S 2.442 Use of Windows Vista and Windows 7 on mobile systems

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: User

The use of a mobile computer comes in conjunction with the typical threats resulting from mobile use. When using Windows Vista and Windows 7 on portable computers, as well as on all mobile computers, module M 3.3 Laptops must be taken into account. Windows Vista and Windows 7 provide their own mechanisms for the areas of data encryption, data backup, and locally installed firewalls. We make the following recommendations for these areas.

Data encryption

Mobile computers are often located in environments offering a significantly lower level of security than a protected office environment. For this reason, any data stored on the mobile computer requiring protection should be encrypted (see also S 4.29 Use of an encryption product for portable IT systems). In addition to a series of products offered by third-party manufacturers, the mechanisms integrated into Windows Vista and Windows 7 can also be used for encryption:

In any case, it is recommended to use the BitLocker. The use of the EFS in addition to the BitLocker makes sense when BitLocker is used on a Windows Vista system without SP1. The additional use of the EFS is also recommended when the data requiring protection on the mobile computer should also be encrypted when the mobile computer running Windows Vista or Windows 7 is turned on. The BitLocker encryption function does not offer any protection once the computer has been turned on. In contrast, EFS ensures individual files and drives are encrypted when they are not permanently decrypted. When a user works on the files or drives protected by the EFS, the data is also available here in unencrypted form.

When running Windows Vista without SP1, it is recommended to use the function for encrypting offline files in additional to BitLocker when the local folder for offline files has been moved from the boot partition to another partition on the mobile computer.

The strategy used to protect the data stored on a mobile computer (BitLocker, Windows Vista or Windows 7 EFS, offline file encryption, or encryption using a third-party product) must be specified based on the specific circumstances and on a case-by-case basis, if necessary.

Data backups

To avoid irretrievable losses of data, regular backups of the data must be made. More detailed information on data backups can be found in S 6.32 Regular data backup.

In Windows Vista or Windows 7, it is possible to back up individual files and create complete images of of partitions (see S 6.78 Data backup under Windows clients).

If the data backup is configured to store the backups on network drives, then backups can only be made when the mobile computer is connected over a network to the backup server. For this reason, it is necessary to schedule the data backups accordingly.

Removable media can be used for data backups. If the use removable media is planned, it must be possible to access the removable media to back up the data, and also to restore the data. This must be taken into account when technically implementing access restrictions for removable media (see S 4.339 Prevention of unauthorised use of removable media under Windows Vista and Windows 7).

The data backup strategy for a mobile computer (backup of individual files, Windows Complete PC Backup image, or the use of a third-party product as well as the backup times and storage locations) must be specified based on the specific circumstances and on a case-by-case basis, if necessary.

Locally installed firewall

In contrast to stationary desktop computers installed in the institution, it is possible with mobile computers to connect directly to the Internet. It is essential in this case to protect the mobile computers using locally installed firewalls.

The Windows firewall in Windows Vista and Windows 7 offers a combination of a "personal firewall" and an IPSec gateway. The firewall can be configured using the Windows Security Center. In Windows 7 and higher, the firewall can also be configured in the Action Center under Security. For Windows Vista and Windows 7, there is a snap-in available for the MMC management console (mmc.exe) that offers significantly more detailed configuration options for the Windows firewall. A snap-in is a component that extends the functionality of a console for certain administrative tasks.

The Windows firewall can check outgoing as well as incoming data traffic. The default settings are set to block all incoming data traffic other than the exceptions configured (whitelist approach) and allow all outgoing data traffic to pass not configured as an exception (blacklist approach).

The default settings of Windows firewall depend on the version of the Windows Vista or Windows 7. In Windows Vista and Windows 7 Enterprise and Windows Vista Business and Windows 7 Professional, only few ports are open in the Windows firewall. In Windows Vista Ultimate and Windows 7 Ultimate, in contrast, numerous local Windows services can be accessed from outside.

The Windows Firewall uses the Network Location Awareness (NLA) service available in Windows. The administrator can configure his own policies for the Windows Vista or Windows 7 firewall for every network environment (also referred to as network location types). Windows Vista and Windows 7 can detect three network environments: Domain (in Windows 7 and higher, Domain Network), Public and Private. If a Windows Vista or Windows 7 client connects to a network for the first time, then Windows Vista or Windows 7 asks the user what type of network environment is present. However, the user must have administrative privileges in this case. If the user does not have administrative privileges, then Windows Vista and Windows 7 select Public as the network environment. If the network is a domain with the Windows Vista or Windows 7 client as a member, then Windows Vista and Windows 7 automatically select the Domain/Domain Network network environment.

Once a network has been classified, it is recognised automatically by the NLA service based on various criteria such as the MAC address of the default gateway. Only users with administrative authorisations are able to change the classification or modify the response of the Windows firewall to a certain network classification.

The following default settings determine the default response of the Windows firewall for the Domain, Public, and Private network environments.

The following applies for a Domain network environment:

The following applies for a Public network environment:

The following applies for a Private network environment:

In all probability, mobile computers will be able to access networks in different environments. Typical network environments include the institution's own LAN, a LAN at a home workplace, or the Internet access available over a public wireless LAN hotspot. Windows Vista and Windows 7 support the automatic detection of a network environment and use different sets of firewall rules depending on the current network environment. If the users will be allowed to use this feature, then they must have administrative rights to access a network for the first time. In this case, the user must also have received proper training on how to assign the right network environment and, if necessary, on how to change the sets of firewall rules.

The strategy for the use of the local firewall on a mobile computer (network environment-dependent rule sets, ability of the users to specify the network environment) must be specified based on the specific circumstances and on a case-by-case basis, if necessary. In this context, it should be checked whether the Windows firewall provides the required protection even in more complex scenarios such as in connection with a Virtual Private Network (VPN), or if a product by a third-party manufacturer has to be used.

Review questions: