptographic Agility Certification and Compliance Suite B support Legacy Support Kernel Mode Support Auditing Replaceable Random Number Generators Thread Safety Mode of Operation Key Storage and Retrieval
  • 15. 1. How does NAP work? 2. What does the acronym NAP stand for? 3. What is a server? 4. How does the US government use the innovations of CNG? 5. Why do we use cryptography? 6. What two products are using UAC? 7. What Does UAC stand for? 8. What does RODC stand for? 9. What is the main purpose of RODC? 10. Does BitLocker come installed on Windows Server 2008?
  • 16. Bibliography 1. “The Windows Vista and Windows Server 2008 Developer Story: Windows Vista Application for User Account Control (UAC)” April 2007 Retrieved on 2007-10-08 Wikipedia http://en.wikipedia.org/wiki/User_Account_Control 2. Microsoft Server 2008 (2009 Microsoft Corporation ) TechNet http://technet.microsoft.com/en- us/windowsserver/2008/default.aspx 3. “Fore Front Client Security excerpt “ Microsoft Partner Program retrieved 02-05-09 https://partner.microsoft.com/global/40029561 4. Microsoft Fore Front Client Security http://www.microsoft.com/forefront/clientsecurity/en/us/overview.aspx 5. (Network Access Protection) Wikipedia “ Windows Network Access Protection Web page” http://en.wikipedia.org/wiki/Network_Access_Protection 6. Microsoft TechNet “Networking and Access Technologies “ (NAP ) http://technet.microsoft.com/en- us/network/bb545879.aspx 7. (Read Only Domain Controller) Microsoft TechNet http://technet.microsoft.com/en- us/library/cc772234.aspx 8. Microsoft Developer Network “CNG “http://msdn.microsoft.com/en-us/library/aa376210(VS.85).aspx 9. Microsoft TechNet “CNG” http://technet.microsoft.com/en-us/library/cc730763.aspx 10. BitLocker Wikipedia http://en.wikipedia.org/wiki/BitLocker_Drive_Encryption

Notas do Editor

  1. Lets talk about Microsoft forefront client security. Forefront helps guard against many different emerging threats like viruses, root kits, and spyware. Organizations need to protect their PCs and servers from various threats. Yet many protection-software suites are difficult to use and integrate into existing IT infrastructures, making it challenging to identify threats and vulnerabilities. With Fore front your getting more advanced security tools and a more simple way of operating. Think of a house that has locks and bolts and Fore front is added to that as a simple alarm system that reinforces the basic security, let me hit on each bullet point and some features of the software.
  2. With unified protection you have the single engine that enhances performance and detection capabilities by minimizing end-user disruptions. By using “mini-filter” technology with the Windows Filter Manager, Forefront Client Security is able to scan virus and spyware files before they run, providing better security against spyware and blended threats (for example, spyware that infects a PC through backdoor Trojans or other means). Simplified Administration makes things easier like having central management with one console for simplified client security, Microsoft Forefront Client Security saves time and reduces complexity. Integrating with the familiar Microsoft infrastructure saves administrative time and reduces the “learning curve.” The last point is the Visibility and control which when you receive an alert the event is recorded into the fore front summary report which gives a support link on how to deal with that alert. The Security State Assessment (SSA) checks to examine data from the file system and others allowing the administrator to detect common vulnerabilities in the environment. With that many features why turn it down and for the very low low subscription price of $12.72 per user or device, per year. So don’t just sit there purchase now for ease of mind and ultimate protection for your client or home network. And now the moment you have been waiting for thank you for your time/ our feature presentation!!!!!
  3. Good morning class, my name is Stephanie Wilks. We are Team 3. I’d like to introduce the rest of my team. First, we have Kendra Moyer, who will be presenting the second half of this presentation, Rhonda Walker, who contributed research to this presentation, and Willie Solomon, who designed this slideshow and was also our team leader. Today we will talk to you about Windows Server 2008 and a few of the many new security features that it has.
  4. The purpose of this presentation is to explain these five security features for server 2008. BitLocker Driver Encryption, User Account Control, Read Only Domain Controller , Network Access Protection (NAP), Cryptography Next Generation(CNG).
