First pieces coming next year for servers, clients Microsoft Tuesday finally laid bare details of its plans to create an isolation technology that lets corporations blocks infected or misconfigured clients from accessing a network.At its annual Worldwide Partner Conference in Toronto, the company introduced Network Access Protection (NAP); a broad set of technologies for creating a standards-based, multi-vendor mechanism to verify that a client desktop is secure before allowing network access.Microsoft also announced 25 partners in the project including anti-virus, firewall, policy management, patch management and network vendors.Cisco, which is working on a similar technology called Network Admission Control, is not one of Microsoft’s partners. The NAP technology will check for virus signatures and patch levels as a way to assess the “health” of a desktop. The client’s “health” would be validated against a set of policies and those that do not pass could be put into an isolation area where they would be updated to comply with policies and eventually gain network access.Microsoft plans to deliver in the first half of next year as part of its Windows Server 2003 Update, codenamed R2, a Policy Connection Server that will be built into the server operating system and act as a sort of mediator that enforces network policies on access control. A key component is a policy store that will be added to Microsoft’s Internet Authentication Service (IAS), which is an implementation of the RADIUS protocol. The store will house IT-defined policies such as mandatory checks of current patch levels. The Policy Server all includes a set of APIs that would allow other vendors to link their products to the server.Microsoft plans to eventually publish the APIs as a set of industry standards. Company officials said candidates for submission of the APIs include the Trusted Computing Group (TCG) or the IEEE. Microsoft is currently a member of TCG, which this fall plans to publish a technical specification called Trusted Network Connect for use in multi-vendor environments for compliance checks for virus and patch updates.“The goal is to get IT more control to enforce network policies on the machines coming on to a network,” says Steve Anderson, director of marketing for Windows server at Microsoft. Anderson said the technology will be flexible in allowing IT to set access controls per users or groups of users.“This type of technology could drive a lot of support calls so we are spending a lot of time on the user experience,” Anderson says. He said end-users would see pop-up Windows that show the progress of virus and patch assessments and upgrades.Users also will have to install code on their Windows XP desktop machines to support NAP. Microsoft plans to support network access request using a VPN and the Protected Extensible Authentication Protocol (PEAP). The company has yet to decide if 802.1x and IPSec support will make it into R2 or will come out with Longhorn in 2007 and whether NAP will support Windows 2000 desktops.Isolation and resiliency have become cornerstone principals in Microsoft’s security business and technology division. The company plans to release the first taste of the technology in Windows Server 2003 Service Pack (SP) 1 later this year. The service pack will support VPN quarantine, but users will have to write their own rules and scripts in order to support the feature. In the Policy Server coming in R2 next year all that will be hidden behind a point-and-click user interface plus users will be able to enforce policies and update clients, as well as, integrate third-party software.But Microsoft says any rules created with SP1 won’t be compatible with NAP, which is viewed as the replacement for SP1’s VPN quarantine features.A number of smaller software vendors, including Citadel, Sygate and WholeSecurity, already have security policy-compliance products. McAfee has worked with Nortel and Check Point, for instance, to ensure their VPNs can validate that a user has the appropriate anti-virus signature updates before letting the user access the corporate network.Both Sygate and McAfee are partnering with Microsoft on the NAP initiative. In addition, Microsoft also announced the general availability of its Internet Security and Acceleration Server 2004 and that HP is the first to ship a device based on the software, the HP ProLiant DL320 Firewall/VPN/Cache Server.Microsoft also said it is making available a cleaner tool for the Download.Ject exploit that has plagued Internet Information Services and Internet Explorer. Related content feature 5 ways to boost server efficiency Right-sizing workloads, upgrading to newer servers, and managing power consumption can help enterprises reach their data center sustainability goals. By Maria Korolov Dec 04, 2023 9 mins Green IT Green IT Green IT news Omdia: AI boosts server spending but unit sales still plunge A rush to build AI capacity using expensive coprocessors is jacking up the prices of servers, says research firm Omdia. By Andy Patrizio Dec 04, 2023 4 mins CPUs and Processors Generative AI Data Center feature What is Ethernet? History, evolution and roadmap The Ethernet protocol connects LANs, WANs, Internet, cloud, IoT devices, Wi-Fi systems into one seamless global communications network. By John Breeden Dec 04, 2023 11 mins Networking news IBM unveils Heron quantum processor and new modular quantum computer IBM also shared its 10-year quantum computing roadmap, which prioritizes improvements in gate operations and error-correction capabilities. By Michael Cooney Dec 04, 2023 5 mins CPUs and Processors High-Performance Computing Data Center Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe