Preview

Executive Summary the Microsoft Information Technology (Microsoft It) Group Needed an Antivirus Solution to Adequately Address the Growing Threat from the Many Types of Internet-Borne Malicious Software, Also Known as

Good Essays
Open Document
Open Document
470 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Executive Summary the Microsoft Information Technology (Microsoft It) Group Needed an Antivirus Solution to Adequately Address the Growing Threat from the Many Types of Internet-Borne Malicious Software, Also Known as
EXECUTIVE SUMMARY
The Microsoft Information Technology (Microsoft IT) group needed an antivirus solution to adequately address the growing threat from the many types of Internet-borne malicious software, also known as malware. When Microsoft IT assessed its requirements for an enterprise anti-malware solution, the group realized the challenge of the ever-changing landscape of client security. Centralized management, rapid reporting, and a positive user experience for clients were some features that Microsoft IT sought in a client security solution.
A product group within Microsoft consulted with the security staff of Microsoft IT for the initial development of a new anti-malware solution, Microsoft® Forefront™ Client Security. As the new product emerged, Microsoft IT volunteered to test it, first in a lab environment, and then in an enterprise production environment.
Microsoft IT developed and tested a server management group for administering the new system. Testing revealed that the server choices more than sufficed, but they required more advanced storage. For this reason, the server management group attached to a storage area network (SAN) for use by data collection and reporting services.
Lab testing was successful, so Microsoft IT rolled out the solution into a production environment in a limited-participant pilot. The initial pilot was successful, and soon 10,000 participants were using the product. The ability to quickly see reports on the security status of all participating clients quickly facilitated executive queries. Moreover, a centralized console simplified client management. If a report on the console alerted Microsoft IT security staff to a misconfiguration that exposed a vulnerability or a possible malware infection, the team could easily resolve the issue. The team could quickly move through console reports and remotely correct the misconfiguration. Or, the team could initiate an anti-malware scan on the client computer without involving the

You May Also Find These Documents Helpful

  • Best Essays

    Aircraft Solutions

    • 2805 Words
    • 12 Pages

    As Aircraft Solutions takes the next step in its growth, it is imperative that its IT infrastructure keep pace as to not counteract gains made by the company during this expansion. This is especially important given it designs and fabricates components for both commercial and defense related industry. Given the increase in staff as well as outside vendors accessing the network, a more centralized approach to antivirus protection has to be adopted. It is equally important that certain elements within the network that have been done manually, such as Access Control List policy, be automated to avoid consuming the IT department in an ever escalating bar of employee hours.…

    • 2805 Words
    • 12 Pages
    Best Essays
  • Satisfactory Essays

    In this assignment we are asked to identify the major threats and security concepts from a whitepaper located on the internet: http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdf. This report stated that: “There are a number of recent and growing trends in the threat activity landscape that were observed by Symantec in 2009.” These threats are identified as:…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

     Importance • Significant amount of supplemental information IS4799 Information Systems and Cybersecurity Capstone Project © ITT Educational Services, Inc. All rights reserved. Page 4 Key Concepts  Clarification • Additional information to clarify RFP contents…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Better Essays

    The CIO has requested that we follow up with a plan that is detailing a strategy for addressing all risks identified in the previous research. This plan needs to identify controls in administration, preventative, detective and corrective. With this data, the business will be able to mitigate each risk that we identified earlier. The following paper will explain the approach to correcting the various malware.…

    • 1122 Words
    • 4 Pages
    Better Essays
  • Better Essays

    The review results were positive with a suggestion for an improvement. The team found that RedSeal product provides the intelligence necessary to improve defenses, maintain continuous compliance and mitigate real-world risks by identifying the available paths of access and exposed vulnerabilities present across a network (Stephenson, 2012). The RedSeal solution is either a hardware appliance or software product and is architected for a fast and efficient means of implementing the system (Stephenson, 2012). The design will provide the most secure, scalable, and dependable deployment possible (Stephenson, 2012). Continuous monitoring focuses on correlating IT, network, and vulnerability feeds (Stephenson, 2012). The system identifies risk associated with the business’s security effectiveness as opposed to policy and compliance driven tools (Stephenson, 2012). RedSeal provides a large library of supported vendor products, allowing security and vulnerability data to be quickly and easily imported into the system. The system automatically builds network maps and correlates the map data with configuration and vulnerability data, which creates a threat reference library. RedSeal finds and eliminates gaps in businesses security controls and prioritizes the impact of those gaps. RedSeal is not an assessment or audit tool, but it does correlate risk to various controls for compliance regulations, creating reports that show gaps in deployed configurations/controls (Stephenson, 2012). The team would have liked to have seen more integration with governance, risk, and compliance solutions (Stephenson, 2012). The product only provided a piece of the risk picture. The piece is important, and one that a number of assessment and audit driven tools do not deliver and could leverage (Stephenson,…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Mia Mccain Cook

