優(yōu)質(zhì)的PPT必備區(qū)塊篇素材匯總_第1頁
優(yōu)質(zhì)的PPT必備區(qū)塊篇素材匯總_第2頁
優(yōu)質(zhì)的PPT必備區(qū)塊篇素材匯總_第3頁
優(yōu)質(zhì)的PPT必備區(qū)塊篇素材匯總_第4頁
優(yōu)質(zhì)的PPT必備區(qū)塊篇素材匯總_第5頁
已閱讀5頁,還剩67頁未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

1、優(yōu)質(zhì)的PPT必備區(qū)塊篇素材匯總Integrated phone and PDAPrimarily data viewingInteroperability with Outlook and Exchange.NET Compact FrameworkASP.NET mobile controlsMobile Device SolutionsComplex document authoring, editing and readingKeyboard centric at the deskKeyboard and mouse input methodsFull .NET framework av

2、ailableCentrino SolutionsWindows MobileWindows XPComplex document authoring, editing and active readingNote taking and ink annotating Keyboard centric at the desk, pen and keyboard away from the deskKeyboard, mouse plus pen, ink, and speech input methodsFull .NET framework preinstalledPen, ink, hand

3、writing and speech recognition APIsCentrino SolutionsView and some data entryIntegrated PDA with phoneInteroperability with Office, Exchange and SQL Server.NET Compact FrameworkASP.NET mobile controlsIntel Xscale SolutionsWindows CEOne-way networkInformation consumptionSmart Personal ObjectsSmartpho

4、nePocket PC and Pocket PC PhoneNotebook PCTablet PCNetwork DefenseHealth checkupIT checks “health” of clientNetwork Access ControlClients who pass get network accessClients who do not pass are fixed or blocked (aka “quarantined”)Health maintenanceQuarantined clients can be given access to resources

5、to get healthyFrom Home(VPN, Dial up)Returning LaptopsConsultantsGuestsUnhealthyDesktopsMicrosoft Business Solutions ERP PositioningProject Management and Accounting ERP Primarily in US and Latin America Mid-market ERP Typically customized for unique business processesGlobal ERPMultinationalsAdvance

6、d manufacturersMid-market ERPRich out-of-the-box functionalityGuiding PrinciplesProductiveIntegratedExtensibleCapableShort learning curveMinimal administrative overheadTools integrated tightlyAutomates common tasksCustomizable for your processIntegrates with 3rd party toolsRemotely accessibleRobust,

7、 secure, scalableStaging ArchitectureData entryTestApplication CenterCommerce WebCommerceCommerce DataCommerce WebCommerceCommerce DataApplication CenterApplication CenterDataACS ClusterACS ClusterCluster controllerCluster controllerDataLive Communications Client RoadmapLC 1.2 Client PlatformMultipa

8、rty IMP2P Voice and VideoMPOP GroupsRoamingSIP supportGPO policy managementLC 1.5 Client PlatformRoll up of QFEsMPOP AdditionsFederation/Archiving NotificationHA AdditionsLC 2.0 Client PlatformNext generation of RTC experiencesMore coming!20032H04LonghornEnterprise Deployment UpdateInternetFirewallF

9、irewallFirewallRuntime ServersCorporate LAN Internal ServersCrawl/SearchLoad Balanced WebInfrastructure ServersDevelopment ServersTest ServersBusiness Data ServersBusiness UsersDatabase and Staging ServersStaging ServersDatabase ServersOffline ServersIndicates Staged Data FlowCommunicate and collabo

10、rate in a more secure mannerwithout sacrificing information worker productivityWindows XP SP2Block virus or malicious code at the “point of entry”At RiskThe SoftUnderbellySecurity Issues Today1 Source: Forrester Research2 Source: Information Week, 26 November 20013 Source: Netcraft summary4 Source:

11、CERT, 20035 Source: CSI/FBI Computer Crime and Security Survey6 Source: Computer Security Institute (CSI) Computer Crime and Security Survey 20027 Source: CERT, 20028 Source: Gartner Group14B devices on the Internet by 2010135M remote users by 2005265% increase in dynamic Web sites3From 2000 to 2002

12、 reported incidents rose from 21, 756 to 82,0944Nearly 80 percent of 445 respondents surveyed said the Internet has become a frequent point of attack, up from 57 percent just four years ago5 90% detected security breaches685% detected computer viruses695% of all breaches avoidable with an alternativ

13、e configuration7Approximately 70 percent of all Web attacks occur at the application layer8Application Layer AttacksIdentity TheftWeb Site DefacementUnauthorized AccessModification of Data, Logs and RecordsTheft of Proprietary InformationService DisruptionImplicationsCompliance:Sarbanes OxleyGramm L

