Hands-On Microsoft Windows Server 2008

Slides:



Advertisements
Similar presentations
Guide to MCSE , Enhanced 1 Activity 14-1: Browsing Security Templates Objective: To become familiar with built-in security templates Start  Run.
Advertisements

MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 7: Troubleshoot Security Settings and Local Security.
Lesson 17: Configuring Security Policies
Chapter 13 Securing Windows Server 2008
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Chapter 8 Chapter 8: Managing Accounts and Client Connectivity.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 14: Windows Server 2003 Security Features.
Hands-On Microsoft Windows Server 2003 Administration Chapter 4 Managing Group Policy.
12.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
MIS Chapter 91 Ch. 9 – Implement and Use Group Policy MIS 431 – created Spring 2006.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 15 Managing System Reliability and Availability.
Chapter 4 Introduction to Active Directory and Account Management
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 14 Server and Network Monitoring.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
7.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 7: Introducing Group Accounts.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
© N. Ganesan, Ph.D., All rights reserved. Active Directory Nanda Ganesan, Ph.D.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Module 8: Implementing Administrative Templates and Audit Policy.
Guide to MCSE , Enhanced 1 Activity 10-1: Restarting Windows Server 2003 Objective: to restart Windows Server 2003 Start  Shut Down  Restart Configure.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Ch 11 Managing System Reliability and Availability 1.
(ITI310) SESSIONS : Active Directory By Eng. BASSEM ALSAID.
9.1 © 2004 Pearson Education, Inc. Lesson 9: Implementing Group Policy in Windows 2000 Server Exam Microsoft® Windows® 2000 Directory Services Infrastructure.
Chapter 4 Introduction to Active Directory and Account Management
70-270: MCSE Guide to Microsoft Windows XP Professional Chapter 5: Users, Groups, Profiles, and Policies.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Hands-On Microsoft Windows Server 2008 Chapter 10 Securing Windows Server 2008.
CH 12 Securing Windows Server Objectives Understand the security enhancements included in Windows Server 2008 Understand how Windows Server 2008.
Windows Server 2008 Chapter 10 Last Update
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Using Group Policy to Manage User Environments. Overview Introduction to Managing User Environments Introduction to Administrative Templates Assigning.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
70-270: MCSE Guide to Microsoft Windows XP Professional Second Edition, Enhanced Chapter 6: Windows XP Security and Access Controls.
September 18, 2002 Introduction to Windows 2000 Server Components Ryan Larson David Greer.
Guide to Operating System Security Chapter 4 Account-based Security.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Designing Active Directory for Security
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring, Managing, and Troubleshooting Resource Access.
Module 14: Configuring Server Security Compliance
Module 7: Fundamentals of Administering Windows Server 2008.
Managing User Desktops with Group Policy
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
September 18, 2002 Windows 2000 Server Active Directory By Jerry Haggard.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Introduction to Microsoft Management Console (MMC) MMC is a common console framework for management applications. MMC provides a common environment for.
1 Chapter Overview Publishing Resources in Active Directory Service Redirecting Folders Using Group Policies Deploying Applications Using Group Policies.
Module 6: Configuring User Environments Using Group Policy.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Five Windows Server 2008 Remote Desktop Services,
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Chapter 10 Chapter 10: Managing the Distributed File System, Disk Quotas, and Software Installation.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
Module 10: Implementing Administrative Templates and Audit Policy.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Unit 8 NT1330 Client-Server Networking II Date: 2?10/2016
Configuring the User and Computer Environment Using Group Policy Lesson 8.
Chapter 8: Managing Accounts and Client Connectivity
Presentation transcript:

Hands-On Microsoft Windows Server 2008 Chapter 10 Securing Windows Server 2008

Introduction to Group Policy Group policy in Windows Server 2008 Enables you to standardize the working environment of clients and servers by setting policies in Active Directory Defining characteristics of group policy: Group policy can be set for a site, domain, OU, or local computer Group policy cannot be set for non-OU folder containers Group policy settings are stored in group policy objects Hands-On Microsoft Windows Server 2008

