How Shielded VMs Protect Your Data

Size: px
Start display at page:

Download "How Shielded VMs Protect Your Data"

Transcription

1 How Shielded VMs Protect Your Data Jan Marek MVP MCC MCT MCSE MCSD Head of CDM & KPCS CZ

2

3 Traditional Security Services (AD, MSSQL, ShP) runs on physical servers OS secured (access, bitlocker with TPM) Rack secured Cages secured Containers secured Datacenter secured How to achieve that with virtual machines?

4 Virtualized System Security Services runs on virtual machines Hyper-V Secured OS Secured Rack Secured Cages Secured Datacenter Secured Fabric admins can access the data Network Storage Backup Admins = Fabric Admins

5 How to access VMs data? Local Administrator Copy VM VHD(X) Mount VHD(X) Access the data content For example ADDS DC -> bruteforce passwords against the NTDS.DIT Hyper-V Admin Connect over VMConsole and go crazy,

6 How to become domain administrator? Get access as consultant with limited privileges local administrator? Create smart batch file Save the batch file to the Run key Call the customer and request support Customer logs in with domain admin privileges Customer calls the batch file without noticing it

7 10 immutable laws of security Law #1: If a bad guy can persuade you to run his program on your computer, it's not solely your computer anymore. Law #2: If a bad guy can alter the operating system on your computer, it's not your computer anymore. Law #3: If a bad guy has unrestricted physical access to your computer, it's not your computer anymore. Law #4: If you allow a bad guy to run active content in your website, it's not your website any more. Law #5: Weak passwords trump strong security. Law #6: A computer is only as secure as the administrator is trustworthy. Law #7: Encrypted data is only as secure as its decryption key. Law #8: An out-of-date antimalware scanner is only marginally better than no scanner at all. Law #9: Absolute anonymity isn't practically achievable, online or offline. Law #10: Technology is not a panacea.

8 So how to secure the VM Define and configure Guarded Fabric Host itself can t access the VM data or vmwp processes So previously mounted VHD(X) is protected by bitlocker Bitlocker recovery key is stored in vtpm vtpm access key is stored in HGS, not on Hyper-V host Shielded VM is primarly protected by Shielding Data

9 What is the Shielding Data Data File specific for the tenant Contains many secrets owned by tenant Its uploaded to guarded fabric Fabric Admin cant decrypt the data file as it is encrypted by tenant key And then it s injected to the new VM

10 How to access Shielded VM data? Data? Data in VHD(X) are encrypted with bitlocker. Console? VMConsole is disabled. PowerShell Direct? Disabled. Guest Services? Disabled. Btw, how to manage this VM? Only using RDP or with remote management.

11 What if I trust the Fabric Admin? but still want to protect the data at the rest and on the fly? Instead of Shield the VM you can configure it for Encryption Supported mode. You can use VMConsole, PoSh Direct,

12 Existing VM What if I want to protect the existing VM? Security Concern do you really trust the existing VM that you want to Shield or Encrypt? Yes? So can do grandfathering. Convert the existing VM to Shielded.

13 What do I need? Guarded Fabric Windows Server 2016 Datacenter Code Integrity (for Attestation) [HVCI, KMCI, UMCI, Defender, Secure Boot, UEFI, TPM] Virtual Secure Mode (for memory protection) TPMv2 (for secret store, host protection) Host Guardian Service* (for attestation validation and policies) w Key Protection Service w Attestation Service w * Should be 3-node cluster (what about virtualization?) for HA. Why?

14 My host does not have a TPM Shielded VMs can be used in two attestation modes TPM-based AD-based AD-based HGS measures only the group membership of Hyper-V hosts Dedicated AD Forest required for HGS (with one-way trust to hosts forest) TPM-based mode HGS enforces rigorous attestation requirements No dedicated AD Forest required

15 Attestation AD-based attestation Modes Requirements TPM-based attestation 1. Hyper-V host hardware and software requirements? Windows Server 2016 Datacenter Edition No specific hardware requirements beyond what Hyper-V itself needs (SLAT, etc.) Windows Server 2016 Datacenter Edition Hyper-V host hardware must provide: UEFI rev. C or later Secure Boot / Measured Boot TPM v2 2. Host Guardian Service (HGS) hardware and software requirements no differences > Windows Server 2016 Server Core and up The hardware need only be able to run Windows Server 2016 Server Core and up 3. What do we measure & attest to in order to permit Shielded VMs to powered-on or to be live migrated to a new host? 4. What protections does the Shielded VM receive? 5. Which guest Operating Systems can be shielded? 6. Supports both Shielded mode and Encryption supported mode? The Hyper-V host must be a member of a designated/trusted AD group whose SID (security identifier) has been configured on HGS no differences > no differences > Yes The Hyper-V host computer s boot process including that it s using secure, measured boot The host s Operating System and drivers The host s code-integrity policy Various other aspects such as is a debuggers attached -to the host --> NOT permitted A version 2 compatible TPM UEFI firmware with secure, measured boot support Encrypted disks with secure, TPM-backed key-release Encrypted Live Migration traffic Windows 8 and later Windows Server 2012 and later Yes 7. Provide some examples of how a guarded host or a shielded VM might be attacked The AD admin is bribed or blackmailed and adds a compromised Hyper-V host to the trusted group in AD The Hyper-V admin installs malware on a Hyper-V host The HGS admin is bribed or blackmailed and weakens the attestation requirements An attacker compromises the identity of a legitimate HGS admin Hyper-V host firmware or platform attacks that enable the attacker to obtain keying material The HGS admin is bribed or blackmailed and weakens the attestation requirements An attacker compromises the identity of a legitimate HGS admin and weakens the attestation requirements An attacker abuses administrative privileges and manages to obtain guardian (private) keys or transport keys for specific shielded VMs Hyper-V host firmware or platform exploits that enable the attacker to obtain keying material

