Securing Internet Access Designing an Internet Acceptable Use Policy Securing Access to the Internet by Private Network Users Restricting Access to Content.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

Chapter Five Users, Groups, Profiles, and Policies.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 4: Web Browsing.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Lesson 17: Configuring Security Policies
Module 12: Providing Secure Internet Access to Network Users
DESIGNING A PUBLIC KEY INFRASTRUCTURE
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
Web Server Administration
14.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
Lesson 19: Configuring Windows Firewall
Lesson 18: Configuring Application Restriction Policies
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
1 Enabling Secure Internet Access with ISA Server.
Printing Terminology. Requirements for Network Printing At least one computer to operate as the print server Sufficient RAM to process documents Sufficient.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
INTRODUCTION TO WEB DATABASE PROGRAMMING
Chapter 7: Using Windows Servers to Share Information.
Using Windows Firewall and Windows Defender
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Hands-On Microsoft Windows Server 2008
Chapter 9: Novell NetWare
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 7: Domain Name System.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Chapter 13 – Network Security
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 5: Managing File Access.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
Designing Active Directory for Security
Microsoft Internet Information Services 5.0 (IIS) By: Edik Magardomyan Fozi Abdurhman Bassem Albaiady Vince Serobyan.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
Course ILT Internet/intranet support Unit objectives Use the Internet Information Services snap-in to manage IIS, Web sites, virtual directories, and WebDAV.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Introduction to Microsoft Management Console (MMC) MMC is a common console framework for management applications. MMC provides a common environment for.
Performing Software Installation with Group Policy Lesson 9.
1 Chapter Overview Publishing Resources in Active Directory Service Redirecting Folders Using Group Policies Deploying Applications Using Group Policies.
1 Administering Shared Folders Understanding Shared Folders Planning Shared Folders Sharing Folders Combining Shared Folder Permissions and NTFS Permissions.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Module 5: Configuring Internet Explorer and Supporting Applications.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Section 11: Implementing Software Restriction Policies and AppLocker What Is a Software Restriction Policy? Creating a Software Restriction Policy Using.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
WEB SERVER SOFTWARE FEATURE SETS
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
(ITI310) By Eng. BASSEM ALSAID SESSIONS 10: Internet Information Services (IIS)
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Chapter 7: Using Windows Servers
Enabling Secure Internet Access with TMG
CONNECTING TO THE INTERNET
Securing the Network Perimeter with ISA 2004
Configuring and Troubleshooting Routing and Remote Access
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
IIS.
Configuring Internet-related services
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Securing Internet Access Designing an Internet Acceptable Use Policy Securing Access to the Internet by Private Network Users Restricting Access to Content on the Internet Auditing Internet Access

Designing an Internet Acceptable Use Policy Policy elements Implementing the policy

Internet Acceptable Use Policy Draft an Internet acceptable use policy before securing Internet access for private network users. An Internet acceptable use policy defines acceptable employee Internet use. Private network users must understand the rules when they use corporate resources to access the Internet. Define the policy before designing the network infrastructure and services that enforce and monitor the policy.

Policy Elements Describe the available services. Define specific user responsibility. Define authorized Internet use. Define unauthorized Internet use. Define who owns resources stored on the organization's computers. Define the consequences of performing unauthorized access. Provide for new technologies.

Implementing the Policy Create a document outlining the newly defined Internet acceptable use policy. Include in the document a contract that employees must sign before gaining Internet access. Have the organization's legal representatives review the contract and the policy to ensure the contract is legally binding.

Making the Decision: Designing an Internet Acceptable Use Policy Develop a fair Internet acceptable use policy. Determine which protocols will be allowed for Internet access. Verify authorized usage and identify unauthorized usage. Enforce the Internet acceptable use policy.

Applying the Decision: Designing an Internet Acceptable Use Policy for Wide World Importers The Internet acceptable use policy needs to describe the consequences of violating the policy. Wide World Importers needs to develop a fair Internet acceptable use policy accepted by both management and employees.

Securing Access to the Internet by Private Network Users Identifying risks when private network users connect to the Internet Restricting Internet access to specific computers Restricting Internet access to specific users Restricting Internet access to specific protocols

Identifying Risks when Private Network Users Connect to the Internet Introducing viruses Deploy a virus scanning solution for all client computers, servers, and entry points to the network. Installing unauthorized software Control software installation through a central network authority. Restrict users to writing data to their hard disks only in common shared areas and their personal profile directories.

Exposing Private Network Addressing

Attempting to Bypass the Established Security

Making the Decision: Reducing Risks when Providing Internet Connectivity Reduce the risk of viruses. Prevent the installation of unauthorized software. Prevent Internet users from revealing the private network addressing scheme. Prevent users from bypassing network security when accessing the Internet.

