1 Objectives Audit Policies Update and maintain your clients using Windows Server Update Service Microsoft Baseline Security Analyzer Windows Firewalls.

Slides:



Advertisements
Similar presentations
Guide to MCSE , Enhanced 1 Activity 14-1: Browsing Security Templates Objective: To become familiar with built-in security templates Start  Run.
Advertisements

Chapter 10 Securing Windows Server 2008 MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Lesson 17: Configuring Security Policies
Managing User Settings with Group Policy
1 Chapter Overview Understanding NTFS Permissions Assigning NTFS Permissions Assigning Special Permissions.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 14: Windows Server 2003 Security Features.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
12.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
Maintaining and Updating Windows Server 2008
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
1 Chapter Overview Managing Compression Managing Disk Quotas Increasing Security with EFS Using Disk Defragmenter, Check Disk, and Disk Cleanup.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
1 Securing Network Resources Understanding NTFS Permissions Assigning NTFS Permissions Assigning Special Permissions Copying and Moving Files and Folders.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Corso referenti S.I.R.A. – Modulo 2 Local Security 20/11 – 27/11 – 05/12 11/12 – 13/12 (gruppo 1) 12/12 – 15/12 (gruppo 2) Cristiano Gentili, Massimiliano.
Module 8: Implementing Administrative Templates and Audit Policy.
Event Viewer Was of getting to event viewer Go to –Start –Control Panel, –Administrative Tools –Event Viewer Go to –Start.
Guide to MCSE , Enhanced 1 Activity 10-1: Restarting Windows Server 2003 Objective: to restart Windows Server 2003 Start  Shut Down  Restart Configure.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
1 Chapter Overview Monitoring Server Performance Monitoring Shared Resources Microsoft Windows 2000 Auditing.
Ch 11 Managing System Reliability and Availability 1.
1 Chapter Overview Planning an Audit Policy Implementing an Audit Policy Using Event Viewer.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Week 6 - Implement Group Policy
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
September 18, 2002 Introduction to Windows 2000 Server Components Ryan Larson David Greer.
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
Hands-On Microsoft Windows Server 2008
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
C HAPTER 6 NTFS PERMISSIONS & SECURITY SETTING. INTRODUCTION NTFS provides performance, security, reliability & advanced features that are not found in.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 5: Managing File Access.
Module 14: Configuring Server Security Compliance
Module 7: Fundamentals of Administering Windows Server 2008.
Managing User Desktops with Group Policy
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Managing Groups, Folders, Files and Security Local Domain local Global Universal Objects Folders Permissions Inheritance Access Control List NTFS Permissions.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Introduction to Microsoft Management Console (MMC) MMC is a common console framework for management applications. MMC provides a common environment for.
Module 6: Configuring User Environments Using Group Policy.
1 Administering Shared Folders Understanding Shared Folders Planning Shared Folders Sharing Folders Combining Shared Folder Permissions and NTFS Permissions.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Maintaining and Updating Windows Server Monitoring Windows Server It is important to monitor your Server system to make sure it is running smoothly.
Module 5: Implementing Group Policy
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
Administering Group Policy Chapter Eleven. Exam Objectives in this Chapter  Plan a Group Policy strategy using Resultant Set of Policy Planning mode.
1 Introduction to Auditing Auditing allows you to track User activities. Microsoft Windows 2000 activities. Windows 2000 records events in the security.
NetTech Solutions Security and Security Permissions Lesson Nine.
Module 10: Implementing Administrative Templates and Audit Policy.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Maintaining and Updating Windows Server 2008 Lesson 8.
Unit 8 NT1330 Client-Server Networking II Date: 2?10/2016
11 SUPPORTING WINDOWS XP FILE AND FOLDER ACCESS Chapter 5.
1 Administering a Security Configuration Security Configuration Overview Auditing Using Security Logs User Rights Using Security Templates Security Configuration.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
11 DEPLOYING AN UPDATE MANAGEMENT INFRASTRUCTURE Chapter 6.
Module Overview Installing and Configuring a Network Policy Server
Presentation transcript:

1 Objectives Audit Policies Update and maintain your clients using Windows Server Update Service Microsoft Baseline Security Analyzer Windows Firewalls Security Configuration and Security Templates

Understanding Auditing Auditing: The process of tracking both user activities and Windows activities, called events. Auditing is used to specify which events are written to the security log. An audit entry in the security log contains –The action that was performed. –The user who performed the action. –The success or failure of the event and when the event occurred.

