Latest Security Updates in different OSes


    Latest Security Updates in different OS

    Latest Security Enhancements in windows Vista

    Following are few of the latest updates, which has been carried out in the current type of windows Vista:

    1. Windows Vista has recently more confined its sandbox for marked applets.

    2. A client can now have pretty less privilege as compared to if he was availing another Windows operating system.

    3. For demonstration, on another operating system than Windows Vista, a client is provoked with a protection alert dialog-box, which he should respond while running a marked applet. If you click ‘Yes’, the applet will enjoy whole authorizations to sprint on your PC. This encompasses consent to write or remove a document from that localized disk.

    4. It is not truer on Windows Vista, because entire authorizations are restricted to the level of Java Applet, not to the Windows level. The reason is that a method running on internet explorer has a reduced integrity grade, so it won’t be adept to write or remove a document from some high or medium integrity grade directory.

    5. A marked JNLP submission can only be run with intermediate integrity. Yielding whole authorizations into a ‘Java Web Start’ submission, just allows the Protection Administrator to permit procedures, which it would else refute via flinging protection exceptions. There is no way that it will increase the authorizations that a client or a method may have on PC.

    Latest Security Enhancements in Windows 7

    Established on the protective bases of Windows Vista, Win 7 answers to clientele response in order to make the scheme more working and administrable. So, it comprises right security updates to assist battle the constantly developing risk landscape. The latest security updates made in windows 7 have been categorized into 4 different sections, which are as under:

    1. Necessarily Protected Platform

    Windows 7 establishes upon the large protective updates leading the way in Windows Vista and answers to clientele response in order to make the scheme more functional and administrable. Some of the latest updates made in this section include improved auditing, streamlined UAC, protection gadget support, protection improved storage gadgets, integrated fingerprint readers and logon, enhanced smart card support.

    2. Serving to Protect Anywhere Access

    Windows 7 presents befitting protection controls in order that users can get access to the data they require to be creative, when they require it, even if they are in the agency or not. DNSSec support, more than one active firewall policies and Direct Access are some of the latest updates made in this section so far.

    3. Protecting Users and Infrastructure

    Windows 7 presents lenient protection defense contrary to the intrusions and malware in order that the users can accomplish their yearned balance flanked by the protection, command and output. Some of the latest updates made in this section are App Locker and IE 8.

    4. Protecting Data from Unauthorized Viewing

    Windows 7 expands the trade-marked version of Bit Locker Drive Encryption to assist defending facts and numbers retained on the portable media for example, USB portable HDDs and USB flash drives, in a way that just verified clients can give facts and numbers a read, though the media is thieved, lost, or abused. One of the other latest security enhancements in this category apart from the Bit Locker is Bit Locker to go.

    Latest Security Enhancements in Windows 2008

    This sheet registers protection-oriented characteristics, goods, and merchandised suites, which carry altered considerably or are latest in Windows Server 2008 functioning scheme. Links to comprehensive data concerning these alterations are supplied where existing.

    Latest improvements in Security and protection section

    Following are some of the latest enhancements that have been carried out into the security and protection section of windows 2008:

    1. Protection enhancements to the "kernel"

    a. Kernel patch defense for 64-bit versions

    b. Protection enhancements to the mound administrator

    c. Protection enhancements to the registry

    d. Code integrity

              e. Content implementation deterrence

              f. Address space design randomization

              g. Win resource security

    2. Security improvements to Windows services

              a. Win service strengthening

              b. Session 0 separation

              c. Named pipe strengthening

    3. Win integrity system

    4. Win IE 7

              a. Protected mode

              b. Comprehensive Corroboration SSL certificates

              c. IE management Kit 7

              d. Extensive log in structural design

              e. Cryptography next generation

              f. Authorization procedure enhancements

    5. Win execution of the Kerberos protocol

    6. SSL or TLS cryptographic improvements

    Intimidation & Susceptibilities Alleviation

    1. Server function protection configuration

    2. Server central setting up alternative

    3. Client account management

    4. Web server – IIS – function

    5. Backup and retrieval

    Network and Edge Security

    1. Windows Firewall with enhanced protection

    2. Network Policy & access Services function

              a. Network plan server

              b. Network access security

              c. Remote & routing access

    Protected configuration evaluation and administration

    1. Protection auditing

    2. Server protection principle administration

    3. Protection configuration wizard

    4. Authentication administrator

    5. Group plan

    6. AD Domain Services

              a. Fine-grained password plans

              b. Auditing

    Identity & get access to control

    1. 802.1X authorized connection and wireless access

    2. Smart cards

    3. Backup and refurbish of retained client titles and passwords

    4. Data protection service provider and lone sign-in for Terminal Services log in

    5. Preceding log in data

    Access Control

    1. Access command client interface

    2. Trusted Installer SID

    3. Confined SIDs verifications

    4. Content scheme namespace alterations

    5. Default authorizations alters

    6. Alterations to tokens

    7. Integrity scales

    8. Icacls command-line app

    9. Owner Rights SID

    Data Security

    1. Bit Locker Drive Encryption

    2. Encrypting data scheme

    3. AD Certificate Services

              a. Cryptography next generation

              b. Live certificate grade protocol

              c. Network gadget staffing service

              d. Web staffing

              e. Policy configurations

              f. Confined staffing agent

              g. Project PKI snap-in

    4. AD domain services

    5. AD rights administration services

    Who is actually involved in such alterations?

    The next assemblies may be involved in such alterations:

    1. IT administrators

    2. Mechanism designers

    3. Protection designers

    4. Mechanism managers

    5. Desktop managers &

    6. IT generalists

    Regards Sharath Reddy