14、each BlilelyUS Patriot ActHIPAAThe Privacy Act (CA)Basel 2 (EU)Data Protection Act (EU)Litigation Piracy HR Issues Shareholder SuitsCustomer ImpactTypes Of SRP RulesPath RuleCompares path of run to an allowed path listUse when you have a folder with many files for the same applicationEssential in wh

15、en SRPs are strictHash RuleCompares the MD5 or SHA1 hash of a the one attempted to be runUse when you want to allow/prohibit a certain version of a being runCertificate RuleChecks for digital signature on application (i.e. Authenticode)Use when you want to restrict both win32 applications and Active

16、X contentInternet Zone RuleControls how Internet Zones can be accessedUse when in high security environments to control access to web applicationsSQL Server 2005 ThemesSupportability & QualityEnterprise EnhancementsUnified & Flexible AdministrationPatch SolutionsPrevention, Readiness, RecoveryEase o

17、f usePatch InstallsPatch in integrated stepIntegrated Database Services and Business IntelligenceFlexible install managementAdd value to one-step Failover ClusteringExpanded scripting supportTraditional FirewallsWide open to advanced attacksPerformance versussecurity tradeoffLimited capacityfor grow

18、thHard to manageCode Red, NimdaSSL-based attacksSecurity is complexIT is already overloadedBandwidth too expensiveToo many moving partsNot easily upgradeableDont scale with businessChoosing the Right Type of Assessment Vulnerability Scanning Focuses on known weaknesses Of the three, requires the lea

19、st expertise Generally easy to automatePenetration TestingFocuses on known and unknown weaknessesRequires advanced technical expertiseCarries tremendous legal burden in certain countries/organizations IT Security Audits Focuses on security policies and procedures Of the three, requires the most expe

20、rtise When done right is the most effective type of assessmentPerimeter Security EvolutionWide open to advanced attacksApplication-level protectionPerformance versussecurity tradeoffSecurity and performanceLimited capacityfor growthExtensibility and scalabilityHard to manageEasier to useThe advanced

21、 application layer firewall, VPN and Web cache solution that enables customers to maximize IT investments by improving network security and performanceAdvanced protectionApplication layer security designed to protect Microsoft applicationsFast, secure accessEmpowers you to connect users to relevant

22、information on yournetwork in a cost efficient mannerEase of useEfficiently deploy, manage, and enable new usage scenariosIntroducing: ISA Server 2004Fast, secure accessEmpowers you to connect users to relevant info. on your networkISA Server 2004 New FeaturesContinued commitment to integrationEnhan

23、cedarchitecture High speed data transport Utilizes latest Windows and PC hardware SSL bridging unloads downstream serversWeb cache Updated policy rules Serve content locally Pre-fetch content during low activity periodsInternet accesscontrol User- and group-based Web usage policy Extensible by third

24、 partiesComprehensiveauthentication New support for RADIUS and RSA SecurID User- & group-based access policy Third party extensibilitySystem Service AccountsLocal Service and Network ServiceNo password to manageRuns with only slightly more permissions than Authenticated User Local Service cannot aut

25、henticate across the network, Network Service authenticates as the computer accountLocal System No password to manage Bypasses security checksUser AccountsRun with less privilege than Local System Stores password as an LSA secretCan be complex to configureWhats New With IPSec?Management IP Security

26、Monitor Command-line management with Netsh Logical addresses for local IP configuration Security Stronger cryptographic master key (Diffie-Hellman) Computer startup security Persistent policy for enhanced security Ability to exclude the name of the CA from certificate requests Better default exempti

27、on handlingInteroperability IPSec functionality over network address translation (NAT) Improved IPSec integration with Network Load BalancingISA Server 2004 New FeaturesNew management tools and user interfaceMulti-networkarchitectureUnlimited network definitions and typesFirewall policy applied to a

28、ll trafficPer network routing relationshipsNetwork templatesand wizardsWizard automates nwk routing relationshipsSupports 5 common network topologiesEasily customized for sophisticated scenariosVisual policy editorUnified firewall/VPN policy w/one rule-baseDrag/drop editing w/scenario-driven wizards

29、XML-based configuration import-exportEnhancedtrouble-shootingAll new monitoring dashboardReal-time log viewerContent sensitive task panesEase of UseEfficiently deploy, manage, and enable new usage scenariosHow To Use Windows UpdateTo configure Automatic Updates:Select Keep my computer up to dateOpen

30、 the System application in Control Panel1On the Automatic Updates tab, select theoption you want32Office UpdateBenefitsLimitationSingle location for office patches and updatesEasy to useCan be configured to update consumer orenterprise systemsDoes not support Automatic Updates; updating must be init