16 How does it work?

17 Can I infect the VM template? No. VM Templates use the VHD VHD is signed by trusted admin (creator) -> generates VSC This signature is packaged into the shielding data When the VM is being deployed Signature is unpackaged from the shielding data to VSM VHD signature is computed again Recomputed signature is compared with the precomputed signature If it fails, VM deployment fails

18 What is the Shielding Data? Shielding Data File. Contains VSC RDP Certificates Administrator Credentials Unattend answer file

19 Which VM can be Shielded? Generation 2 VM As we need the vtpm Guest OS Windows Server 2012 and later Windows 8 and later Linux VM - only in WS1709 and SCVMM1711 (in preview) What about Microsoft Azure VM? Not supported at this time But you can use Azure Encrypted Disk

20 How to manage Shielded VMs? No way from the Windows Server UI Only for specific steps PowerShell (only?) System Center 2016 Virtual Machine Manager (or 1711 in preview) Windows Azure Pack? Microsoft Azure Stack

21 How to monitor Shielded VMs? Windows Azure Pack? Microsoft Azure Stack System Center 2016 Operations Manager

22 Thank you!

What s New in Hyper-V 2016/1709/1803/2019

What s New in Hyper-V 2016/1709/1803/2019 What s New in Hyper-V 2016/1709/1803/2019 Jan Marek Head of CDM & ATOM Architect @ KPCS CZ MVP: Cloud and Datacenter Management MCC MCT MCSE marek@kpcs.cz www.atom.ms Agenda SAC vs. LTSC Hyper-V and System

More information

HAROLD BAELE MICROSOFT CLOUD TECHNICAL CONSULTANT MICROSOFT CERTIFIED TRAINER. New protection capabilities in Windows Server 2016

HAROLD BAELE MICROSOFT CLOUD TECHNICAL CONSULTANT MICROSOFT CERTIFIED TRAINER. New protection capabilities in Windows Server 2016 HAROLD BAELE MICROSOFT CLOUD TECHNICAL CONSULTANT MICROSOFT CERTIFIED TRAINER New protection capabilities in Windows Server 2016 HAROLD BAELE MICROSOFT CLOUD TECHNICAL CONSULTANT AND MICROSOFT CERTIFIED

More information

Hyper-V Performance Troubleshooting

Hyper-V Performance Troubleshooting Hyper-V Performance Troubleshooting Jan Marek Microsoft MVP MCC MCT MCSE MCSD Head of CDM & marek@kpcs.cz Architect @ KPCS CZ www.atom.ms www.kpcs.cz www.janmarek.eu Host (Hardware) Latest BIOS/UEFI Hardware

More information

Feature Comparison Summary

Feature Comparison Summary Feature Comparison Summary,, and The cloud-ready operating system is the cloud-ready operating system that delivers new layers of security and Azure-inspired innovation for the applications and infrastructure

More information

Feature Comparison Summary

Feature Comparison Summary Feature Comparison Summary, and The cloud-ready operating system Thanks to cloud technology, the rate of change is faster than ever before, putting more pressure on IT. Organizations demand increased security,

More information

Hardening with Hardware

Hardening with Hardware Hardening with Hardware How Windows is using hardware to improve security David dwizzzle Weston Device Security Group Manager Microsoft, Windows and Devices is not a security boundary Security boundaries

More information

Windows Server Security Guide

Windows Server Security Guide Windows Server Security Guide August 2017 Contents Windows Server 2016 Security Guide... 3 Why is Windows Server 2016 security important?... 3 How does Windows Server 2016 help prevent and detect compromise?...

