Windows XP - Support Stops On 8 April 2014
Windows XP - Support Stops On 8 April 2014
Windows XP Support
stops on 8. April 2014
Elements to a Secure Environment Becoming
Resilient Towards Modern Cyberthreats
Protect
Threat
Information
Contain
Detect
Response
Recover
02
03
25.0
20.0
15.0
Windows XP SP2
10.0
Windows XP SP3
5.0
Windows 7 RTM
Windows 7 SP1
0.0
1H10
2H10
Kernel improvements:
Recent versions of Windows include
a number of security-related improvements to the Windows kernel,
making it harder for cybercriminals
to use standard hacking techniques,
such as exploiting buffer overflows
or predict memory location of code.
Real-Time Malware Protection:
In Windows 8, Windows Defender
provides real-time protection against
malware and potentially unwanted
software out of the box.
BitLocker Drive Encryption:
Introduced in Windows Vista, BitLocker Drive Encryption enables users and administrators to encrypt entire hard drives, protecting data on
lost or stolen computers from unauthorized access. Windows 7 introduced BitLocker To Go, providing full
disk encryption for removable volumes. In Windows 8, BitLocker can
more easily be deployed and managed.
User Account Control (UAC):
Introduced in Windows Vista, User
Account Control helps prevent unauthorized changes to a computer by
1H11
2H11
1H12
2H12
8 verifies the integrity of Windows
startup files, and includes an Early
Launch AntiMalware (ELAM) capability that enables the antimalware
software to start before any third
party software. By starting the antimalware solution early and within
the protected boot process, the operation and integrity of the antimalware solution can be better guaranteed. As part of the boot process,
Windows also runs Measured Boot,
which allows third-party software on
a remote server to securely verify the
security of every startup component
in a way that would be very difficult
for malware to forge. If any tampering with the Windows boot process
or the antimalwares ELAM driver is
detected, Trusted Boot will repair the
system by restoring the original files.
Over and above all the security mitigations and features that are available in more modern operating systems, security development practices
have also evolved greatly over the
past decade, but so has the threat
landscape. See the table on the next
page showing the key threats present during the time of release of
Windows XP, Windows Vista, Windows 7 and Windows 8.
04
Key Threats
1995
Windows 95
-
Key Threats
2001
Key Threats
2004
Windows XP
Windows XP SP2
Key Threats
Key Threats
Logon (Ctrl+Alt+Del)
Access Control
User Profiles
Security Policy
Encrypting File System (File
Based)
Smartcard and PKI Support
Windows Update
Zotob (2005)
Attacks moving up the stack
(Summer of Office 0-day)
Rootkits
Exploitation of Buffer Overflows
Script Kiddies
Raise of Phishing
User running as Admin
2007
Windows Vista
Bitlocker
Patchguard
Improved ASLR and DEP
Full SDL
User Account Control
Internet Explorer Smart
Screen Filter
Digital Right Management
Firewall improvements
Signed Device Driver Requirements
TPM Support
Windows Integrity Levels
Secure by default configuration (Windows features
and IE)
Organized Crime
Botnets
Identity Theft
Conficker (2008)
Time from patch to exploit:
days
2009
Windows 7
Key Threats
2012
Windows 8
05
Secure boot
System
folder
Program
folder
EFS
Bitlocker
Integrity Level
UAC
RMS
Windows
Firewall
AppLocker
No
Autorun
vulnerability
Protected
View
Windows Defender
EFS
Smart
Screen
Hardening applications
and default setting
Program
Folder
vulnerability
Windows
Firewall
Windows 8
System
Folder
Windows XP
Unsupported hardware
Hardware Vendors and OEMs have
also stopped testing new devices on
Windows XP. Many currently shipping computers will not support XP
and device drivers are not available.
Anywhere Connection
Give people secure, hassle-free ac-
cess to data, applications, and colleagues. They need to stay productive anywhere, any time, and on a
variety of devices.
Personalized Experience
Enhance productivity by giving people personalized experiences that
anticipate their needs, remember
their preferences, and adapt to their
unique workstyle.
Intelligent Infrastructure
Deliver enterprise-grade solutions
designed to help you maintain security, streamline management, and
cut costs.
Desktop Deployment Planning
Services (DDPS)
Plan and prepare for an efficient and
successful Microsoft Office deploy-
06
ment by taking advantage of comprehensive planning services delivered through prequalified partners.
Windows To-Go
As bring-your-own-device (BYOD)
and mobility scenarios become
increasingly common, businesses
need new and more flexible ways to
help users be productive wherever
they are. Windows To Go is a new
feature for enterprise users of Windows 8 that enables users to boot a
full version of Windows from external USB drives on host PCs. Windows To Go drives can use the same
image that enterprises use for their
desktops and laptops, and can be
managed the same way. Offering a
new mobility option.
Reduced cost
IDCs analysis shows that supporting older Windows XP installations,
compared with a modern Windows
7-based solution, saddles organizations with a dramatically higher cost.
Annual cost per PC per year for Windows XP is $870, while a comparable
Windows 7 installation costs $168
per PC per year. That is an incremential $701 per PC per year for IT and
end user labor costs.
(Source: Mitigating Risk: Why Sticking with
The Windows XP to Windows 7 Migration Guide (http://technet.microsoft.com/en-us/ee150430.aspx) provides you with many different tools
that can be downloaded.
The Windows XP Mode for Windows
07
Contain
Detect
Response
Recover
Threat
Information
Protect systems from compromise through a combination of training, implementation, and assessments.
Focus efforts on:
Contain attacker lateral movement and privilege escalation by managing the ability to abuse credentials.
Detect active attacks or compromised systems before they become pervasive in the customer.
Respond to an intrusion once it is detected.
Recover from an intrusion through executing planned recovery efforts.
Threat Information provides situational awareness.
08