Introduction to Group Policy (continued) Defining characteristics of group policy: (continued) GPOs can be local and nonlocal Group policy can be set up to affect user accounts and computers When group policy is updated, old policies are removed or updated for all clients Hands-On Microsoft Windows Server 2008

Hands-On Microsoft Windows Server 2008

Securing Windows Server 2008 Using Security Policies Security policies are a subset of individual policies Within a larger group policy for a site, domain, OU, or local computer Security policies include: Account Policies Audit Policy User Rights Security Options IP Security Policies Hands-On Microsoft Windows Server 2008

Establishing Account Policies Security measures set up in a group policy that applies to all accounts or to all accounts in a container when Active Directory is installed Password security One option is to set a password expiration period, requiring users to change passwords at regular intervals Some organizations require that all passwords have a minimum length Hands-On Microsoft Windows Server 2008

Account Lockout The operating system can employ account lockout To bar access to an account (including the true account owner) after a number of unsuccessful tries A common policy is to have lockout go into effect after five to 10 unsuccessful logon attempts Hands-On Microsoft Windows Server 2008

Account Lockout (continued) Kerberos security Involves the use of tickets that are exchanged between the client who requests logon and network services access Enhancements on Windows Server 2008 and Windows Vista The use of Advanced Encryption Standard (AES) When Active Directory is installed, the account policies enable Kerberos Hands-On Microsoft Windows Server 2008

Establishing Audit Policies Examples of events that an organization can audit are as follows: Account logon (and logoff) events Account management Directory service access Logon (and logoff) events at the local computer Object access Policy change Process tracking System events Hands-On Microsoft Windows Server 2008

Configuring User Rights User rights enable an account or group to perform predefined tasks The most basic right is the ability to access a server More advanced rights give privileges to create accounts and manage server functions Hands-On Microsoft Windows Server 2008

Configuring Security Options Over 78 specialized security options, with many new ones added for Windows Server 2008 Can be configured in the security policies Each category has specialized options Hands-On Microsoft Windows Server 2008

Using IP Security Policies Windows Server 2008 supports the implementation of IP security (IPsec) When an IPsec communication begins between two computers The computers first exchange certificates to authenticate the receiver and sender Next, data is encrypted at the NIC of the sending computer as it is formatted into an IP packet IPsec can provide security for all TCP/IP-based application and communications protocols Hands-On Microsoft Windows Server 2008

Using IP Security Policies (continued) A computer that is configured to use IPsec communication can function in any of three roles: Client (Respond Only) Secure Server (Require Security) Server (Request Security) IPsec security policies can be established through the Default Domain Policy IPsec security policies can also be configured through the IP Security Policies Management MMC snap-in Hands-On Microsoft Windows Server 2008

Active Directory Rights Management Services Active Directory Rights Management Services (AD RMS) A server role to complement the client applications that can take advantage of Rights Management Services safeguards Rights Management Services (RMS) Security rights developed by Microsoft to provide security for documents, spreadsheets, e-mail, and other types of files created by applications Uses security capabilities such as encryption, user authentication, and security certificates to help safeguard information Hands-On Microsoft Windows Server 2008

Active Directory Rights Management Services (continued) General steps used in RMS security A user creates a Word document, for example In the process of protecting the document with RMS, Word encrypts the document using an AES key and an additional RSA key The AD RMS server issues an identity license to the client who can access the document Client shows the AD RMS server its license to access the document The AD RMS server authenticates the client and determines the level of access Hands-On Microsoft Windows Server 2008

Managing Security Using the Security Templates and Security Configuration and Analysis Snap-Ins This snap-in enables you to set up security to govern the following: Account policies Local policies Event log tracking policies Group restrictions Service access security Registry security File system security Hands-On Microsoft Windows Server 2008

Configuring Client Security Using Policies in Windows Server 2008 Customizing settings used by clients offers several advantages Enhanced security and providing a consistent working environment in an organization The settings are customized by configuring policies on the Windows Server 2008 servers that the clients access When the client logs on to the server or the network, the policies are applied to the client Hands-On Microsoft Windows Server 2008

