SlideShare ist ein Scribd-Unternehmen logo
1 von 10
WINDOWS 7 PRO
                   VS
              WINDOWS 7 ENT
A Presentation on the exceptional differences between the two Operating Systems
Extra Features In WIN 7 Ent
•   BitLocker
•   Bitlocker To Go
•   Applocker
•   Boot from VHD
•   BranchCache
•   DirectAccess
BitLocker
Available on Win 7 Enterprise and Ultimate. It is used in Encrypting the HDD with
128bit AES encryption. It is faster than other AES encryption and has low RAM
requirements since the CBC mode with a 128bit key is used for encryption.
Authentication Mechanism
 • Transparent mode: Uses TPM chip for key storage. Releases the Key to the
   OS loader only if the early bootfile appears to be unmodified. Vulnerable to
   a ‘coldboot’ attack.
 • User Authentication mode: Uses the bootloader. Requires authentication to
   the pre-boot environment in the form of a PIN. Vulnerable to the ‘bootkit’
   attack but not to ‘coldboot’ attack.
 • USB Key mode: Uses a USB dongle containing the startup key. BIOS must
   support portable USB devices at the Pre-boot OS stage. This mode is immune
   to ‘coldboot’ attack.
BitLocker
Recovery Modes
• Recovery Password: A numerical Key protector for recovery purposes.
• Recovery Key: An external Key for recovery purposes.
• Certificate: Adds a certificate-based public key protector for recovery.
The following Combination of Authentication modes are possible and all can be recovered
using the ‘Recovery Key’ method.
• TPM
• TPM+PIN
• TPM+PIN+USB key
• TPM+USB key
• USB Key
Requirements
1. Two NTFS formatted volumes(one for OS and a 100MB min from which the OS boots).
    This can be achived using the DISKPART util or the Bitlocker Drive Preparation Tool.
2. An optional Key can be stored on the AD for recovery purpose and can be used for
    recover using the ‘BitLocker Recovery Password Viewer for AD users’. For server
    versions before 2008 the ‘Schema’ must be updated.
BitLocker
                             Benefits to the Business
•   Good Degree of safety in case of Laptop theft.
•   Integrated with AD directly no extra application or Add-on required.
•   It encrypts more than the OS partition thus ensuring max security of data.
•   Works on Multiboot environments.
•   Flexible configuration as GP can be used.
                                      Limitations
•   Cool boot attack while using it in the TPM mode(transparent operation mode)
•   Only Supported on the NTFS partision and on NT based OS(but BITLOCKER TO GO
    Reader can run on NTFS, FAT 32 or exFAT).
•   Workaround possible without TPM.
•   BitLocker gives the End user local admin Rights. This gives them the opportunity to turn
    off the encryption if desired
AppLocker
This help to prevent the use of Unknown or Unwanted application within the Network.
Helps to boast security and compliance for the organisation. It is a rule based service,
with 3 main rules configurable( Exec rule, Windows Installer rule, Script rule).

                    Applocker Vs Other Solutions
Restriction policies can be applied to the following.
• Specific User or Group.
• Default Rule Action is Deny.
• Audit-only mode possible.
• Wizard to create multiple rules at once.
• Policy import or export.
• Rule Collection available.
• PowerShell Support.
• Custom Error Messages.
AppLocker
                                   Requirement
•   Windows Server 2008 R2. Windows 7 Ult, Windows 7 Ent(Win 7 pro can create rules but
    can’t enforce them.)
•   For GP deployment, at least one computer with the Group Policy Management
    Console(GPMC) or the Remote Server Administration Tools(RSAT) installed to host the
    Applocker rules.
•   Computers to enforce the Applocker rules created.
                                       Rule Conditions
Rules are created either by PUBLISHER, PATH or by FILE HASH.
                                            Benefits
•   Increased security.
•   Cost of Procuring third party apps lock down application eliminated.
Booting from VHD
VHD(Virtual Hard Drive)

                                          Benefits
•   It can be used as a simplified backup mechanism which is also portable.
•   Booting from VHD helps to test new configurations and applications before final role-out.
•   Any Malware infection only affects the VOS and does not spread to the Main OS.
•   Native image deployment using Windows Deployment Service for Workstation/ Server
    redeployment or recovery

                                        Limitations
•   VHD size limited to 2TB
•   EFS/NTFS compression not suported
•   Hibernating not supported.
•   OS can’t be upgraded.
•   Cannot be nested.
•   Can’t be booted from a USB.
BranchCache
Caching contents of files and webservers locally at branch office, increasing the
network responsiveness of centralized applications when accessed remotely.
Modes of Operation
•   Distributed Cache.
•   Hosted Cache.

