ADVANCED FUNCTIONALITY & TROUBLESHOOTING. Page 2 Agenda Main topics Advanced Policy Manager Server configuration Resolving Apache Web Server security.

Slides:



Advertisements
Similar presentations
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Advertisements

KX-NS1000 Initial Set Up For step by step : 16 May,
1 Routing and Remote Access Service (Week 15, Friday 4/21/2006) © Abdou Illia, Spring 2006.
Module 5: Configuring Access for Remote Clients and Networks.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
Hands-On Microsoft Windows Server 2003 Networking Chapter 7 Windows Internet Naming Service.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Lesson 19 – ADMINISTERING WINDOWS 2000 SERVER : THE BASICS.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
ADMINISTERING F-SECURE POLICY MANAGER
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
Maintaining and Updating Windows Server 2008
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
VIRUS AND SPY PROTECTION ADMINISTRATION. Page 2 Agenda Main topics Administration interface Local user interface Administrating scanning remotely Tips.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
1 Objectives Discuss the Windows Printer Model and how it is implemented in Windows Server 2008 Install the Print Services components of Windows Server.
Welcome To. Improving Remote File Transfer Speeds By The Solution For: %
ADMINISTERING INTERNET SHIELD. Page 2 Agenda What can Internet Shield be used for? Administering Internet Shield Firewall configuration Network Quarantine.
1 Chapter Overview Monitoring Server Performance Monitoring Shared Resources Microsoft Windows 2000 Auditing.
Ch 11 Managing System Reliability and Availability 1.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
11 NETWORK PROTOCOLS AND SERVICES Chapter 10. Chapter 10: Network Protocols and Services2 NETWORK PROTOCOLS AND SERVICES  Identify how computers on TCP/IP.
ADMINISTRATION HANDS-ON. Page 2 About the Hands-On This hands-on section is structured in a way, that it allows you to work independently, but still giving.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Thrive Installation.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
ADMINISTRATION HANDS-ON. Page 2 About the Hands-On This hands-on section is structured in a way that allows you to work independently, but still giving.
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
Using Windows Firewall and Windows Defender
INSTALLING MICROSOFT EXCHANGE SERVER 2003 CLUSTERS AND FRONT-END AND BACK ‑ END SERVERS Chapter 4.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
IMPLEMENTING F-SECURE POLICY MANAGER. Page 2 Agenda Main topics Pre-deployment phase Is the implementation possible? Implementation scenarios and examples.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Course ILT Internet/intranet support Unit objectives Use the Internet Information Services snap-in to manage IIS, Web sites, virtual directories, and WebDAV.
COMP1321 Digital Infrastructure Richard Henson February 2014.
Microsoft FrontPage 2003 Illustrated Complete Finalizing a Web Site.
INSTALLATION HANDS-ON. Page 2 About the Hands-On This hands-on section is structured in a way, that it allows you to work independently, but still giving.
BASIC FUNCTIONALITY. Page 2 Agenda Main topics Policy Manager Communication Understanding communication Information flow Communication modules F-Secure.
Module 7 Active Directory and Account Management.
Avira Endpoint Security. Introduction of Avira Management Center (AMC)
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 4 Installing and Configuring the Dynamic Host Configuration Protocol.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Five Windows Server 2008 Remote Desktop Services,
Module 15 Managing Windows Server® 2008 Backup and Restore.
Integrating and Troubleshooting Citrix Access Gateway.
Lesson 11: Configuring and Maintaining Network Security
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Administering Microsoft Windows Server 2003 Chapter 2.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Module 14: Advanced Topics and Troubleshooting. Microsoft ® Windows ® Small Business Server (SBS) 2008 Management Console (Advanced Mode) Managing Windows.
By the end of this lesson you will be able to explain: 1. Identify the support categories for reported computer problems 2. Use Remote Assistance to connect.
Maintaining and Updating Windows Server 2008 Lesson 8.
COMP1321 Digital Infrastructure Richard Henson March 2016.
Module Overview Installing and Configuring a Network Policy Server
Securing the Network Perimeter with ISA 2004
Configuring and Troubleshooting Routing and Remote Access
Administering Your Network
Bethesda Cybersecurity Club
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

ADVANCED FUNCTIONALITY & TROUBLESHOOTING

Page 2 Agenda Main topics Advanced Policy Manager Server configuration Resolving Apache Web Server security issues Troubleshooting Learning how to pinpoint problem sources Inspecting Policy Manager logfiles Tips & Tricks

POLICY MANAGER SERVER CONFIGURATION

Page 4 Default Configuration The default Apache Server configuration suits most Policy Manager environments PMS accessible from the same computer only Web reporting accessible from the LAN For easy administration of large, global infrastructures, administrators might need access to the Policy Manager Server/s from different locations in the corporate LAN X

Page 5 Apache Configuration File (HTTPD.conf) All configuration changes in Apache are done through httpd.conf Most common configuration task are Creating access restrictions Creating and managing access lists Configuring apache module ports

Page 6 Access Limitation Admin Module By default restricted to localhost Web Reporting Module No restriction (restriction recommended) Host Module No restriction (should never be restricted!)

Page 7 Port Changes Host Module (default port: 80) 81 Admin Module (default port: 8080) 8881 Web Reporting Module (default port: 8081) 8082

Page 8 Access Lists Listen 8080 Remove admin module access limitation Order Deny,Allow Deny from all Define access list rule order Create Global Deny: Ristrict all access Allow from Allow from Define the allowed connections (IP) Start with the localhost (mandatory)

Page 9 Policy Manager Security It is impossible to deploy changes to the policy domain without access to the admin key pair Policies signed with a wrong key will be rejected by the managed hosts It is important to secure the policy domain Backup the keys Use a secure Policy Manager configuration (only allow console connections from the local computer) Secure the private key (should be only available to administrators)

Page 10 Re-Signed Policy Domain... What Happened? It is possible to re-sign the policy domain structure with a different key pair This can happen intentionally or by a unauthorized user The administrator will be notified about the key change at the next launch of the console In case the key change has been done by an unauthorized user, you need to restore the policy domain There might have been changes deeply nested in the MIB structure, which you would distribute, once you re-sign the domain with the right key

TROUBLESHOOTING

Page 12 Involved Components In F-Secure Policy Manager, most problems are related to communication In a Policy Manager environment we have 3 components communicating with each other Policy Manager Server Policy Manager Console Managed hosts

Page 13 Pinpoint the Source Of The Problem Locating the real source of a problem is the key to successful troubleshooting A problem that may appear to be caused by a host could actually be caused by the server A systematic approach will bring the best results Check one component after another (start with the PMS) Services, communication, hardware (network) Check logfiles Check the product configuration PMS and PMC configuration Host policies

Page 14 Product Services Are all necessary services up and runnining? Check the PMS service status What does the PMS Status monitor say, are all ports ”OK”? Check the host service status Test the connection to the server (poll for a new policy)

Page 15 Communication Checking Having all services up and running doesn’t always mean that the communication between the PMS components works fine Test the connection From PMC to PMS Telnet the server IP on the apache admin module port (default 8080) From managed host to PMS Telnet the server IP on the apache host module port (default 80)

Page 16 Server Configuration Problems Policy Manager Server configuration problems are usually easy to spot Services cannot be launched or are malfunctioning Console connection to the server is rejected Windows reports application or system error in event logs But which configuration settings are causing the problems and where can be configuration files be found?