  5. Two things that should be explained just in case anyone was unsure are what a server is and what Windows Server 2008 is. A server is a computer program that provides services to other computer programs (and their users), in the same or other computer. Microsoft Windows Server 2008 is the most advanced Windows Server operating system yet, designed to power the next generation of networks, applications, and Web services. With Windows Server 2008 you can develop, deliver, and manage rich user experiences and applications, provide a highly secure network infrastructure, and increase technological efficiency and value within an organization. In the Windows Server 2008 operating system, Microsoft is introducing many new features and technologies, which were not available in Windows Server 2003 with Service Pack 1 (SP1), that will help to reduce the power consumption of server and client operating systems, increase the security of computers running Windows Server 2008, and increase server efficiency and productivity.
  6. Windows BitLocker Drive Encryption (BitLocker) is a security feature in the Windows Vista and Windows Server 2008 operating systems that can provide protection for the operating system on your computer and data stored on the operating system volume. In Windows Server 2008, BitLocker protection can be extended to volumes used for data storage as well. In windows Server 2008, Bitlocker is an optional component that must be installed before it can be used.
  7. BitLocker performs two functions: • BitLocker encrypts all data stored on the Windows operating system volume (and configured data volumes). This includes the Windows operating system, hibernation and paging files, applications, and data used by applications. • BitLocker is configured by default to use a Trusted Platform Module (TPM) to help ensure the integrity of early startup components (components used in the earlier stages of the startup process), and "locks" any BitLocker-protected volumes so that they remain protected even if the computer is tampered with when the operating system is not running.
  8. The major features of BitLocker include full-volume encryption, verification of the integrity of early startup components, a recovery mechanism, and support for a secure decommissioning process. Some things that should be considered before you enable BitLocker are your hardware requirements. You want your existing hardware to be powerful enough to handle the encryption, and if you want to use the system integrity features, your hardware platform must be equipped with a version 1.2 TPM. You should also evaluate your current corporate policies regarding data retention, encryption, and compliance. Always make sure you have a plan for data recovery. And also consider how recovery information will be stored and what decommissioning process will be used when servers will no longer be used.
  9. First, with Full-Volume encryption, everything written to a BitLocker-protected volume is encrypted. This includes the operating system itself, and all applications and data. This helps protect data from unauthorized access. While the physical security of servers remains important, BitLocker can help protect data whenever a computer is stolen, shipped from one location to another, or otherwise out of your physical control. Encrypting the disk helps prevent offline attacks such as the removal of a disk drive from one computer and its installation in another in an attempt to bypass Windows security provisions. Second, BitLocker uses the TPM to verify the integrity of early boot components and boot configuration data. This helps ensure that BitLocker makes the encrypted volume accessible only if those components have not been tampered with and the encrypted drive is located in the original computer, which helps prevent additional offline attacks, such as attempts to insert anything that could cause harm those components. In day-to-day use, BitLocker protection is virtually transparent to the user. And in the event that system lockout occurs—for example, due to hardware failure, hardware changes, or an attempted security breach—BitLocker offers a simple, efficient recovery process, which is our third step. When BitLocker is enabled, the user is prompted to store a "recovery password" that can be used to unlock a locked BitLocker volume. The BitLocker setup wizard requires that at least one copy of the recovery password is saved. At some point, all computers need to be removed from service and many are reassigned to different purposes during their useful life. Enterprises might have plans to recycle equipment, donate or sell it, or return it at the expiration of a lease, but every enterprise must also ensure that no confidential data can be retrieved from the decommissioned or reassigned equipment. Most processes that remove confidential data from disk drives are time consuming, costly, or result in the permanent destruction of the hardware. BitLocker helps ensure that data is never stored on disk in a way that would be useful to an attacker, thief or new hardware owner by making it inaccessible, which is the last step.
  10. User Account Control (UAC) is a new technology and security infrastructure for Microsoft’s Server 2008 and Window’s Vista operating system. If you have Vista or are familiar with it you would recognize it as the annoying box that pops up asking for permission. But what UAC aims to improve is the security of Microsoft Windows by limiting application software to standard user privileges until an administrator authorizes an increase in privilege level.
  11. A read Only Domain Controller (RODC) is a new type of domain controller in Windows Server 2008. Its main purpose is to improve security in branch offices that might have a writable domain controller but not the physical security, network bandwidth, or local expertise to support it. Writeable domain controllers store sensitive data, such as passwords and other credentials and can lead to a security breach if that data ends up in the hands of unauthorized user. An RODC holds all Active Directory objects (Active Directory provides the means to manage the identities and relationships that make up network environments), attributes that a writable domain controller holds but RODCs can help with this problem in four ways: With the Read only feature If an application needs write access to Active Directory objects the RODC will send an Lightweight Directory Access Protocol (LDAP) which is a set of protocols for accessing information. LDAP redirects the application to a writable domain controller. An intruder on the RODC can’t manipulate the Active Directory database because nothing was ever written to the Active Directory. Second, If the RODC server host a Domain Name System server (DNS), the intruder won’t be able to tamper with the DNS data. A DNS is a naming system for computers, services, or any resource participating in the Internet. The third way is you can delegate a local Administrator role to a domain user. If an intruder gains access to the credentials of this local administrator account, they won’t be able to make changes on other domain controllers. And the final way is with Password Protection a malicious user won’t be able to access passwords using a brute-force-attack. This applies only if password caching is disabled on the RODC. If a password isn’t cached, the RODC will forward the authentication request to a writable DC. This ends my portion of the presentation, next my teammate Kendra will present the remainder of the presentation.
  12. NAP is a policy enforcement platform that was built into Windows Server 2008 and some other windows software. It basically helps ensure that your system of lines (network) isn't compromised by unhealthy computers, isolating and/or remediating those computers that don't comply with the security policies you set. There is the Components for NAP and the Server Components which I will mention in this slide and go more in detail in the next slide. The Components are NAP agent, System Health Agent, and the server component is NAP administration server.
  13. In this slide I’m going to tell you about the client components. This slide will go over the five steps of how it works. First the client request access then for step two the computers health state is validated against policies set by the administrator. As part of third step the request is sent to the Network Policy Server (NPS) and what this does is provide a central authentication and authorization service for all access sent by radius client. Don’t worry I know you don’t know what a radius client is so let me explain, a radius client is new software that a Network Access Server (NAS) uses. The NAS is used to connect to a large network and the radius communicates with radius clients verifying that the client complies with the radius protocol. For step four if the request for access is compliant access is granted and welcome to the network! Step five is only if the request isn't compliant the client is restricted and remediation is called. What happens is the remediation server issues updates so the computer requesting access meets the minimum requirements.
  14. CNG has the ability to convert the use of protocols like SSL/TLS, CMS (S/MIME), IPsec, Kereberos, etc. Prior to CNG, the protocol APIs needed to add algorithm selection and other options that didn’t exist. CNG is targeting Federal Information Processing Standards (FIPS). CNG complies with common criteria requirements by storing and using long lived keys in a secure process. CNG supports Suite B algorithms. This is the new standard required by the NSA to designate information as Top Secret. The standard is now necessary to all software vendors and system integrators. CNG supports the current set of Algorithms in Crypto AGI 1.0. CNG supports cryptography in kernel mode(Kernel mode means a program has complete control over the information and the hardware). The same APIs are used in both kernel and user mode to fully support the cryptography features. Many actions that happen in the CNG layer are audited in the Microsoft software key storage provider (KSP). CNG provides the ability to replace the default random number generator (RNG). All functions within CNG are designed to support multithreaded or concurrent execution. CNG supports the three modes of operation that can be used with symmetric block ciphers through the encryption APIs. CNG provides a model for private key storage that adapts for current and future demands in cryptographic features. That would conclude the complete security features that we have selected to discuss today and to bring this presentation to a close I will like to test the audiences knowledge of the information given with ten questions.    
  15. 1)Answer: When a client tries to access a network or communicate on a network it must present its system health requirements to gain unlimited access. 2)Answer: It stands for Network Access Protection 3) A computer program that provides services to other computer programs 4) Suite B is the new encryption standard for the NSA to which Microsoft and other software and hardware providers must now be compliant. 5) Cryptography is a system which allows the transferring of sensitive data online without detection. 6) Windows Vista and Windows Server 2008 7) User account control 8)Read Only Domain Controller 9)To improve security in office branches 10)No