                                        Benefits
•   Reduced WAN link Utilisation in Branch offices(intranet based HTTP and SMB traffic).
•   Accelerates delivery of encrypted contents(HTTPS and IPSec).
•   Does not require additional equipment at the branch office and can be managed using GP.
•   Caching done by default when round trip lattency time exceeds 80ms.


                                     Limitations
•   Depends on the caching mode(distr requires more processing power from work stations thus
    performance may be affected. Hosted however combats this but requires extra hardware
    investment.
DirectAccess
Enables connection to the office securely through the internet without the need for a
VPN.
                                     Advantages
•   Working outside the office is easier as there is no need for traditional VPN.
•   Remote Management possible(Update deployment and GP settings over the internet).
•   Enhanced Security and Access control.
•   Communicates using IPv6 over IPsec.

Weitere ähnliche Inhalte

Was ist angesagt?

Deploying Microsoft BitLocker
Deploying Microsoft BitLockerDeploying Microsoft BitLocker
Deploying Microsoft BitLockerutahmisfit
 
Qh 2010 Presentation
Qh 2010 PresentationQh 2010 Presentation
Qh 2010 Presentationmak_hiro
 
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015Jan Ketil Skanke
 
ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3Irsandi Hasan
 
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)FFRI, Inc.
 
How Endpoint Encryption Works
How Endpoint Encryption WorksHow Endpoint Encryption Works
How Endpoint Encryption WorksSymantec
 
Stuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackStuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackAjinkya Nikam
 
Telehack: May the Command Line Live Forever
Telehack: May the Command Line Live ForeverTelehack: May the Command Line Live Forever
Telehack: May the Command Line Live ForeverGregory Hanis
 
ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5Irsandi Hasan
 
A Stuxnet for Mainframes
A Stuxnet for MainframesA Stuxnet for Mainframes
A Stuxnet for MainframesCheryl Biswas
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9Javier Arrospide
 
Mengenal Fitur Keamanan Dasar pada Windows 7
Mengenal Fitur Keamanan Dasar pada Windows 7Mengenal Fitur Keamanan Dasar pada Windows 7
Mengenal Fitur Keamanan Dasar pada Windows 7Aris Lesmana
 
Taishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun Owens
 

Was ist angesagt? (20)

Deploying Microsoft BitLocker
Deploying Microsoft BitLockerDeploying Microsoft BitLocker
Deploying Microsoft BitLocker
 
Qh 2010 Presentation
Qh 2010 PresentationQh 2010 Presentation
Qh 2010 Presentation
 
Security
SecuritySecurity
Security
 
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
Windows vs linuxe
Windows vs linuxeWindows vs linuxe
Windows vs linuxe
 
ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3ITE v5.0 - Chapter 3
ITE v5.0 - Chapter 3
 
Qualys Threads
Qualys ThreadsQualys Threads
Qualys Threads
 
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
Security of Windows 10 IoT Core(FFRI Monthly Research 201506)
 
How Endpoint Encryption Works
How Endpoint Encryption WorksHow Endpoint Encryption Works
How Endpoint Encryption Works
 
Stuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attackStuxnet mass weopan of cyber attack
Stuxnet mass weopan of cyber attack
 
Hardening Database Server
Hardening Database ServerHardening Database Server
Hardening Database Server
 
Telehack: May the Command Line Live Forever
Telehack: May the Command Line Live ForeverTelehack: May the Command Line Live Forever
Telehack: May the Command Line Live Forever
 
I Heart Stuxnet
I Heart StuxnetI Heart Stuxnet
I Heart Stuxnet
 
ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5ITE v5.0 - Chapter 5
ITE v5.0 - Chapter 5
 
A Stuxnet for Mainframes
A Stuxnet for MainframesA Stuxnet for Mainframes
A Stuxnet for Mainframes
 
USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9USB-Lock-RP Technical Datasheet version 11.9
USB-Lock-RP Technical Datasheet version 11.9
 
Bitlockerflow
BitlockerflowBitlockerflow
Bitlockerflow
 
Mengenal Fitur Keamanan Dasar pada Windows 7
Mengenal Fitur Keamanan Dasar pada Windows 7Mengenal Fitur Keamanan Dasar pada Windows 7
Mengenal Fitur Keamanan Dasar pada Windows 7
 
Taishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_Lab
 

Andere mochten auch

Windows 7 OS shortcuts
Windows 7 OS shortcutsWindows 7 OS shortcuts
Windows 7 OS shortcuts247infotech
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalQuek Lilian
 
Windows Server 8 Security Improvement
Windows Server 8 Security ImprovementWindows Server 8 Security Improvement
Windows Server 8 Security ImprovementWong Chon Kit
 
Apostila Informática Básica Windows 7 e Pacote Office
Apostila Informática Básica Windows 7 e Pacote OfficeApostila Informática Básica Windows 7 e Pacote Office
Apostila Informática Básica Windows 7 e Pacote OfficeClayton de Almeida Souza
 
linux security: interact with linux
linux security: interact with linuxlinux security: interact with linux
linux security: interact with linuxAmmar WK
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxAmitesh Bharti
 
12 Crucial Windows Security Skills for 2017
12 Crucial Windows Security Skills for 201712 Crucial Windows Security Skills for 2017
12 Crucial Windows Security Skills for 2017Paula Januszkiewicz
 
File system security
File system securityFile system security
File system securityAmmAr mobark
 
Sistemi Kompjuterik
Sistemi KompjuterikSistemi Kompjuterik
Sistemi KompjuterikMagribe
 
Linux Security Overview
Linux Security OverviewLinux Security Overview
Linux Security OverviewKernel TLV
 
Sistemet operative
Sistemet operativeSistemet operative
Sistemet operativeAjla Hasani
 
2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentationixiademandgen
 

Andere mochten auch (14)

Windows 7 OS shortcuts
Windows 7 OS shortcutsWindows 7 OS shortcuts
Windows 7 OS shortcuts
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
Windows Server 8 Security Improvement
Windows Server 8 Security ImprovementWindows Server 8 Security Improvement
Windows Server 8 Security Improvement
 
Apostila Informática Básica Windows 7 e Pacote Office
Apostila Informática Básica Windows 7 e Pacote OfficeApostila Informática Básica Windows 7 e Pacote Office
Apostila Informática Básica Windows 7 e Pacote Office
 
linux security: interact with linux
linux security: interact with linuxlinux security: interact with linux
linux security: interact with linux
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
 
12 Crucial Windows Security Skills for 2017
12 Crucial Windows Security Skills for 201712 Crucial Windows Security Skills for 2017
12 Crucial Windows Security Skills for 2017
 
File system security
File system securityFile system security
File system security
 
Sistemi Kompjuterik
Sistemi KompjuterikSistemi Kompjuterik
Sistemi Kompjuterik
 
Linux Security Overview
Linux Security OverviewLinux Security Overview
Linux Security Overview
 
Sistemet operative
Sistemet operativeSistemet operative
Sistemet operative
 
Sisteme operative
Sisteme operativeSisteme operative
Sisteme operative
 
Pensamientos Filosóficos
Pensamientos FilosóficosPensamientos Filosóficos
Pensamientos Filosóficos
 
2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentation
 

Ähnlich wie Windows 7 professional Vs Windows 7 enterprise

CSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami LaihoCSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami LaihoNCCOMMS
 
CSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoCSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoNCCOMMS
 
eFolder Expert Series Webinar - BDR Do's and Dont's: Featuring Andrew Bensing...
eFolder Expert Series Webinar - BDR Do's and Dont's: Featuring Andrew Bensing...eFolder Expert Series Webinar - BDR Do's and Dont's: Featuring Andrew Bensing...
eFolder Expert Series Webinar - BDR Do's and Dont's: Featuring Andrew Bensing...eFolder
 
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hacked
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hackedDEF CON 27 - XIAOHUIHUI - all the 4g modules could be hacked
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hackedFelipe Prado
 
Hypervisor and VDI security
Hypervisor and VDI securityHypervisor and VDI security
Hypervisor and VDI securityDenis Gundarev
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Qualcomm Developer Network
 
E2E What\'s New In XenApp 6.5
E2E What\'s New In XenApp 6.5E2E What\'s New In XenApp 6.5
E2E What\'s New In XenApp 6.5sthirion
 
Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1solarisyougood
 
VMware End-User-Computing Best Practices Poster
VMware End-User-Computing Best Practices PosterVMware End-User-Computing Best Practices Poster
VMware End-User-Computing Best Practices PosterVMware Academy
 