More information

Windows Devices. Device Capabilities. Premium. Entry

Windows Devices. Device Capabilities. Premium. Entry Windows Devices $ Premium Entry Device Capabilities Windows 10 IoT $ Premium Windows 10 IoT Enterprise Desktop Shell, Win32 apps, Universal Windows Apps and Drivers 1 GB RAM, 16 GB Storage X86 Windows

More information

Pasiruoškite ateičiai: modernus duomenų centras. Laurynas Dovydaitis Microsoft Azure MVP

Pasiruoškite ateičiai: modernus duomenų centras. Laurynas Dovydaitis Microsoft Azure MVP Pasiruoškite ateičiai: modernus duomenų centras Laurynas Dovydaitis Microsoft Azure MVP 2016-05-17 Tension drives change The datacenter today Traditional datacenter Tight coupling between infrastructure

More information

Securing Windows Server 2016

Securing Windows Server 2016 Course 20744C: Securing Windows Server 2016 Page 1 of 7 Securing Windows Server 2016 Course 20744C: 4 days; Instructor-Led Introduction This four-day, instructor-led course teaches IT professionals how

More information

Course Outline 20744B

Course Outline 20744B Course Outline 20744B Module 1: Attacks, breach detection, and Sysinternals tools In this module, students will learn about breach detection, attack types and vectors, cybercrime, and how you can analyse

More information

Přehled novinek v Hyper-V 2016 Kamil Roman

Přehled novinek v Hyper-V 2016 Kamil Roman Přehled novinek v Hyper-V 2016 Kamil Roman Mail: IT@KamilRT.net Twitter: @KamilRT blog: ITblog.KamilRT.net 1 2 3 Rising number of organizations suffer from breaches 1 1 2 2 3 3 3 4 Shielded VMs Shielded

More information

Windows 10 and the Enterprise. Craig A. Brown Prepared for: GMIS

Windows 10 and the Enterprise. Craig A. Brown Prepared for: GMIS Windows 10 and the Enterprise Craig A. Brown Prepared for: GMIS 11-2-2015 Introduction Craig A. Brown Microsoft Practice Leader Global Knowledge MCT, Since 1996 MCSA / MCSE / NT / 2000 / 2003 MCDST MCITP:

More information

"Charting the Course... MOC C: Securing Windows Server Course Summary

Charting the Course... MOC C: Securing Windows Server Course Summary Course Summary Description This five-day, instructor-led course teaches IT professionals how they can enhance the security of the IT infrastructure that they administer. This course begins by emphasizing

More information

EXAMGOOD QUESTION & ANSWER. Accurate study guides High passing rate! Exam Good provides update free of charge in one year!

EXAMGOOD QUESTION & ANSWER. Accurate study guides High passing rate! Exam Good provides update free of charge in one year! EXAMGOOD QUESTION & ANSWER Exam Good provides update free of charge in one year! Accurate study guides High passing rate! http://www.examgood.com Exam : 70-745 Title : Implementing a Software-Defined Datacenter

More information

VMware vsphere 6.7 Update 1 Upgrade and Security Configuration

VMware vsphere 6.7 Update 1 Upgrade and Security Configuration VMware vsphere 6.7 Update 1 Upgrade and Security Configuration Author Brandon Lee Brandon Lee has been in the IT industry for over 15+ years now and has worked in various IT industries spanning education,

More information

W11 Hyper-V security. Jesper Krogh.

W11 Hyper-V security. Jesper Krogh. W11 Hyper-V security Jesper Krogh jesper_krogh@dell.com Jesper Krogh Speaker intro Senior Solution architect at Dell Responsible for Microsoft offerings and solutions within Denmark Specialities witin:

More information

70-745: Implementing a Software-Defined Datacenter

70-745: Implementing a Software-Defined Datacenter 70-745: Implementing a Software-Defined Datacenter Target Audience: Candidates for this exam are IT professionals responsible for implementing a software-defined datacenter (SDDC) with Windows Server 2016

More information

Windows Server The operating system

Windows Server The operating system Windows Server 2019 The operating system that bridges onpremises and cloud By maximizing technology and infrastructure investments with Windows Server 2019, forward-facing businesses can capture direct

More information

20745B: Implementing a Software- Defined DataCenter Using System Center Virtual Machine Manager

20745B: Implementing a Software- Defined DataCenter Using System Center Virtual Machine Manager 20745B: Implementing a Software- Defined DataCenter Using System Center Virtual Machine Manager Duration: 5 days; Instructor-led Familiarity with Windows Server and Windows Server administration An understanding

More information

Course Outline. Course Outline :: 20744A::

Course Outline. Course Outline :: 20744A:: Module Title : 20744A: Securing Windows Server 2016 Duration : 5 days Overview This five-day, instructor-led course teaches IT professionals how they can enhance the security of the IT infrastructure that

More information

Microsoft. Exam Questions Securing Windows Server 2016

Microsoft. Exam Questions Securing Windows Server 2016 Microsoft Exam Questions 70-744 Securing Windows Server 2016 NEW QUESTION 1 Note: The question is part of a series of questions th«present the same scenario. Each question In the series contains a unique

More information

[MS20744]: Securing Windows Server 2016

[MS20744]: Securing Windows Server 2016 [MS20744]: Securing Windows Server 2016 Length : 5 Days Audience(s) : IT Professionals Level : 300 Technology : Windows Server Delivery Method : Instructor-led (Classroom) Course Overview This five-day,

More information

MICHAËL BORGERS, SYSTEM ENGINEER MATTHIAS SPELIER, SYSTEM ENGINEER. Software Defined Datacenter