    • 901 Words
    • 4 Pages

    Networking and Telecommunications Virus and Malware Eradication Administrative and Support Services Security Policies and Implementation Project Management and Ethics System Forensics and Investigation…

    • 901 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    NT2580 Introduction to Information Security Unit 2 Application of Security Countermeasures to Mitigate Malicious Attacks © ITT Educational Services, Inc. All rights reserved. Learning Objective Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 4

    • 1878 Words
    • 8 Pages

    Organizations invest a large portion of their information technology budgets on security applications and services, such as antivirus software, firewalls, and encryption. But no matter how much security hardware or software you deploy, how tightly you control the rights of users, or carefully you configure security permissions on your data, you should not consider the job complete unless you have a well-defined, timely auditing strategy to track the effectiveness of your defenses and identify attempts to circumvent them.…

    • 1878 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    - Endpoint security market in constant growth : lots of customers agree to pay an expensive software if it’s very efficient, because the number of malicious programs is increasing and they want to have a total protection…

    • 872 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Sonicwall

    • 1842 Words
    • 8 Pages

    High performance security engine Integrated intrusion prevention Advanced IPSec and SSL VPN Streamlined GUI and advanced management wizards Application intelligence, control and visualization Dual-band wireless Content/URL filtering Gateway Anti-Virus and Anti-Spyware Service Comprehensive Anti-Spam Service Multiple security zones WAN/ISP redundancy and failover Comprehensive centralized management Enforced Client Anti-Virus…

    • 1842 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Microsoft wanted to decrease lab space server and bring together a new level of controlling and funding competence. The facility needed to be both competent and flexible adequate to support the inquiry and improvement request of the diverse invention sets, reason why Microsoft put up a high capacity that come across the needs of the inquiry and development to host the private clouds that offer infrastructure as a service (IaaS). This technology strategy diminished the track of on campus lab space, reduced the power consumption, reduce the number of physical systems and the amount of resources required to manage them (this is done by virtualization).…

    • 4922 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    A SAN's architecture works in a way that makes all storage devices available to all servers on a LAN or WAN. As more storage devices are added to a SAN, they too will be accessible from any server in the larger network. In this case, the server merely acts as a pathway between the end user and the stored data. Because stored data does not reside directly on any of a network's servers, server power is utilized for business applications, and network capacity is released to the end user.…

    • 632 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Computer Fraud and Crimes

    • 1013 Words
    • 5 Pages

    amounts of memory being used and the file usage if something is going on that…

    • 1013 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Managing the Virus Hunters

    • 1557 Words
    • 7 Pages

    Symantec Corp. is a security software company, best known for its Norton antivirus. Founded in 1982 by Gary Hendrix, it is the market leader in security software. Its headquarters are located in Mountain View, California, U.S. and the company operates worldwide. Symantec hires over 18,000 employees and customers all around the globe. Their Response Lab, in Santa Monica, California, is called the “dirtiest network at Symantec” and is the place where the virus-hunters hunt for new computer viruses.…

    • 1557 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Suneel

    • 3434 Words
    • 14 Pages

    No matter how useful antivirus software can be, it can sometimes have drawbacks. Antivirus software can impair a computer's performance. Inexperienced users may also have problems understanding the prompts and decisions that antivirus software presents them with. An incorrect decision may lead to a security breach. If the antivirus software employs heuristic detection, success depends on achieving the right balance between false positives and false negatives. False…

    • 3434 Words
    • 14 Pages
    Powerful Essays

Related Topics