Applying the Decision: Reducing Risks at Wide World Importers Wide World Importers must include the following tasks in its network security plan: Install virus scanning software at multiple locations on the network. Preconfigure Microsoft Internet Explorer to ensure that security settings are set to restrict download of specific content. Configure the external firewall with Network Address Translation (NAT) service to prevent exposure of the private network addressing scheme on the Internet.

Restricting Internet Access to Specific Computers Configure client computers. Configure the firewall to limit the computers that can connect to the Internet. Configure Internet permissions for network servers.

Servers Requiring Access to the Internet Through an External Firewall

Making the Decision: Designing Firewall Packet Filters to Allow Internet Access Determine which computers are required to respond directly to incoming requests. Determine which computers are required to initiate data exchange with computers on the Internet. Determine if the computers that require access to the Internet have a static IP address or a Dynamic Host Configuration Protocol (DHCP)-assigned IP address. Determine which protocols the computers use when accessing the Internet.

Applying the Decision: Designing Wide World Importers' Firewall Packet Filters

Applying the Decision: Designing Wide World Importers' Firewall Packet Filters (Cont.)

Restricting Internet Access to Specific Users

Microsoft Proxy Server 2.0 Services Web Proxy service Windows Socket (WinSock) Proxy service Socks Proxy service

Authenticating Proxy Server Requests Proxy Server 2.0 supports three methods of authenticating users: Anonymous access Basic authentication Integrated Windows Authentication The Proxy Server update must be downloaded to configure the software to authenticate with Active Directory directory service.

Making the Decision: Restricting Which Users Can Access the Internet Allow all users to access the Internet. Simplify the process of granting users access to Internet protocols. Distinguish users connecting to the proxy service. Specify which users can use the Web Proxy service. Specify which users can use the WinSock Proxy service.

Applying the Decision: Restricting Internet Access at Wide World Importers

Applying the Decision: Restricting Internet Access at Wide World Importers (Cont.)

Restricting Internet Access to Specific Protocols Determining Necessary Protocols Determining Risks of Using Each Protocol Defining Allowed and Disallowed Protocols

Restricting Protocol Access in the Web Proxy Set permissions separately for the Web (HTTP), Secure (HTTPS), Gopher, and FTP Read services to allow only authorized groups to use the protocol. For each protocol, define which groups can access the protocol. Partial permissions to the protocols cannot be assigned.

Restricting Protocol Access in the WinSock Proxy Set permissions for individual protocols in the WinSock Proxy on a per protocol basis. An additional option exists to grant unlimited access to all protocols supported by the Proxy Server. WinSock Proxy supports the most popular protocols. WinSock Proxy also provides access to newer protocols by adding the protocol definitions to the WinSock Proxy. To use the WinSock Proxy service in Proxy Server 2.0, install the WinSock Proxy client at the client computer.

Making the Decision: Determining Which Protocols Can Access the Internet Determine which protocols are required. Determine who requires protocol access. Define allowed protocols. Add new protocols. Allow access to the WinSock Proxy.

Applying the Decision: Determining Which Protocols Can Access the Internet at Wide World Importers Wide World Importers must include the following permissions in its Web Proxy and WinSock Proxy configurations: Configure the Web Proxy to grant access permissions to the Internet Access local group and the IT Access local group for the Web (HTTP), Secure (HTTPS), and FTP Read protocols. Configure the WinSock Proxy to grant unlimited access to the IT Access local group. Configure the WinSock Proxy to grant access permission to the Internet Access group for the File Transfer Protocol (FTP) and Network News Transfer Protocol (NNTP).

Restricting Access to Content on the Internet Preventing access to specific Web sites Using the Internet Explorer Administration Kit (IEAK) to preconfigure settings Managing content downloads Preventing access to specific types of content

Preventing Access to Specific Web Sites

Making the Decision: Preventing Access to Specific Web Sites Identify Web sites that will always be unauthorized for access. Include the domain names in the domain filter list.

Applying the Decision: Preventing Access to Specific Web Sites at Wide World Importers Configure a domain filter for nwtraders.tld to prevent the Proxy Server from allowing access to any Web sites for nwtraders.tld. Ensure that the filter prevents access to any Web site within nwtraders.tld.

The IEAK Allows administrators to preconfigure Internet Explorer settings before deploying Internet Explorer and to update deployments Can be downloaded by searching for "IEAK" Consists of the IEAK Profile Manager and the Internet Explorer Customization Wizard

The IEAK Profile Manager Profile Manager allows administrators to modify existing installations by storing the modified configuration setting in a.ins file. Internet Explorer clients will detect the.ins file and apply those settings when Internet Explorer is configured to Automatically Detect Settings.