MICHAËL BORGERS, SYSTEM ENGINEER MATTHIAS SPELIER, SYSTEM ENGINEER. Software Defined Datacenter MICHAËL BORGERS, SYSTEM ENGINEER MATTHIAS SPELIER, SYSTEM ENGINEER Software Defined Datacenter Virtual Machine Manager 2016 SOFTWARE DEFINED DATACENTER Migration BLUE SDN RED TRANSPORT SDC SDS Legacy Hardware

More information

Technical Feature Comparison Guide

Technical Feature Comparison Guide Technical Feature Comparison Guide,, and Contents How to use this comparison guide... 2 The cloud-ready operating system... 2 editions... 4 Security... 4 Identity... 10 Compute... 15 Storage... 17 Networking...

More information

Securing Windows Server 2016

Securing Windows Server 2016 Course 20744: Securing Windows Server 2016 Page 1 of 7 Securing Windows Server 2016 Course 20744: 4 days; Instructor-Led Introduction This four-day, instructor-led course teaches IT professionals how they

More information

Let s manage agents. Tom Sightler, Principal Solutions Architect Dmitry Popov, Product Management

Let s manage agents. Tom Sightler, Principal Solutions Architect Dmitry Popov, Product Management Let s manage agents Tom Sightler, Principal Solutions Architect Dmitry Popov, Product Management Agenda Inventory management Job management Managed by backup server jobs Managed by agent jobs Recovery

More information

microsoft. Number: Passing Score: 800 Time Limit: 120 min.

microsoft. Number: Passing Score: 800 Time Limit: 120 min. 70-744 microsoft Number: 70-744 Passing Score: 800 Time Limit: 120 min Exam A QUESTION 1 This question is part of a series of question that use the same or similar answer choices. Your network contains

More information

Microsoft Securing Windows Server 2016

Microsoft Securing Windows Server 2016 1800 ULEARN (853 276) www.ddls.com.au Length 5 days Microsoft 20744 - Securing Windows Server 2016 Price $4290.00 (inc GST) Version B Overview This five-day, instructor-led course teaches IT professionals

More information

20744: Securing Windows Server Sobre o curso. Microsoft. Nível: Avançado Duração: 35h

20744: Securing Windows Server Sobre o curso. Microsoft. Nível: Avançado Duração: 35h 20744: Securing Windows Server 2016 Microsoft Nível: Avançado Duração: 35h Sobre o curso This five-day, instructor-led course teaches IT professionals how they can enhance the security of the IT infrastructure

More information

CMB-207-1I Citrix Desktop Virtualization Fast Track

CMB-207-1I Citrix Desktop Virtualization Fast Track Page1 CMB-207-1I Citrix Desktop Virtualization Fast Track This fast-paced course covers select content from training courses CXA-206: Citrix XenApp 6.5 Administration and CXD-202: Citrix XenDesktop 5 Administration

More information

Windows Server 2016 Tomorrow s operating system, today. Licensing & feature comparison guide.

Windows Server 2016 Tomorrow s operating system, today. Licensing & feature comparison guide. 2016 Tomorrow s operating system, today. Licensing & feature comparison guide. Contents 10 reasons you ll love 2016 4 Product overview 6 Feature differentiation and core-based pricing 7 Core-based licensing

More information

Backup, File Backup copies of individual files made in order to replace the original file(s) in case it is damaged or lost.

Backup, File Backup copies of individual files made in order to replace the original file(s) in case it is damaged or lost. Glossary A Active Directory a directory service that inventories, secures and manages the users, computers, rules and other components of a Microsoft Windows network. This service is typically deployed

More information

Securing Windows Server 2016 (20744)

Securing Windows Server 2016 (20744) Securing Windows Server 2016 (20744) Duration: 5 Days Price: $895 Delivery Option: Attend via MOC On-Demand Students Will Learn Securing Windows Server Protecting credentials and implement privileged access

More information

Azure File Sync. Webinaari

Azure File Sync. Webinaari Azure File Sync Webinaari 12.3.2018 Agenda Why use Azure? Moving to the Cloud Azure Storage Backup and Recovery Azure File Sync Demo Q&A What is Azure? A collection of cloud services from Microsoft that

More information

COURSE OUTLINE IT TRAINING

COURSE OUTLINE IT TRAINING CMB-207-1I Citrix XenApp and XenDesktop Fast Track Duration: 5 days Overview: This fast-paced course covers select content from training courses CXA-206 and CXD- 202 and provides the foundation necessary

More information

NE Infrastructure Provisioning with System Center Virtual Machine Manager

NE Infrastructure Provisioning with System Center Virtual Machine Manager NE-10981 Infrastructure Provisioning with System Center Virtual Machine Manager Summary Duration 5 Days Audience IT Professionals Level 400 Technology Microsoft System Center 2012 Delivery Method Instructor-led

More information

Technical Feature Comparison Guide

Technical Feature Comparison Guide Technical Feature Comparison Guide,, and Contents How to use this comparison guide... 2 The cloud-ready operating system... 2 editions... 4 Security... 4 Identity... 10 Compute... 15 Storage... 20 Networking...