Configuring Auditing: Overview An audit policy is implemented based on the role of the computer in the Windows Network. Computer Roles For member or stand-alone servers and Client PCs (XP, Vista) –An audit policy is set for each individual computer. –Events are audited by configuring a local group policy for that computer. –An audit policy of the Domain or OU the computers belong Domain controllers –An audit policy is set for all domain controllers in the domain. –Events are audited by configuring the audit policy in a nonlocal GPO for the domain, which applies to all DCs and is accessible through the Domain Controllers OU. For member or stand-alone servers and Client PCs (XP, Vista) –An audit policy is set for each individual computer. –Events are audited by configuring a local group policy for that computer. –An audit policy of the Domain or OU the computers belong Domain controllers –An audit policy is set for all domain controllers in the domain. –Events are audited by configuring the audit policy in a nonlocal GPO for the domain, which applies to all DCs and is accessible through the Domain Controllers OU.

Setting Up Auditing -- Two Steps Step 1 - Set the audit policy: Enables auditing of objects but does not activate auditing of specific types Stept 2 - Enable auditing of specific resources: The specific events to track for files, folders, printers, and Active Directory objects must be identified –Windows then tracks and logs the specified events.

Step 1 - Setting Up an Audit Policy Select Categories of events that Windows audit. Configuration settings indicate whether to track successful or failed attempts for each event category to be audited. Audit policy is part of Group Policy and is configured via Group Policy Management. The security log is limited in size. The events to be audited must be selected carefully. The amount of disk space to devote to the security log must be considered.

Types of Events Audited by Windows Account logon Account management Directory service access Logon events Object access Policy change Privilege use Process tracking System events

New in Server new Sub-Categories –E.g. Object Access have 11 sub-categories: § File System § Registry § Kernel Object § SAM § Certification Services § Application Generated § Handle Manipulation § File Share § Filtering Platform Packet Drop § Filtering Platform Connection § Other Object Access Events Enable Audit using Group Policy Management Console will enable all Sub-Categories and create a lot un-wanted auditing Use AuditPol.exe to manually enable sub-category

General Audit Policy Guidelines Determine the computers on which to set up auditing. –Auditing is turned off by default. Plan the events to audit on each computer. Determine whether to audit the success of events, failure of events, or both. –Tracking successful events identifies which users gained access to specific files, printers, or objects, information that can be used for resource planning. –Tracking failed events may alert the administrator of possible security breaches.

Other Policy Guidelines and Considerations Determine whether to track trends of system usage. Review security logs frequently. Define an audit policy that is useful and manageable. Audit resource access by the Everyone group instead of the Users group. Audit all administrative tasks by the administrative groups. The Manage Auditing And Security Log user right for the computer is necessary to configure an audit policy or review an audit log.

AUDIT POLICY

DEFAULT DOMAIN CONTROLLER AUDIT POLICY

Step 2 – Enable Auditing Specific Resources Files and folders to be audited must be on Microsoft Windows NTFS volumes. After Audit Object Access is set in the audit policy, auditing for specific files and folders is enabled, specifying which types of access to audit, either by users or by groups.

User Events Traverse Folder/Execute File List Folder/Read Data Read Attributes and Read Extended Attributes Create Files/Write Data Create Folders/Append Data Write Attributes and Write Extended Attributes Delete Subfolders And Files Read Permissions Change Permissions Take Ownership

Auditing Access to Printers Use auditing to track access to sensitive printers. Use the same procedure used to set up auditing on files and folders. Set the Audit Object Access event category in the audit policy, which includes printers.

Auditing Entry For Dialog Box Enable auditing for specific printers and specify the types of access, and by whom, to audit.

Auditing Access to Active Directory Objects Similar to auditing file and folder access. An audit policy must be configured, and then auditing for specific objects must be set by specifying which types of access, and by whom, to audit.

Active Directory Object Events Full Control List Contents Read All Properties Write All Properties Create All Child Objects Delete All Child Objects Read Permissions Modify Permissions Modify Owner

Recommended Audit Events

Security Log Overview The security log contains information on security events specified in the audit policy. Use the Event Viewer to view. Events can be viewed from any computer with assigned administrative privileges for the computer where the events occurred. Event Viewer also allows specific events within the log files to be found, the events shown in log files to be filtered, and archive security log files to be archived.

Event Viewer

The Find In Dialog Box  The Find command is used to search for specific events.