Trusted Computing security _platform.ppt
Trusted Computing security _platform.pptTrusted Computing security _platform.ppt
Trusted Computing security _platform.pptnaghamallella
 
Managing bitlocker with MBAM
Managing bitlocker with MBAMManaging bitlocker with MBAM
Managing bitlocker with MBAMOlav Tvedt
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Sophos Benelux
 
Mikrotik
MikrotikMikrotik
Mikrotikhzcom
 
Platform Security Summit 18: Xen Security Weather Report 2018
Platform Security Summit 18: Xen Security Weather Report 2018Platform Security Summit 18: Xen Security Weather Report 2018
Platform Security Summit 18: Xen Security Weather Report 2018The Linux Foundation
 
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)Andrejs Prokopjevs
 
BAS004-1_伺服器硬體基礎_v181026
BAS004-1_伺服器硬體基礎_v181026BAS004-1_伺服器硬體基礎_v181026
BAS004-1_伺服器硬體基礎_v181026rwp99346
 
Frokost seminar windows 8 februar 2013
Frokost seminar   windows 8 februar 2013Frokost seminar   windows 8 februar 2013
Frokost seminar windows 8 februar 2013Olav Tvedt
 

Ähnlich wie Windows 7 professional Vs Windows 7 enterprise (20)

CSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami LaihoCSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami Laiho
 
CSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami LaihoCSF18 - BitLocker Deep Dive - Sami Laiho
CSF18 - BitLocker Deep Dive - Sami Laiho
 
eFolder Expert Series Webinar - BDR Do's and Dont's: Featuring Andrew Bensing...
eFolder Expert Series Webinar - BDR Do's and Dont's: Featuring Andrew Bensing...eFolder Expert Series Webinar - BDR Do's and Dont's: Featuring Andrew Bensing...
eFolder Expert Series Webinar - BDR Do's and Dont's: Featuring Andrew Bensing...
 
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hacked
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hackedDEF CON 27 - XIAOHUIHUI - all the 4g modules could be hacked
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hacked
 
Hypervisor and VDI security
Hypervisor and VDI securityHypervisor and VDI security
Hypervisor and VDI security
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
 
E2E What\'s New In XenApp 6.5
E2E What\'s New In XenApp 6.5E2E What\'s New In XenApp 6.5
E2E What\'s New In XenApp 6.5
 
Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1
 
VMware End-User-Computing Best Practices Poster
VMware End-User-Computing Best Practices PosterVMware End-User-Computing Best Practices Poster
VMware End-User-Computing Best Practices Poster
 
Trusted Computing security _platform.ppt
Trusted Computing security _platform.pptTrusted Computing security _platform.ppt
Trusted Computing security _platform.ppt
 
Managing bitlocker with MBAM
Managing bitlocker with MBAMManaging bitlocker with MBAM
Managing bitlocker with MBAM
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
Mikrotik
MikrotikMikrotik
Mikrotik
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
 
Platform Security Summit 18: Xen Security Weather Report 2018
Platform Security Summit 18: Xen Security Weather Report 2018Platform Security Summit 18: Xen Security Weather Report 2018
Platform Security Summit 18: Xen Security Weather Report 2018
 
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
 
Introduction to chrome os
Introduction to chrome osIntroduction to chrome os
Introduction to chrome os
 
W8 client management
W8 client managementW8 client management
W8 client management
 
BAS004-1_伺服器硬體基礎_v181026
BAS004-1_伺服器硬體基礎_v181026BAS004-1_伺服器硬體基礎_v181026
BAS004-1_伺服器硬體基礎_v181026
 
Frokost seminar windows 8 februar 2013
Frokost seminar   windows 8 februar 2013Frokost seminar   windows 8 februar 2013
Frokost seminar windows 8 februar 2013
 

Kürzlich hochgeladen

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Kürzlich hochgeladen (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Windows 7 professional Vs Windows 7 enterprise