More information

Implementing a Software-Defined DataCenter

Implementing a Software-Defined DataCenter Course 20745: Implementing a Software-Defined DataCenter Page 1 of 6 Implementing a Software-Defined DataCenter Course 20745: 4 days; Instructor-Led Introduction This four-day course explains how to implement

More information

Key Threats Melissa (1999), Love Letter (2000) Mainly leveraging social engineering. Key Threats Internet was just growing Mail was on the verge

Key Threats Melissa (1999), Love Letter (2000) Mainly leveraging social engineering. Key Threats Internet was just growing Mail was on the verge Key Threats Internet was just growing Mail was on the verge Key Threats Melissa (1999), Love Letter (2000) Mainly leveraging social engineering Key Threats Code Red and Nimda (2001), Blaster (2003), Slammer

More information

Hypervisor Security First Published On: Last Updated On:

Hypervisor Security First Published On: Last Updated On: First Published On: 02-22-2017 Last Updated On: 05-03-2018 1 Table of Contents 1. Secure Design 1.1.Secure Design 1.2.Security Development Lifecycle 1.3.ESXi and Trusted Platform Module 2.0 (TPM) FAQ 2.

More information

10 hidden Hyper-V features you should know about!

10 hidden Hyper-V features you should know about! 10 hidden Hyper-V features you should know about! Thomas Maurer Technology Lead at itnetx Microsoft MVP @ThomasMaurer www.thomasmaurer.ch Thomas Maurer Technology Lead @ itnetx MCSE Private Cloud MCSE

More information

Infrastructure Provisioning with System Center Virtual Machine Manager

Infrastructure Provisioning with System Center Virtual Machine Manager Infrastructure Provisioning with System Center Virtual Machine Manager Course Details Duration: Course code: 5 Days M10981 Overview: Learn how to install and configure Microsoft System Center 2012 R2 Virtual

More information

Circle IT: Microsoft Update 2016

Circle IT: Microsoft Update 2016 Circle IT: Microsoft Update 2016 Microsoft Infrastructure Technologies Pritam Pabla Technology Solutions Specialist Hybrid Cloud v-pritap@microsoft.com Agenda Windows Server 2016 New Features & Enhancements

More information

Forest Active Directory Schema Snap In 2008 R2

Forest Active Directory Schema Snap In 2008 R2 Forest Active Directory Schema Snap In 2008 R2 Missing When existing class and attribute definitions in the Active Directory schema do not meet In Windows Server 2008 and Windows Server 2008 R2, the directory

More information

TestOut Server Pro 2016: Install and Storage English 4.0.x LESSON PLAN. Revised

TestOut Server Pro 2016: Install and Storage English 4.0.x LESSON PLAN. Revised TestOut Server Pro 2016: Install and Storage English 4.0.x LESSON PLAN Revised 2018-01-30 2 Table of Contents Introduction Section 1.1: Windows as a Server... 5 Section 1.2: Windows Server 2012 Interface

More information

Session objectives and takeaways

Session objectives and takeaways Session objectives and takeaways Objectives Explain SDN Core Concepts Deploy SDN Fabric with SCVMM 2016 Takeaways: Deploying SDN Fabric components with SCVMM requires planning Deploying Tenant Resources

More information

Securing Windows Server 2016 (20744)

Securing Windows Server 2016 (20744) Securing Windows Server 2016 (20744) Formato do curso: Presencial Localidade: Lisboa Data: 13 Mai. 2019 a 17 Mai. 2019 Preço: 1670 Horário: Laboral - das 09h30 às 17h30 Duração: 35 horas This five-day,

More information

MCSA Windows Server A Success Guide to Prepare- Microsoft Upgrading Your Skills to MCSA Windows Server edusum.

MCSA Windows Server A Success Guide to Prepare- Microsoft Upgrading Your Skills to MCSA Windows Server edusum. 70-417 MCSA Windows Server 2012 A Success Guide to Prepare- Microsoft Upgrading Your Skills to MCSA Windows Server 2012 edusum.com Table of Contents Introduction to 70-417 Exam on Upgrading Your Skills

More information

Scvmm 2012 Install Virtual Guest Services. Manually >>>CLICK HERE<<<

Scvmm 2012 Install Virtual Guest Services. Manually >>>CLICK HERE<<< Scvmm 2012 Install Virtual Guest Services Manually SCVMM 2012 R2 - Installing Virtual Switch Fails with Error 2916 Ensure that the Windows Remote Management (WinRM) service and the VMM agent are installed

More information

MICROSOFT VIRTUAL MACHINE CONVERTER

MICROSOFT VIRTUAL MACHINE CONVERTER VERSION 2.0 Overview Free to download tool Standalone tool supporting Hyper-v 2012 R2 and VSphere 5.5 and above Converts VMWare virtual Machines to hyper-v with additional functionality which includes