Options on the Find In Dialog Box

Configuring Security Logs Security logging begins when an audit policy is set Security logging stops when the security log becomes full and cannot overwrite itself; an error may be written to the application log. Log Properties can be configured. –E.g. Allow overwrite earliest records when log is full Manually clear the log and erase all events permanently.

Archiving Security Logs Archived logs often are kept for a specified period, to track security-related information over time and maintain a history of security-related events. The entire log is saved, regardless of filtering options. Logs saved as event logs (.evt) retain the binary data for each event recorded and can be viewed by Event Viewer Logs archived in text or comma-delimited format (.txt and.csv, respectively) can be reopened in other programs, such as word processing or spreadsheet programs. It will loose binary data. An archived log is removed from the system by deleting the file in Windows Explorer.

Updating Windows Server 2008 Windows Update (in Control Panel) –Suite of tools and services for applying updates to systems –Responsible for download and install updates from Microsoft –Requires access to the Internet 25

Windows Server Update Services Centralizes the updating tasks for client and server Benefits of WSUS –Centralizes update management –Minimizes effects on the WAN connection –Improves network security and reliability –Improves installation of relevant updates –Targets updates to specific computers and computer groups Basic requirements before installing WSUS 3.0 SP1 –Microsoft Internet Information Services (IIS) 7.0 –Microsoft Report Viewer Redistributable 2005 –Minimum of 6 GB of free space for storing downloaded updates 26

Working with WSUS –WSUS Administrative console allows you to: Generate reports Manage updates Monitor the computer through the console 27

28

Windows Server Update Services (continued) Configuring clients –After WSUS has been installed and configured in the WSUS console Your clients need to be configured to use the WSUS server for updates Approving and deploying updates –Using the Update Services console, you can control Which updates are applied Which computers receive the updates When the updates are distributed 29

Microsoft Baseline Security Analyzer 2.1 A tool for beginning to analyze your current security posture MBSA scans for missing security updates for the following products –Windows 2000 SP4 and later –Microsoft Office XP and later –Microsoft Exchange Server 2000 and later –Microsoft SQL Server 2000 SP4 and later MBSA –Free download from Microsoft –Can be used on a local computer or to connect to one or more remote computers on your network Options for running MBSA on remote computers –Domain name and IP address range 30

Microsoft Baseline Security Analyzer (Continue) When MBSA scans a computer, it creates a report that is organized into the following areas –Security Assessment –Security Update Scan Results –Windows Scan Results –Internet Information Services (IIS) Scan Results –SQL Server Scan Results –Desktop Application Scan Results Scanning a computer with MBSA –You can perform MBSA scans using: The GUI-based tool The mbsacli.exe command- line tool –One requirement of MBSA is Internet connectivity 31

Basic Windows Firewall By default, Windows Firewall is turned on and allows exceptions for programs and ports Allows you to create exceptions for inbound traffic Exception –Instruction to open a port briefly, allow a program or service to pass information, and then close the port 32

Windows Firewall with Advanced Security –Used to manage Windows Firewall based on port, services, applications, and protocols 33

Windows Firewall w/Advanced Security (continued) Configuring Network profiles –Public –Private –Domain Deploying Windows Firewall Settings via Group Policy – WFAS allows you to import or export firewall policies 34

Predefined Security Templates Administrator may design a custom security template

Applying Security Templates Can be applied to either the local machine or the domain via GPOs To apply to a local machine, run secpol.msc To apply to several computers using GPO, use Group Policy Management. Settings applied using Group Policy will always override local settings Group policy security settings refreshed at reboot, at 90-minute intervals for servers and workstations, and every 5 minutes on domain controllers

Applying Security Templates

Using the Secedit Command-Line Tool Used to create and apply security templates and analyze security settings Main switches include: –/analyze –/CFG filename –/configure –/DB filename –/export –/GenerateRollback –/import –/log filename –/quiet –/validate –/verbose

Security Configuration Wizard Security Configuration Wizard (SCW) –Step-by-step wizard for hardening your network servers Security policies can be created for: –Role-based service configuration –Network security –Registry settings –Audit policy 39

Security Configuration and Analysis Tool Allows administrators to compare current system settings to a previously configured security template

Analyzing System Security using the Security Configuration and Analysis Snap-in (continued) Configure Computer Now to apply settings to local computer Analyze Computer Now to compare local computer setting with the security template

Analyzing System Security using the Security Configuration and Analysis Snap-in (continued)