31、iated manuallyOffice Update Web site:How To Use Office UpdateGo to 1Click Check for Updates2Install the Office Update Installation Engine (if not already installed)3Select the updates you want to install4Click Start Installation5How To Use SUSOn the SUS serverConfigure the SUS server at :/SUSAdminOn

32、 each SUS clientConfigure Automatic Updates on the client to use the SUS server Use Group Policy, manually configure each client, oruse scriptsSet the SUS server synchronization scheduleReview, test, and approve updates123How To Use MBSADownload and install MBSA (once only)1Launch MBSA2Select the co

33、mputer(s) to scan3Select relevant options4Click Start scan5View the Security Report6Software Update Service Deployment Best Practices (1)Review each security patch Download and install the patchTest each security patch before deploymentConfigure a test labUse a test SUS serverConsider using Virtual

34、PCs in the test labUse a standard acceptance testing procedureSoftware Update Service Deployment Best Practices (2)Complete the deploymentPilot the deploymentConfigure a child SUS server to approve updatesConfigure a GPO so that the patch is downloaded from the pilot SUS server only by specified wor

35、kstationsIf the pilot fails, remove approval from the SUS server and manually uninstall the patchHow To Use SMS To Deploy PatchesOpen the SMS Administrator Console1Right-click All Windows XP Computers, and then select All Tasks Distribute Software Updates3Use the wizard to create a new package and p

36、rogram4Browse to the patch to be deployed5Configure options for how and when the patch will be deployed to clients6Expand the Site Database node2SMS MBSA IntegrationScans SMS clients for missing security updates using mbsacli.exe /hfSMS directs client to run local MBSA scan1SMS server parses data to

37、 determine which computers need which security updates3Administrator pushes missing updates only to clients that require them4Client performs scan, returns data to SMS server2MBSA BenefitsScans systems forMissing security patchesPotential configuration issuesWorks with a broad range ofMicrosoft soft

38、wareAllows an administrator to centrally scan multiple computers simultaneously MBSA is a free tool, and can bedownloaded from MBSA ConsiderationsMBSA reports important vulnerabilitiesPassword weaknessesGuest account not disabledAuditing not configuredUnnecessary services installedIIS vulnerabilitie

39、sIE zone settingsAutomatic Updates configurationInternet Connection Firewall configurationMBSA Scan OptionsMBSA has three scan optionsMBSA graphical user interface (GUI)MBSA standard command-lineinterface (mbsacli.exe)HFNetChk scan (mbsacli.exe /hf)Business Case ForPatch ManagementWhen determining t

40、he potential financial impact of poor patch management, considerDowntimeRemediation timeQuestionable data integrityLost credibilityNegative public relationsLegal defensesStolen intellectual property“We commend Microsoft for providing enhanced security guidance to its customers as well as for solicit

41、ing user input as part of the process of producing that guidance“Clint KreitnerPresident/CEO“NIST reviewed and provided technical comments & advice, that was incorporated in this guidance”Timothy GranceManagerSystems and Network Security GroupCommentsSecurely make e-mail available to outside employe

42、esExchange publishingYou Need ToSecurely make internal applications available on the InternetWeb and Server PublishingEnable partners to access relevant information on my networkIntegrated S2S VPN and FWSecure and flexible remote access, while protecting my corporate networkIntegrated RRAS VPN and F

43、WSecurely connect my branch offices to the corporate officeIntegrated FW, VPN, CacheControl Internet Access and protect my clients from malicious Internet trafficFW, Web ProxyEnsure fast access to the most frequently used web contentCachingISA DeliversRelational ReportingMultiple fact tablesFull ric

44、hness the dimensionsattributes Transaction level accessStar, snowflake, 3NF Complex relationships: Multi-grains, many-to-many, role playing, indirectRecursive self joinsSlowly changing dimensionsThe Unified Dimensional Model The Best Of Relational And OLAPOLAP CubesMultidimensional navigationHierarc

45、hical presentationFriendly entity namesPowerful MDX calculationsCentral KPI framework“Actions” Language translations Multiple perspectivesPartitionsAggregations Distributed sourcesVisual Studio Team SystemChange ManagementWork Item TrackingReportingProject SiteVisual StudioTeam FoundationIntegration

46、 ServicesProject ManagementProcess and Architecture GuidanceVisual Studio Industry PartnersDynamic Code AnalyzerVisual StudioTeam ArchitectStatic Code AnalyzerCode ProfilerUnit TestingCode CoverageVisio and UML ModelingTeam Foundation ClientVS ProClass ModelingLoad TestingManual TestingTest Case Man

