SlideShare a Scribd company logo
Improving Network Security Using Windows Server 2008 Published:   May 2008
Server & Domain Isolation Domain Isolation Protect managed computers from unmanaged  or rogue computers and users Protect specific high-value servers and data Server Isolation
Isolation Solution Details Policies are created, distributed, and managed through Active Directory® Security Groups and Group Policy: Domain membership is required to access trusted resources. Expands the use of supportive tools like Microsoft Systems Management Server (SMS) 2003 or Windows Server® Update Service (WSUS). Authentication is based on machine and user credentials: Kerberos, X.509 certificates ,  NTLM version 2 (NTLMv2), NAP health certificates Policies are enforced at the network layer by IPsec: Uses IPsec transport mode for end-to-end security and Network Address Translation (NAT) traversal Packets encapsulated with Encapsulating Security Payload (ESP) or Authentication Header (AH) for authentication and integrity  Optionally, encryption of highly sensitive network traffic Policy Management Authentication Enforcement
Windows Firewall Integration Integrated host firewall and IPsec management: New management tools (the Windows Firewall with Advanced Security  MMC snap-in;  netsh advfirewall  command-line tool) Reduces conflicts and coordination overhead among technologies Firewall rules become more intelligent: Specify security requirements such as authentication and encryption Specify Active Directory computer or user groups
This document is provided for informational purposes only.  MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2008 Microsoft Corporation. All rights reserved.  This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.  Microsoft, Windows and Windows NT are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.

More Related Content

ODP
Group G-week14
PDF
Platform Security Presentation
PDF
CoreTrace Whitepaper: Protecting PCI Systems And Data
DOCX
Security features of fedora
PDF
Review of NIST Security Controls SC-28 SC-10
PPT
Microset Security Presentation
PDF
Cs seminar 20070426
PDF
Ece seminar 20070927
Group G-week14
Platform Security Presentation
CoreTrace Whitepaper: Protecting PCI Systems And Data
Security features of fedora
Review of NIST Security Controls SC-28 SC-10
Microset Security Presentation
Cs seminar 20070426
Ece seminar 20070927

What's hot (17)

PDF
PPTX
Linux Security in Operating System
PDF
Core Trace PCI DSS Compliance
PDF
GroupWork at week 14
PPT
Firewall
PPTX
Windows Server 2008 Security Enhancements
PPTX
Institutional IT Security
PDF
Psdot 12 a secure erasure code-based cloud storage
PPTX
Covert networks
PPTX
Windows vs linuxe
PDF
Secure deduplication-evault-endpoint-protection
PPT
Firewalls
PPTX
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
DOC
Bitlockerflow
PPTX
Unified Threat Management Solutions
PPTX
Windows 7 in 60 minutes - New Horizons Bulgaria
PDF
CounterSnipe-v9.0
Linux Security in Operating System
Core Trace PCI DSS Compliance
GroupWork at week 14
Firewall
Windows Server 2008 Security Enhancements
Institutional IT Security
Psdot 12 a secure erasure code-based cloud storage
Covert networks
Windows vs linuxe
Secure deduplication-evault-endpoint-protection
Firewalls
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Bitlockerflow
Unified Threat Management Solutions
Windows 7 in 60 minutes - New Horizons Bulgaria
CounterSnipe-v9.0
Ad

Viewers also liked (19)

PPT
Mitosis y Meiosis
DOCX
Informatica
DOCX
Pantallazos access
PPTX
Medios de información
PDF
H24tyuugaku
PDF
me vale verga
PDF
子どもたちを放射能から守る福島ネットワーク  2012年度会計監査報告書
PPTX
Trabajo de screenshots
DOC
acid and salt
PPT
104.07.17 行銷策略與店面評估 -高雄創業進階班-詹翔霖教授-鼎泰豐行銷法
PDF
Nivel 3 - TP3 - Anteproyecto - Dominguez, Lee, Suarez
DOC
Carácter y mejora personal
PPTX
Aplicacion 2 dt
PPT
виготовлення новорічної іграшки
PPT
102年「ㄏㄨㄚˋ品格繪本故事工作坊」創作一:喜福魚
PDF
Nivel 3 - Suma Salud - Disipio, Gonzalez, Shokida
PPT
5 3我的第二個媽媽
PPTX
Ggggggg
DOCX
Bloque 3 fisica 2
Mitosis y Meiosis
Informatica
Pantallazos access
Medios de información
H24tyuugaku
me vale verga
子どもたちを放射能から守る福島ネットワーク  2012年度会計監査報告書
Trabajo de screenshots
acid and salt
104.07.17 行銷策略與店面評估 -高雄創業進階班-詹翔霖教授-鼎泰豐行銷法
Nivel 3 - TP3 - Anteproyecto - Dominguez, Lee, Suarez
Carácter y mejora personal
Aplicacion 2 dt
виготовлення новорічної іграшки
102年「ㄏㄨㄚˋ品格繪本故事工作坊」創作一:喜福魚
Nivel 3 - Suma Salud - Disipio, Gonzalez, Shokida
5 3我的第二個媽媽
Ggggggg
Bloque 3 fisica 2
Ad