More information

Windows Server 2012/R2 Overview

Windows Server 2012/R2 Overview END OF LICENSE Windows Server 2012/R2 Overview December 31 st, 2017 Agenda Understanding the opportunity Win with Windows Server 2016 Next steps Understanding the opportunity Windows Server 2012/R2 End

More information

Implementing a Software-Defined DataCenter (20745)

Implementing a Software-Defined DataCenter (20745) Implementing a Software-Defined DataCenter (20745) Duration: 5 Days Price: $895 Delivery Option: Attend via MOC On-Demand Students Will Learn Explaining the different virtualization options Installing

More information

Install Virtual Guest Services Greyed Out Vmm 2012

Install Virtual Guest Services Greyed Out Vmm 2012 Install Virtual Guest Services Greyed Out Vmm 2012 Forum overview for "Virtual Machine Manager General" forum on TechNet forums When I try to install the DHCPExten I receive this error:"there is a problem

More information

Desktop features placemat

Desktop features placemat Desktop features placemat Home Pro Enterprise Existing Differentiated Features in Win7 /Win8.1 Domain Join and Group Policy Management Existing Win7 / Win 8.1 Enterprise features Windows 10: Management

More information

Workshop on Windows Server 2012

Workshop on Windows Server 2012 Workshop on Windows Server 2012 Topics covered on Workshop DHCP Scope Splitting. A Dynamic Host Configuration Protocol (DHCP) split-scope configuration using multiple DHCP servers allows for increased

More information

Windows 8 Boot Camp 6439; 5 Days, Instructor-led

Windows 8 Boot Camp 6439; 5 Days, Instructor-led Windows 8 Boot Camp 6439; 5 Days, Instructor-led Course Description: In an intensive and immersive hands-on learning environment, you will build the skills needed configure, manage, and maintain a Windows

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

Installing and Configuring Windows 10 (698)

Installing and Configuring Windows 10 (698) Installing and Configuring Windows 10 (698) Implement Windows Prepare for installation requirements Determine hardware requirements and compatibility; choose between an upgrade and a clean installation;

More information

Exam Objectives for MCSA Installation, Storage, and Compute with Windows Server 2016

Exam Objectives for MCSA Installation, Storage, and Compute with Windows Server 2016 Exam Objectives for MCSA 70-740 Installation, Storage, and Compute with Windows Server 2016 The Windows Server 2016 70-740 Exam is articulated around six main exam objectives. As per below table these

More information

Futures: Windows Server and System Center in the Datacenter

Futures: Windows Server and System Center in the Datacenter Futures: Windows Server and System Center in the Datacenter Daniel Lai (MCITP:Virtualization MCSE:Private Cloud VCP:vSphere 5.1 Datacenter Virtualization VCA:Workforce Mobility, Datacenter Virtualization,

More information

Microsoft Windows Server 2016 for Dell EMC PowerEdge Systems. Important Information Guide

Microsoft Windows Server 2016 for Dell EMC PowerEdge Systems. Important Information Guide Microsoft Windows Server 2016 for Dell EMC PowerEdge Systems Important Information Guide Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your

More information

Microsoft Windows Server 2019 for Dell EMC PowerEdge Servers. Release Notes

Microsoft Windows Server 2019 for Dell EMC PowerEdge Servers. Release Notes Microsoft Windows Server 2019 for Dell EMC PowerEdge Servers Release Notes Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION:

More information

Microsoft Azure Stack Hybrid Cloud. The Modern System Architecture

Microsoft Azure Stack Hybrid Cloud. The Modern System Architecture Microsoft & itnetx 2017 Microsoft Azure Stack Hybrid Cloud. The Modern System Architecture Uwe Lüthy PTS at Microsoft www.microsoft.com Thomas Maurer Solution Architect at itnetx Microsoft MVP / P-TSP

More information

Securing Windows Server 2016

Securing Windows Server 2016 Securing Windows Server 2016 Duration: 5 Days Course Code: M20744 Version: C Delivery Method: Elearning (Self-paced) Overview: This five-day, instructor-led course teaches IT professionals how they can

More information

[MS10992]: Integrating On-Premises Core Infrastructure with Microsoft Azure

[MS10992]: Integrating On-Premises Core Infrastructure with Microsoft Azure [MS10992]: Integrating On-Premises Core Infrastructure with Microsoft Azure Length : 3 Days Audience(s) : IT Professionals Level : 300 Technology : Azure Delivery Method : Instructor-led (Classroom) Course

More information

microsoft. Number: Passing Score: 800 Time Limit: 120 min.

microsoft. Number: Passing Score: 800 Time Limit: 120 min. 70-744 microsoft Number: 70-744 Passing Score: 800 Time Limit: 120 min Exam A QUESTION 1 This question is part of a series of question that use the same or similar answer choices. Your network contains

More information

Pritam Pabla Technology Solutions Specialist Hybrid Cloud

Pritam Pabla Technology Solutions Specialist Hybrid Cloud Pritam Pabla Technology Solutions Specialist Hybrid Cloud v-pritap@microsoft.com Business Landscape Velocity Complexity Costs Processes Changing world of business Market Trends Accelerating shift to cloud

