Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.

Slides:



Advertisements
Similar presentations
Agenda 2 factor authentication Smart cards Virtual smart cards FIM CM
Advertisements

5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
Planning a Public Key Infrastructure
Deploying and Managing Active Directory Certificate Services
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Chapter 9 Deploying IIS and Active Directory Certificate Services
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
Agenda Introduction Network Access Protection platform architecture
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Network Access Protection Platform Architecture Joseph Davies Technical writer Windows Networking and Device Technologies Microsoft Corporation.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Chapter 11: Active Directory Certificate Services
Jayson Ferron CIO Interactive Security Training WSV206.
Security and Policy Enforcement Mark Gibson Dave Northey
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
CN2140 Server II Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Sreenivas Addagatla - Development Lead Lambert Green - Test Lead Microsoft Corporation.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Maintaining Network Health Lesson 10. Skills Matrix Technology SkillObjective DomainObjective # Understanding the Components of NAP Configure Network.
Configuring Active Directory Certificate Services Lesson 13.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Microsoft ® Official Course Module 8 Deploying and Managing Certificates.
Clinic Security and Policy Enforcement in Windows Server 2008.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Deploying PKI Inside Microsoft The experience of Microsoft in deploying its own corporate PKI Published: December 2003.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
70-411: Administering Windows Server 2012
Implementing Network Access Protection
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Module 8: Configuring Network Access Protection
Configuring Directory Certificate Services Lesson 13.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
Module 9: Fundamentals of Securing Network Communication.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
Configuring Network Access Protection
70-412: Configuring Advanced Windows Server 2012 services
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Creating and Managing Digital Certificates Chapter Eleven.
Module 13: Enterprise PKI Active Directory Certificate Services (AD CS)
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Module 6: Network Policies and Access Protection.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Module 5: Network Policies and Access Protection
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
Building and extending the internal PKI
Maintaining Network Health Lesson 10. Active Directory Certificates Services 2 A component of Microsoft Identity Lifecycle Management (ILM) ILM allow.
Managing Network Access Protection. Introduction to NAP Issues  Although corporate networks are highly secured, no control over the configuration of.
Key management issues in PGP
Maintaining Network Health
Basharat Institute of Higher Education
Implementing Network Access Protection
Configuring and Troubleshooting Routing and Remote Access
Module 8: Securing Network Traffic by Using IPSec and Certificates
CIS 409Competitive Success/tutorialrank.com
Server-to-Client Remote Access and DirectAccess
Module 8: Securing Network Traffic by Using IPSec and Certificates
Install AD Certificate Services
Presentation transcript:

Maintaining Network Health

Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the entity you think you are. Allows two parties to communicate though an algorithm know as public key cryptography. Each client has a public key and a private key No need for a pre-shared key Combining the two allows us to communicate securely This is more efficient than a pre-shared key.

PKI Terms Certification Authority(CA) – issues and manages digital certificates for the PKI Digital Certificate – digital document that contains information about a particular user, computer, or device. Holds the public key. Smart Cards – credit card like devices that have a digital certificate installed on them. Used to log into resources. Self-enrollment – Allows users to request their own certificates. Autoenrollment – Automatically enroll for certificates. Recovery Agents – Used to recovery lost certificates.

PKI Terms continued Web Enrollment – self enrollment through a Web Browser. Online Responder – responds to requests from clients about the status of a specific certificate. Standalone CA – not integrated with AD. Enterprise CA – integrated with AD, ideal implementation Installing Certificate Services is a Role we can select.

Managing Certificate Enrollments In and AD environment you can automate the distribution of certificates. This is controlled through Group Policy In non-Active Directory environments you must manually enroll for certificates. Use the certificate wizard in the Certificates MMC. Enroll through the web by typing the in the servers web address in a web browser.

Maintaining a Server 08 CA Be sure to designate a Recovery Agent incase of lost certificates. Only the Recovery Agent can recover these. You can assign users to one or more of the following predefined security roles: CA Administrator – overall management Certificate manager – issuing and managing certificates Backup operator – back up and restore OS files and folders and CA information Auditors – Able o manage and read security logs on a computer running AD CS role.

Introducing Network Access Protection NAP helps protect from “unhealthy” computers from coming onto the network. Connecting computers are “evaluated” If they meet the criteria of the NAP policy they are permitted access to the network If they do not the criteria they are either: Denied access to the network Sent to Remediation network Remediation servers allow noncompliant computers to become compliant. IE. The remediation network my have the antivirus software available for install.

NAP enforcement Methods DHCP enforcement – easiest method. If the NAP client is out of compliance the DHCP server will assign an address with limited access. IPSec enforcement – uses health certificates. If a client is out of compliance it will not get the health certificate and therefore wont be able to communicate through IPSec or on the network. VPN enforcement – restricts the level of access that a remote client can obtain. IE. Work laptops get full access, home laptops get limited access 802.1X enforcement – restricts on physical connections

NAP demonstration

Lesson 10 You Learned (cont.) A PKI allows two parties to communicate securely without ever having communicated with one another before in any previous communication through the use of a mathematical algorithm called public key cryptography.

Lesson 10 You Learned (cont.) PKI certificates are managed through Certificate Authorities that are hierarchical, which means that you can have many subordinate CAs within an organization that chain upward to a single root CA. A Certificate Revocation List (CRL) identifies certificates that have been revoked or terminated.

Lesson 10 You Learned (cont.) Web enrollment allows users to connect to a Windows Server 2008 CA through a Web browser to request certificates and obtain an up- to-date Certificate Revocation List.

Lesson 10 You Learned (cont.) When deploying a Windows-based PKI, two different types of CAs can be deployed: enterprise CAs and standalone CAs. A standalone CA is not integrated with Active Directory and relies on administrator intervention to respond to certificate requests.

Lesson 10 You Learned (cont.) An enterprise CA integrates with Active Directory. It can use certificate templates as well as Group Policy Objects to allow for auto- enrollment of digital certificates, as well as store digital certificates within the Active Directory database for easy retrieval by users and devices.

Lesson 10 You Learned (cont.) Network Access Protection (NAP) is a policy enforcement mechanism that is used to allow or reject access to Windows network resources on the basis of policy decisions, such as whether the Windows Firewall is turned on or if anti-virus signatures are up to date.

Lesson 10 You Learned (cont.) NAP can be configured with one of four built-in enforcement mechanisms: DHCP, 802.1X, IPSec, and VPN. The NAP client includes one or more System Health Agents (SHAs), which map to System Health Validators (SHVs) within the NAP server architecture.