Module 6: Designing Active Directory Security in Windows Server 2008.

Slides:



Advertisements
Similar presentations
Planning and Administering Windows Server® 2008 Servers
Advertisements

Auditing Microsoft Active Directory
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
MOAC : Installing and Configuring Windows Server 2012
Chapter 6 Introducing Active Directory
Chapter 7 HARDENING SERVERS.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Administering Active Directory
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
7.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 7: Introducing Group Accounts.
Understanding Active Directory
Guide to MCSE , Enhanced 1 Activity 9-1: Creating a Group Policy Object Using the MMC Objective: To create a GPO using the Group Policy Object Editor.
Module 8: Implementing Administrative Templates and Audit Policy.
Hands-On Microsoft Windows Server 2008
Chapter 7 WORKING WITH GROUPS.
Hands-On Microsoft Windows Server 2008
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Module 1: Installing Active Directory Domain Services
Module 1: Installing Active Directory Domain Services
Overview of Active Directory Domain Services Lesson 1.
Overview of Active Directory Domain Services Lesson 1.
Chapter 12: Additional Active Directory Server Roles
9.1 © 2004 Pearson Education, Inc. Lesson 9: Implementing Group Policy in Windows 2000 Server Exam Microsoft® Windows® 2000 Directory Services Infrastructure.
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
Module 2 Creating Active Directory ® Domain Services User and Computer Objects.
Windows Server 2008 Chapter 4 Last Update
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
Module 12: Designing an AD LDS Implementation. AD LDS Usage AD LDS is most commonly used as a solution to the following requirements: Providing an LDAP-based.
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
Managing Active Directory Domain Services Objects
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Part I.  NOS  Directory Data Store(directory service, database)  Located on Domain Controllers (DCs), globally distributed, replicated (no longer PDCs/BDCs)
Designing Active Directory for Security
Managing User and Service Accounts
Securing AD DS Module A 3: Securing AD DS
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Introduction to Microsoft Management Console (MMC) MMC is a common console framework for management applications. MMC provides a common environment for.
Module 11: Read-Only Domain Controllers. Overview Describe the Read-Only Domain Controllers role Use Read-Only Domain Controllers.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Module 5: Implementing Group Policy
 Identify Active Directory functions and Benefits.  Identify the major components that make up an Active Directory structure.  Identify how DNS relates.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Module 8: Implementing an Active Directory Domain ® Services Monitoring Plan.
Module 1: Implementing Active Directory ® Domain Services.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Managing Local Users & Groups. OVERVIEW Configure and manage user accounts Manage user account properties Manage user and group rights Configure user.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
Module 7: Implementing Security Using Group Policy.
Week 4 Objectives Overview of Group Policy Group Policy Processing Implementing a Central Store for Administrative Templates.
Module 10: Implementing Administrative Templates and Audit Policy.
OVERVIEW OF ACTIVE DIRECTORY
Introduction to Active Directory
Module 1: Introduction to Active Directory
1 Chapter Overview Using Group Objects Understanding Default Groups Creating Group Objects Managing Administrative Access.
Module 8: Planning for Windows Server 2008 Active Directory Services.
11 DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE Chapter 7.
Module 8 Implementing Security Using Group Policy.
10.1 © 2004 Pearson Education, Inc. Lesson 10: Specifying Group Policy Settings Exam Microsoft® Windows® 2000 Directory Services Infrastructure.
Designing Group Policy Planning Deployment of Group Policy Troubleshooting Group Policy.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Overview of Active Directory Domain Services Lesson 1.
Managing User and Service Accounts
Assignment # 8.
Overview of Active Directory Domain Services
Implementing Active Directory Domain Services
ACTIVE DIRECTORY ADMINISTRATION
Overview of Active Directory Domain Services
Active Directory Administration
Presentation transcript:

Module 6: Designing Active Directory Security in Windows Server 2008

Module Overview Designing AD DS Security Policies Designing AD DS Domain Controller Security Designing Administrator Security and Delegation

Lesson 1: Designing AD DS Security Policies Fine-Grained Password Policies in Windows Server 2008 What Are Fine-Grained Password Policies? Password Setting Object Attributes How PSOs Are Processed and Applied Guidelines for Designing Fine-Grained Password Policies