More information

Upgrading Your Skills to MCSA Windows 8

Upgrading Your Skills to MCSA Windows 8 Course 20689D: Upgrading Your Skills to MCSA Windows 8 Course Details Course Outline Module 1: Windows 8.1 in an Enterprise Network Environment This module explains how the features and related solutions

More information

Windows Server Windows Server Windows Server 2008

Windows Server Windows Server Windows Server 2008 2003 2008 2012 Hardware Innovation X86 Symmetric Multi-Processor (SMP) s Affordable servers for the masses Software Innovation Window 2003 SQL 2005 Exchange 2003 Hardware Innovation X64 s Multi-Core s

More information

This video is part of the Microsoft Virtual Academy.

This video is part of the Microsoft Virtual Academy. This video is part of the Microsoft Virtual Academy. 1 In this session we re going to talk about building for the private cloud using the Microsoft deployment toolkit 2012, my name s Mike Niehaus, I m

More information

Securing Windows Server 2016

Securing Windows Server 2016 Securing Windows Server 2016 Varighed: 5 Days Kursus Kode: M20744 Beskrivelse: This five-day, instructor-led course teaches IT professionals how they can enhance the security of the IT infrastructure that

More information

Pass-the-Hash Attacks

Pass-the-Hash Attacks Pass-the-Hash Attacks Mgr. Michael Grafnetter www.dsinternals.com Agenda PtH Attack Anatomy Mitigation Proactive Reactive Windows 10 + Windows Server 2016 Microsoft Advanced Threat Analytics PtH Attack

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

Upgrading Your Skills to MCSA Windows 8 by Hikmat Nomat with 111 q

Upgrading Your Skills to MCSA Windows 8 by Hikmat Nomat with 111 q Upgrading Your Skills to MCSA Windows 8 by Hikmat Nomat with 111 q Number: 70-689 Passing Score: 700 Time Limit: 120 min File Version: 1.2 http://www.gratisexam.com/ Upgrading Your Skills to MCSA Windows

More information

Windows 10 Security & Audit

Windows 10 Security & Audit Windows 10 Security & Audit John Tannahill, CA, CISM, CGEIT, CRISC, CSX-P jtannahi@rogers.com Windows 10 Editions Home Pro Enterprise Education Mobile IoT Editions 1 Windows 10 Builds Windows 10 (initial

More information

Implementing Microsoft Azure Infrastructure Solutions

Implementing Microsoft Azure Infrastructure Solutions Implementing Microsoft Azure Infrastructure Solutions OD20533C; On-Demand, Video-based Course Description This course is intended for IT professionals who are familiar with managing on-premises IT deployments

More information

Big and Bright - Security

Big and Bright - Security Big and Bright - Security Big and Bright Security Embedded Tech Trends 2018 Does this mean: Everything is Big and Bright our security is 100% effective? or There are Big security concerns but Bright solutions?

More information

Securing Privileged Access Securing High Value Assets Datacenter Security Information Protection Information Worker and Device Protection

Securing Privileged Access Securing High Value Assets Datacenter Security Information Protection Information Worker and Device Protection Securing Privileged Access Securing High Value Assets Datacenter Security Information Protection Information Worker and Device Protection Azure Active Directory 3 rd Party IaaS IaaS Rights Management Services

More information

What s really new in Windows 10?

What s really new in Windows 10? Sami Laiho Senior Technical Fellow, MVP Adminize.com / Win-fu.com sami@adminize.com BLOG.WIN-FU.COM @samilaiho What s really new in Windows 10? Configuration Manager Forgive my English When most get Administrator

More information

The Ultimate Windows 10 Hardening Guide: What to Do to Make Hackers Pick Someone Else

The Ultimate Windows 10 Hardening Guide: What to Do to Make Hackers Pick Someone Else The Ultimate Windows 10 Hardening Guide: What to Do to Make Hackers Pick Someone Else Paula Januszkiewicz CQURE: CEO, Penetration Tester CQURE Offices: New York, Dubai, Warsaw MVP: Enterprise Security,

More information

GSE/Belux Enterprise Systems Security Meeting

GSE/Belux Enterprise Systems Security Meeting MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. 1 In the news Microsoft Exposes Scope of Botnet Threat By Tony Bradley, October 15, 2010 Microsoft's

More information

The Balabit s Privileged Session Management 5 F5 Azure Reference Guide

The Balabit s Privileged Session Management 5 F5 Azure Reference Guide The Balabit s Privileged Session Management 5 F5 Azure Reference Guide March 12, 2018 Abstract Administrator Guide for Balabit s Privileged Session Management (PSM) Copyright 1996-2018 Balabit, a One Identity

More information

IMPLEMENTING MICROSOFT CREDENTIAL GUARD FOR ISO 27001, PCI, AND FEDRAMP

IMPLEMENTING MICROSOFT CREDENTIAL GUARD FOR ISO 27001, PCI, AND FEDRAMP IMPLEMENTING MICROSOFT CREDENTIAL GUARD FOR ISO 27001, PCI, AND FEDRAMP North America Latin America Europe 877.224.8077 info@coalfire.com coalfire.com Coalfire sm and CoalfireOne sm are registered service

More information

5nine Cloud Security for Hyper-V. Version 6.0

5nine Cloud Security for Hyper-V. Version 6.0 5nine Cloud Security for Hyper-V Version 6.0 July 2015 2015 5nine Software All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced,

More information

Microsoft MCSE Exam

Microsoft MCSE Exam Microsoft MCSE 70-414 Exam Vendor:Microsoft Exam Code: 70-414 Exam Name: Implementing an Advanced Server Infrastructure www.ensurepass.com/70-414.html QUESTION 1 Your network contains an Active Directory

More information

Implementing a Software Defined Datacenter

Implementing a Software Defined Datacenter Implementing a Software Defined Datacenter Duration: 5 Days Course Code: M20745 Version: B Overview: This five-day course explains how to implement and manage virtualization infrastructure in a software-defined

More information

Microsoft Implementing a Software-Defined DataCenter

Microsoft Implementing a Software-Defined DataCenter 1800 ULEARN (853 276) www.ddls.com.au Microsoft 20745 - Implementing a Software-Defined DataCenter Length 5 days Price $4290.00 (inc GST) Version A Overview This five-day course explains how to implement

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

Deploy and Configure Microsoft LAPS. Step by step guide and useful tips

Deploy and Configure Microsoft LAPS. Step by step guide and useful tips Deploy and Configure Microsoft LAPS Step by step guide and useful tips 2 Table of Contents Challenges today... 3 What is LAPS... 4 Emphasis and Tips... 5 How LAPS Work... 6 Components... 6 Prepare, Deploy

More information

Exam

Exam Exam 70-697 Number: 70-697 Passing Score: 800 Time Limit: 120 min File Version: 8.0 Exam Microsoft Exam 70-697 Configuring Windows Devices Exam A QUESTION 1 You are setting up a Windows 10 Enterprise computer.

More information

Course Overview This five-day course will provide participants with the key knowledge required to deploy and configure Microsoft Azure Stack.

Course Overview This five-day course will provide participants with the key knowledge required to deploy and configure Microsoft Azure Stack. [MS20537]: Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack Length : 5 Days Audience(s) : IT Professionals Level : 300 Technology : Azure Delivery Method : Instructor-led (Classroom)

More information

Microsoft Windows Exam Objectives

Microsoft Windows Exam Objectives Microsoft Windows Exam 70-698 s The following correlates the objectives for Microsoft Windows Exam 70-698 (Installing and Configuring Windows 10) to the chapters and sections where they are covered in

More information

Planning and Operating Azure Stack. How to handle a unicorn?

Planning and Operating Azure Stack. How to handle a unicorn? Planning and Operating Azure Stack How to handle a unicorn? Jakob Gottlieb Svendsen @JakobGSvendsen 10 years in Automation Consultancy Principal Consultant & Chief Developer 15+ years in IT Co-Founder

More information

Securing Containers Using a PNSC and a Cisco VSG

Securing Containers Using a PNSC and a Cisco VSG Securing Containers Using a PNSC and a Cisco VSG This chapter contains the following sections: About Prime Network Service Controllers, page 1 Integrating a VSG into an Application Container, page 4 About

More information

Presented by. Steven Audis. Microsoft Education Technology Advisor

Presented by. Steven Audis. Microsoft Education Technology Advisor Presented by Steven Audis Microsoft Education Technology Advisor More Pressure than Ever on IT Technology Change Regulatory Compliance Competition Security Cost Reduction Keep Business Up & Running Customer

More information

Deploying Secure Boot: Key Creation and Management

Deploying Secure Boot: Key Creation and Management presented by Deploying Secure Boot: Key Creation and Management UEFI Summer Summit July 16-20, 2012 Presented by Arie van der Hoeven (Microsoft Corporation) Updated 2011-06-01 1 Agenda Introduction Secure

More information

Securing Containers Using a PNSC and a Cisco VSG

Securing Containers Using a PNSC and a Cisco VSG Securing Containers Using a PNSC and a Cisco VSG This chapter contains the following sections: About Prime Network Service Controllers, page 1 Integrating a VSG into an Application Container, page 3 About

More information

Active Directory Attacks and Detection

Active Directory Attacks and Detection Active Directory Attacks and Detection #Whoami Working as an Information Security Executive Blog : www.akijosberryblog.wordpress.com You can follow me on Twitter: @AkiJos This talk is Based on Tim Madin

More information

4.1. Virtualization. Virtualization provides the following benefits:

4.1. Virtualization. Virtualization provides the following benefits: 4.1. Virtualization Virtualization is using software to emulate one or more physical computers on a single platform. You should be familiar with the following types of virtualization: Server virtualization

More information