47、agementApplication ModelingLogical Infra. ModelingDeployment ModelingVisual StudioTeam DeveloperVisual StudioTeam TestApplication ModelingLogical Infra. ModelingDeployment ModelingClass ModelingSQL Server CatalogReport ServerXML Web Service InterfaceReport ProcessingDeliveryDelivery Targets(E-mail,

48、SharePoint,Custom)RenderingOutput Formats (HTML, Excel, PDF, Custom)Data ProcessingData Sources(SQL, OLE DB, XML/A, ODBC, Oracle, Custom)SecuritySecurity Services(NT, Passport, Custom)OfficeCustom ApplicationBrowserSQL Server 2000 Reporting Services ArchitectureCM ProfileRuns customizablepost connec

49、t scriptScript runs RQC notifierwith “results string”ListenerRQS receives Notifier“results string”Compares results topossible resultsRemoves time-out ifresponse received butclient out of dateRemoves quarantine filterif client up to dateQuarantine VSAsTimer limits timewindow to receive notify before

50、auto disconnectQ-filter sets temporary route filter to quarantine accessInternetRAS ClientRRAS ServerIAS ServerQuarantineRQC.exe and RQS.exe are in the Windows Server 2003 Resource KitQuarantine ArchitectureWhat is VS Team Foundation?Source Code ControlWork Item TrackingBuild AutomationProject SiteR

51、eportingMicrosoft BI Product SuiteAnalysis ServicesOLAP & Data MiningData TransformationServicesSQL ServerRelational EngineReporting ServicesManagement ToolsDev Tools Visual Studio .NetExcelOWCVisioMap PointData AnalyzerSharePoint PortalServerProject ServerWindows ServerMBS BI ApplicationsCurrent Ar

52、chitectureTCP/IPRTC Client APIUser AppRTPSIPPINTT.120Server ArchitectureApplicationManaged APIsApplicationManaged APIsWinsockStorageADDispatcherData Store InterfacesSPL Script EngineRegistrar/PresenceSIP ProxyServerApplication InteractionApplication1 CRMApplication2 BillingApplication3 LoggingReques

53、tModifiedRequestTITLEAvailableTodayMicrosoft Windows Security Resource KitAssessing Network SecurityJune 23, 2004EAP architectureTLSGSS_APIKerberosPEAPIKEMD5EAPPPPAnythingmethodlayerEAPlayermedialayerMS-CHAPv2TLSSecurIDPartner Solutions OfferingsVALUE Proposition:Get more business value from your in

54、vestment in OfficeFinanceSarbanes-OxleyBusiness ScorecardExcel Add-in for SQL Server Analysis ServicesOperationsSix SigmaHRRecruitingSalesProposalsSolution AcceleratorsMicrosoft ProductsOffice Solution AcceleratorsVALUE Proposition:Get more business value from your investment in OfficeYour PeopleEPM

55、 Involves.Your BusinessProcesses Your OrganizationYour Software Technology & ToolsEnterprise Project ManagementAn orchestration of your people, processes, organization with technologyYour Business ProcessesGovernancePrioritizationBudgetingHuman Resources etc InitiativesImplement Microsoft OfficeProj

56、ect 2003 for the EnterpriseDecisions- Corporate Goals and ObjectivesExecutivesFinanceSales and MarketingR&DIT / ISYour OrganizationStrategic Initiatives HRDevelopment ProjectsOperational ImprovementsOn Average 45-50% of all Projects are linked to Strategic Objectives.Representative Risks And Tactics

57、Tactical SolutionsEnterprise RisksEmbodyTrustworthyComputingSecure Environmental RemediationUnpatched DevicesNetwork Segmentation Through IPSecUnmanaged DevicesSecure Remote UserRemote and Mobile UsersTwo-Factor for Remote Access and AdministratorsSingle-Factor AuthenticationManaged Source Initiativ

58、esFocus Controls Across Key AssetsRemote Access SecurityThreatRequirementSolutionMalicioususersTwo factor authenticationSmart Cardsfor RASMalicioussoftwareEnforce remote system security configurationConnection Manager, custom scripts and tools provided in the Windows 2003 resource kitCorporate Secur

59、ity Group OrganizationCorporate Security GroupThreat, RiskAnalysis, and PolicyAssessment andComplianceMonitoring, Intrusion Detection, and Incident ResponseShared ServicesOperationsThreat and RiskAnalysisPolicyDevelopmentProductEvaluationDesignReviewStructureStandardsSecurityManagementSecurityAssess

60、mentCompliance andRemediationMonitoring andIntrusion DetectionRapid Responseand ResolutionForensicsITInvestigationsPhysical andRemote AccessCertificateAdministrationSecurityToolsInitiativeManagementServer FunctionsOperational InfrastructureServer Workloads FocusApplication/Web ServerUnix integration

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

評(píng)論

0/150

提交評(píng)論