Fine-Grained Password Policies in Windows Server 2008 Windows Server 2000 Windows Server 2003 Windows Server 2000 Windows Server 2003 Windows Server 2008

What Are Fine-Grained Password Policies? Fine-grained password policies: Apply only to user objects (or inetOrgPerson objects) and global security groups Cannot be applied to an organizational unit (OU) directly Fine-grained password policies allow you to specify multiple password policies within a single domain Do not interfere with custom password filters that you might use in the same domain

Password Setting Object Attributes PSOs have the following attributes: PSO link Precedence msDS-PSOAppliesTo msDS-PSOApplied

How PSOs Are Processed and Applied Direct Indirect PSO 1 1 Lowest Precedence Value PSO Lowest Precedence Value 3 3 PSO

Guidelines for Designing Fine-Grained Password Policies When designing Fine-Grained Password policies consider the following: Limit the number of PSOs you create for manageability Apply PSOs to groups rather than user accounts Assign a unique msDS-PasswordSettingsPrecedence value for each PSO Understand necessary permissions for managing PSOs: Permissions for linking a PSO is given to the owner of the PSO – not the owner of the linked group or user Settings on the PSO may be considered confidential

Lesson: Designing AD DS Domain Controller Security Key Components that Affect Domain Controller Security Server Core as a Solution for Domain Controller Deployment What is the Security Configuration Wizard? Prerequisites for Deploying RODCs Administrator Role Separation on RODCs

Key Components that Affect Domain Controller Security When designing domain controller security, consider the following potential security risks: Additional applications and services installed  Keep the domain controller clean of other applications Managing software update  Use Windows Server Update Service 3.0 Physical security  Always store domain controllers in a secure location Local logons  Only administrators should log on locally Domain controller security policy  Use the default Domain Controllers OU

Server Core as a Solution for Domain Controller Deployment Server Core supports the following server roles: Server Core reduces: Management requirements AD DS AD LDS DHCP Server DNS Server File Server Media Services Print Server Attack surface Disc space usage Servicing requirements

What is the Security Configuration Wizard? SCW in Windows Server 2008 allows you to: The SCW provides you a detailed and comprehensive way to modify and enhance the security of domain controllers Disable unneeded services based on the server role Remove unused firewall rules and constrain existing firewall rules Define restricted audit policies

Prerequisites for Deploying RODCs The prerequisites for deploying an RODC are as follows: The RODC must forward authentication requests to a writable domain controller running Windows Server 2008 in the same domain The domain functional level must be Windows Server 2003 or higher The forest functional level must be Windows Server 2003 or higher You must run adprep /rodcprep once in the forest One writable domain controller in the domain must be running Windows Server 2008

Administrator Role Separation on RODCs Domain Administrator Local Administrator on an RODC Add and remove users and computers Update drivers Create OUs Change group membership Manage files and printers, install updates Install updates

Lesson 3: Designing Administrator Security and Delegation What Are Administrative Autonomy and Isolation? Guidelines for Creating a Delegation Model Guidelines for Using and Securing Administrator Accounts Auditing Administrative Access

What Are Administrative Autonomy and Isolation? Autonomy - administrators have authority to manage resources independently; however, administrators with greater authority can take control away, if necessary Isolation - administrators have authority to manage a resource independently; no other administrator can take control of the resource

Guidelines for Creating a Delegation Model When creating a delegation model: Represent every instance of every administrative role with a unique security group Use security groups that represent roles for the sole purpose of delegating the roles When delegating data management, as far as possible, delegate permissions only on OUs Unless absolutely required, do not specify permissions on individual objects within an OU When delegating a role, grant permissions that allow only the administrative tasks assigned to the role

Guidelines for Using and Securing Administrator Accounts The following are recommendations for securing administrator accounts: Administrative tasks should be handled by administrative accounts Administrators should always use User Account Control Keep the number of users that are members of built-in administrative groups minimal Legacy built in groups should be emptied from users Separate Domain and Enterprise Administrator roles Rename the Default Administrator Account Create a decoy administrator account

Auditing Administrative Access The Windows Server 2008 audit policy is divided into four subcategories: Directory Service Access Directory Service Changes Directory Service Replication Detailed Directory Service Replication In Windows Server 2008, you can set up AD DS auditing with a audit subcategory to log old and new values when changes are made to objects and their attributes