Page 17 HTTPD.conf Problems Changes in the HTTP configuration file have to be done with extreme care. Wrong settings can cause a series of problems E.g. Policy Manager Server service cannot be started anymore Take a backup copy of the existing httpd.conf before you start doing changes Httpd.original backup file is created during installation, but it will not include any changes done afterwards In case something goes wrong, it’s easy to rollback the settings

Page 18 Access Rights The Policy Manager Server installation automatically creates a local account, used for commdir authorization. User account name: fsms_ Policy Manager Server service is started under this user account It needs to have full control to the Management Server 5 directory Access permissions for important directories might be changed or deleted without notification Example: Restoring of a backup from a write protected media Commdir directory rights will be read-only Solution: Recreate the access rights (full control) on commdir directory level and propagate them downwards

Page 19 Host Configuration Problems In a Policy Manager environment, all host settings are defined in policy files, either created by the administrator (base policy files) or by the local user (incremental policy file) Once distributed, base policy files are fetched by the hosts and taken into use There is no possibility of undoing policy distributions (wrong configurations will be taken into use) Depending on your host polling interval, you might be able to create a new, corrected policy, before the host fetches the current policy

Page 20 How Does a Policy Reach a Host? A new policy can reach its host in one of the following ways: 1.The Management Agent fetches it periodically 2.The Management Agent checks for new policies whenever it is started: when the host boots up by stopping and re-starting fsma 3.Manually copy the correct policy from PMS to a host. You need to stop fsma and fspm before the copying 4.On a host, click on “Import base policy” button and manually browse to it

Page 21 Wrong Communication Settings Dead End? The hosts cannot reach the server anymore, due to a wrongly defined communication address in the latest policy Creating a new policy will not help, since the hosts will not be able to fetch the policy Solution: Export the base policy files of the affected hosts and import them manually through the local user interface

Page 22 Policy Changes Not Taken Into Use...Why? It is important to keep in mind that policies can be defined on multiple levels. The policy domain tree has a hierarchical structure A policy defined on host level will make domain level policies irrelevant In such a case, if a host is copied to different domain, it will keep the settings defined on the host level (no domain inheritance) From which level has the policy change been inherited? Check if there is a host level policy (use ”Show Domain Value”) Clear the host level policy or force the domain values

Page 23 Incremental Policy Logic All settings changes made through the local user interface are saved to the incremental policy file (policy.ipf) The incremental policy file has priority over the base policy file Settings changes should always be marked as ”final”, in order to overwrite possible incremental settings FSMA AVCS IPF BPF

Page 24 Example: Missing Access Restriction 1.The administrator allows the user to change the anti-virus security level 2.The user changes the security level to ”Normal” (ipf is taken into use) 3.A new policy is created with the idea of forcing the ”Custom” security profile 4.The administrator does not mark the setting as ”final” (unlocked) 5.The host fetches the new policy but the setting security profile is not changed

Page 25 Logfiles If the problem can traced to either the Server or the Console, the best places to start troubleshooting are the errorlogs: Policy Manager Server Logs\access.* Logs\error.* Policy Manager Console Lib\administrator.error.log Policy Manager Server Status Monitor information can also be accessed remotely /fsms/fsmsh.dll

TIPS & TRICKS

Page 27 Accidentally Deleted Host Host was accidentally deleted in the security domain pane. How can it be recreated? Distribute policy and wait for the computer to send autoregistration request The host can also be recreated manually (using a unique name, e.g. DNS name)

Page 28 Recreating the Whole Domain Structure The whole security domain was accidentally deleted. Is there anything I can do? If you have a backup of the domain structure, use that. Else hard manual work is needed Distribute policy and wait for the computer to send autoregistration request. If you have created autoregistration import rules, apply them Else move them manually to the right location

Page 29 Performance Improvments Policy file optimization Remove indendation (default: OFF) Policy comments should be disabled (default) Minimize the size of the policy file by disabling unneccesary MIB files Polling intervals (large environments) Server polling ( min.) Client status updates (>30 min.)

Page 30 Problems with Web Reporting Web Reporting doesn’t seem to connect to the server. What next? Refresh the connection Check Server Monitor port status Distribute policies Check the URL (DNS name, ip, port) Restart F-Secure Policy Manager Web Reporting Restart Policy Manager Server Restart host Reset Web Reporting database Reinstall Web Reporting (allow Web Reporting from remote hosts)

Page 31 Summary Main topics Advanced Policy Manager Server configuration Resolving Apache Web Server security issues Troubleshooting Learning how to pinpoint problem sources Inspecting Policy Manager logfiles Tips & Tricks