Similar to Windows server2008 (20)

PDF
VMware NSX @ VMUG.IT 20150529
PDF
Implementing Application Security
PDF
azure-security-overview-slideshare-180419183626.pdf
PPTX
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
PPTX
Azure Security Overview
PPSX
Síťová virtualizace s VMware
PDF
Windstream Hosted Solutions: Public Cloud Security
PDF
PDF
Providing user security guarantees
PDF
Providing user security guarantees
PDF
Trend micro deep security
PDF
Intel vmcs-shadowing-paper
PDF
Windows 7 security enhancements
PDF
Application Of An Operating System Security
DOCX
Providing user security guarantees in public infrastructure clouds
PDF
Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!
PPTX
Software defined security-framework_final
PPTX
IT Pros and The Cloud
PPTX
Microsoft Platform Security Briefing
PPTX
Nsx security deep dive
VMware NSX @ VMUG.IT 20150529
Implementing Application Security
azure-security-overview-slideshare-180419183626.pdf
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
Azure Security Overview
Síťová virtualizace s VMware
Windstream Hosted Solutions: Public Cloud Security
Providing user security guarantees
Providing user security guarantees
Trend micro deep security
Intel vmcs-shadowing-paper
Windows 7 security enhancements
Application Of An Operating System Security
Providing user security guarantees in public infrastructure clouds
Windows Server 2016 ile İşlerinizi Daha Güvenli Gerçekleştirin!
Software defined security-framework_final
IT Pros and The Cloud
Microsoft Platform Security Briefing
Nsx security deep dive

More from jaimeccanto (6)

PPTX
Video linux
PPTX
Administración de Servidores
PPT
Diapositivas sobre Redes
DOC
Pensmiento de orden superior
PPT
Presentacion portafolio unidad_frijoles
DOC
Video linux
Administración de Servidores
Diapositivas sobre Redes
Pensmiento de orden superior
Presentacion portafolio unidad_frijoles

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
cuic standard and advanced reporting.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Empathic Computing: Creating Shared Understanding
PDF
Electronic commerce courselecture one. Pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Spectroscopy.pptx food analysis technology
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
MIND Revenue Release Quarter 2 2025 Press Release
sap open course for s4hana steps from ECC to s4
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Big Data Technologies - Introduction.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Per capita expenditure prediction using model stacking based on satellite ima...
20250228 LYD VKU AI Blended-Learning.pptx
MYSQL Presentation for SQL database connectivity
cuic standard and advanced reporting.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Empathic Computing: Creating Shared Understanding
Electronic commerce courselecture one. Pdf

Windows server2008

  • 1. Improving Network Security Using Windows Server 2008 Published: May 2008
  • 2. Server & Domain Isolation Domain Isolation Protect managed computers from unmanaged or rogue computers and users Protect specific high-value servers and data Server Isolation
  • 3. Isolation Solution Details Policies are created, distributed, and managed through Active Directory® Security Groups and Group Policy: Domain membership is required to access trusted resources. Expands the use of supportive tools like Microsoft Systems Management Server (SMS) 2003 or Windows Server® Update Service (WSUS). Authentication is based on machine and user credentials: Kerberos, X.509 certificates , NTLM version 2 (NTLMv2), NAP health certificates Policies are enforced at the network layer by IPsec: Uses IPsec transport mode for end-to-end security and Network Address Translation (NAT) traversal Packets encapsulated with Encapsulating Security Payload (ESP) or Authentication Header (AH) for authentication and integrity Optionally, encryption of highly sensitive network traffic Policy Management Authentication Enforcement
  • 4. Windows Firewall Integration Integrated host firewall and IPsec management: New management tools (the Windows Firewall with Advanced Security MMC snap-in; netsh advfirewall command-line tool) Reduces conflicts and coordination overhead among technologies Firewall rules become more intelligent: Specify security requirements such as authentication and encryption Specify Active Directory computer or user groups
  • 5. This document is provided for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Microsoft, Windows and Windows NT are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.

Editor's Notes

  • #2: Abstract CUSTOMER READY: Microsoft IT discusses the next generation of networking features in Windows Server 2008 and the network security solution scenarios these features enable. Introduction As part of its Secure Anywhere Access Initiative, Microsoft IT has undertaken a multi-year effort to improve the security of the Microsoft network. The improvements have come by using a combination of technologies. Leveraging Internet Protocol Security (IPsec) and Windows® Firewall along with improved management tools, Microsoft IT has created a more secure network. The security improvements create advantages for the business by reducing downtime resulting from malware, improving compliance, and reducing time spent on management of information technology (IT) security. This presentation examines the evolution of security within Microsoft’s corporate network. Included are Microsoft IT’s experience in planning its initial rollout of IPsec, the use of Windows Firewall, and Network Access Protection (NAP).
  • #3: 07/03/10 21:33 ©2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.
  • #4: 07/03/10 21:33 ©2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.
  • #5: 07/03/10 21:33 ©2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.
  • #6: © 2006 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Microsoft, Windows and Windows NT are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.