  • 1. WINDOWS 7 PRO VS WINDOWS 7 ENT A Presentation on the exceptional differences between the two Operating Systems
  • 2. Extra Features In WIN 7 Ent • BitLocker • Bitlocker To Go • Applocker • Boot from VHD • BranchCache • DirectAccess
  • 3. BitLocker Available on Win 7 Enterprise and Ultimate. It is used in Encrypting the HDD with 128bit AES encryption. It is faster than other AES encryption and has low RAM requirements since the CBC mode with a 128bit key is used for encryption. Authentication Mechanism • Transparent mode: Uses TPM chip for key storage. Releases the Key to the OS loader only if the early bootfile appears to be unmodified. Vulnerable to a ‘coldboot’ attack. • User Authentication mode: Uses the bootloader. Requires authentication to the pre-boot environment in the form of a PIN. Vulnerable to the ‘bootkit’ attack but not to ‘coldboot’ attack. • USB Key mode: Uses a USB dongle containing the startup key. BIOS must support portable USB devices at the Pre-boot OS stage. This mode is immune to ‘coldboot’ attack.
  • 4. BitLocker Recovery Modes • Recovery Password: A numerical Key protector for recovery purposes. • Recovery Key: An external Key for recovery purposes. • Certificate: Adds a certificate-based public key protector for recovery. The following Combination of Authentication modes are possible and all can be recovered using the ‘Recovery Key’ method. • TPM • TPM+PIN • TPM+PIN+USB key • TPM+USB key • USB Key Requirements 1. Two NTFS formatted volumes(one for OS and a 100MB min from which the OS boots). This can be achived using the DISKPART util or the Bitlocker Drive Preparation Tool. 2. An optional Key can be stored on the AD for recovery purpose and can be used for recover using the ‘BitLocker Recovery Password Viewer for AD users’. For server versions before 2008 the ‘Schema’ must be updated.
  • 5. BitLocker Benefits to the Business • Good Degree of safety in case of Laptop theft. • Integrated with AD directly no extra application or Add-on required. • It encrypts more than the OS partition thus ensuring max security of data. • Works on Multiboot environments. • Flexible configuration as GP can be used. Limitations • Cool boot attack while using it in the TPM mode(transparent operation mode) • Only Supported on the NTFS partision and on NT based OS(but BITLOCKER TO GO Reader can run on NTFS, FAT 32 or exFAT). • Workaround possible without TPM. • BitLocker gives the End user local admin Rights. This gives them the opportunity to turn off the encryption if desired
  • 6. AppLocker This help to prevent the use of Unknown or Unwanted application within the Network. Helps to boast security and compliance for the organisation. It is a rule based service, with 3 main rules configurable( Exec rule, Windows Installer rule, Script rule). Applocker Vs Other Solutions Restriction policies can be applied to the following. • Specific User or Group. • Default Rule Action is Deny. • Audit-only mode possible. • Wizard to create multiple rules at once. • Policy import or export. • Rule Collection available. • PowerShell Support. • Custom Error Messages.
  • 7. AppLocker Requirement • Windows Server 2008 R2. Windows 7 Ult, Windows 7 Ent(Win 7 pro can create rules but can’t enforce them.) • For GP deployment, at least one computer with the Group Policy Management Console(GPMC) or the Remote Server Administration Tools(RSAT) installed to host the Applocker rules. • Computers to enforce the Applocker rules created. Rule Conditions Rules are created either by PUBLISHER, PATH or by FILE HASH. Benefits • Increased security. • Cost of Procuring third party apps lock down application eliminated.
  • 8. Booting from VHD VHD(Virtual Hard Drive) Benefits • It can be used as a simplified backup mechanism which is also portable. • Booting from VHD helps to test new configurations and applications before final role-out. • Any Malware infection only affects the VOS and does not spread to the Main OS. • Native image deployment using Windows Deployment Service for Workstation/ Server redeployment or recovery Limitations • VHD size limited to 2TB • EFS/NTFS compression not suported • Hibernating not supported. • OS can’t be upgraded. • Cannot be nested. • Can’t be booted from a USB.
  • 9. BranchCache Caching contents of files and webservers locally at branch office, increasing the network responsiveness of centralized applications when accessed remotely. Modes of Operation • Distributed Cache. • Hosted Cache. Benefits • Reduced WAN link Utilisation in Branch offices(intranet based HTTP and SMB traffic). • Accelerates delivery of encrypted contents(HTTPS and IPSec). • Does not require additional equipment at the branch office and can be managed using GP. • Caching done by default when round trip lattency time exceeds 80ms. Limitations • Depends on the caching mode(distr requires more processing power from work stations thus performance may be affected. Hosted however combats this but requires extra hardware investment.
  • 10. DirectAccess Enables connection to the office securely through the internet without the need for a VPN. Advantages • Working outside the office is easier as there is no need for traditional VPN. • Remote Management possible(Update deployment and GP settings over the internet). • Enhanced Security and Access control. • Communicates using IPv6 over IPsec.