Publishing and Assigning Software Publishing applications (or software) Involves setting up software through a group policy so that the application is available for users to install from a central application distribution server Such as through the Add/Remove Programs capability via the user’s desktop Assigning applications An application is automatically represented on the user’s desktop Is initially really a link to the central application distribution server Hands-On Microsoft Windows Server 2008

Using the cipher Command When you deploy NTFS you can use the Encrypt attribute to protect folders and files Enabling only the user who encrypts the folder or file to read it You can set the Encrypt attribute on a folder or file through working with that folder’s or file’s properties Another option that you learn in this section is to use the cipher command from the Command Prompt window Hands-On Microsoft Windows Server 2008

Configuring NAT Network Address Translation (NAT) serves two important functions: Enables an organization to automatically assign its own IP addresses on an internal network Without having to set up many globally unique addresses for use over external networks Protects computers on an internal network so that computers on external networks cannot identify their true IP addresses on the internal network Hands-On Microsoft Windows Server 2008

Configuring NAT (continued) NAT uses a pool of private addresses for its internal network Because the internal addresses are not viewed by the outside world There is no need to have a large pool of IP addresses that can also be used over an external network Only one or a very small pool of globally unique IP addresses are needed for outside communications NAT is also a good security technique because internal IP addresses are concealed from the outside world Hands-On Microsoft Windows Server 2008

Network Access Protection NAP can be used to keep a network healthy in the following ways: Identifies clients and other computers on a network that do not comply with the security policies set through Windows Server 2008 Limits access by noncompliant computers Automatically updates or configures a noncompliant computer to match the security policies required for access Continuously checks throughout the entire network and server connection session Hands-On Microsoft Windows Server 2008

Network Access Protection (continued) NAP can be used to ensure compliance with network security policies in the following areas: IPsec VPN DHCP Terminal Services Gateway 802.1X Hands-On Microsoft Windows Server 2008

Using and Configuring Event Viewer Houses the event logs Record information about all types of server events Divided into three general categories: Windows logs Applications and services logs Microsoft logs MCITP Guide to Microsoft Windows Server 2008, Server Administration (Exam #70-646)

Figure 15-10 Event Viewer Courtesy Course Technology/Cengage Learning MCITP Guide to Microsoft Windows Server 2008, Server Administration (Exam #70-646)

Using and Configuring Event Viewer (cont’d.) Logs for reporting general operating system and software application events System log Security log Application log Setup log Admin logs Give the system administrator information about a specific problem and its causes May suggest how to solve problem MCITP Guide to Microsoft Windows Server 2008, Server Administration (Exam #70-646)

Using and Configuring Event Viewer (cont’d.) Operational log Tracks occurrences of specific operations Analytic logs Relate to how programs are operating Typically used by application or system programmers Debug logs Used by application developers to help trace program problems MCITP Guide to Microsoft Windows Server 2008, Server Administration (Exam #70-646)

Viewing Log Events Log events displayed in Event Viewer Icon indicates the seriousness of event Open Event Viewer from: Administrative Tools menu MMC snap-in Computer Management tool Server Manager MCITP Guide to Microsoft Windows Server 2008, Server Administration (Exam #70-646)

Using the Event Viewer Filter Option Locate a problem quickly Filter events on the basis of: When the event was logged Event level Log Source of the event Task category of the event MCITP Guide to Microsoft Windows Server 2008, Server Administration (Exam #70-646)

Using the Event Viewer Filter Option (cont’d.) Filter events on the basis of (cont’d.): Keywords User Computer Date range Time of day range MCITP Guide to Microsoft Windows Server 2008, Server Administration (Exam #70-646)

Maintaining Event Logs Methods for limiting logs Size each log to prevent it from filling too quickly Overwrite oldest events when log is full Archive log when it is full Clear log manually Options to save and clear individual logs also available Activity 15-4: Using Event Viewer Objective: Use Event Viewer to view system log events MCITP Guide to Microsoft Windows Server 2008, Server Administration (Exam #70-646)

Using Log Subscriptions Collect event log information from many computers onto one computer New feature Collect and filter information from all servers Display it in Event Viewer on one “collector computer” MCITP Guide to Microsoft Windows Server 2008, Server Administration (Exam #70-646)