Internet Explorer Customization Wizard Allows administrators to define custom settings for all security settings in Internet Explorer Allows configuration of the following security-related options: Enable Automatic Configuration Proxy Settings Define Certification Authorities Define Security Zones Enable Content Rating

Making the Decision: Using the IEAK to Preconfigure Settings Determine the desired configuration of Internet Explorer. Define an installation package that applies the standard configuration. Determine how modifications will be deployed. Prevent modification of the standard configuration.

Applying the Decision: Using the IEAK to Preconfigure Settings for Wide World Importers Wide World Importers currently supports both Internet Explorer and Netscape Navigator. Migrating to a pure Internet Explorer environment and using the IEAK will reduce the cost of deploying the latest version of Internet Explorer and ensure that consistent security settings are deployed. The IEAK will work in the Wide World Importers network because the IEAK supports Microsoft Windows 95, Microsoft Windows 98, Microsoft Windows NT, and Microsoft Windows Use the IEAK Profile Manager to create a modified.ins file and post it on an accessible share on the network. If Internet Explorer is configured to autodetect Proxy settings, the.ins file will be read from the network location and used to apply any modifications.

Internet Explorer Security Zones Internet Explorer allows administrators to manage what content can be downloaded from Web sites. Each security zone is configured with a security setting that defines what content can be downloaded from Web sites in the security zone. Additional zones cannot be added to the predefined zones included with Internet Explorer.

Predefined Security Zones

Internet Explorer Security Zone Level ActiveX Controls and plug-ins

Deploying Internet Explorer Settings Use a mix of IEAK and Group Policy to ensure that correct settings are applied to all Internet Explorer clients. Modify settings from a central location by defining configuration (.ins) files. Secure Internet Explorer by using Group Policy to prevent the display of configuration property pages.

Making the Decision: Managing Content Downloads Allow download of safe content from trusted sites. Allow unrestricted access to content on the private network. Prevent download of harmful content from all Internet sites. Apply security settings that match the Internet acceptable use policy for the organization. Ensure consistent security settings on all client computers.

Applying the Decision: Managing Content Downloads at Wide World Importers Wide World Importers wants to place restrictions that make it difficult to download software from the Internet. Configure the Internet zone to use the High security setting to prevent users from downloading most harmful content from the Internet. Combine the High security setting with deployment of a security template to limit users to creating files in their personal folders and common shared files locations. Ensure that the users are not members of the Power Users group on the local computer.

Preventing Access to Specific Types of Content

Using Plug-Ins to Block Content Restrict access to Web sites that contain unauthorized content by using plug-ins that allow content scanning at the Proxy Server. The Proxy Server will not load the inappropriate materials and will inform the user that the content is blocked. A list of plug-ins for content scanning is available at

Using Internet Explorer Content Advisor The Content Advisor controls what content can be displayed in the browser windows by using the Recreational Software Advisory Council on the Internet (RSACi) rating system. RSACi classifies Internet content in four categories, based on language, nudity, sex, and violence. When the Content Advisor is enabled, Internet Explorer scans the HTML source code for RSACi ratings contained in HTML metatags. Define what action to take if a site is unrated. Blocking access to unrated sites might deny access to inoffensive sites as well. Prevent users from changing the content ratings by either Locking the Content Advisor settings with a supervisor password Preventing access to the Content tab in the Internet Explorer Properties dialog box

Making the Decision: Preventing Access to Specific Types of Content Define the organization's policy on obscene content. Define what content must be blocked. Define what actions to take when an unrated Web site is accessed. Prevent users from changing content settings. Ensure that all settings for Internet Explorer installations are consistent.

Applying the Decision: Preventing Access to Internet Content for Wide World Importers Define restrictions in the Content Advisor to prevent access to sites that contain nudity, sex, and violence. Enable content ratings for all Internet Explorer clients to ensure consistent application of the restrictions. Configure the settings using the IEAK so that the required settings are configured as the default settings. Configure the IEAK to ensure that Internet Explorer clients are configured to autoconfigure settings and will download any modified content settings. Use Group Policy to prevent access to the Content tab of the Internet Explorer Properties dialog box.

Auditing Internet Access Proxy Server 2.0 Audit logs Logging configuration: regular or verbose Logging fields

Designing Proxy Server Auditing

Audit Logs The log data allows administrators to review all Internet access. Written text files are stored in the systemroot\system32\MSPlogs folder, where systemroot is the folder where Windows 2000 is installed. New log files can be created every day, week, or month. Proxy Server maintains the following logs: Web Proxy log (W3yymmdd.log) WinSock Proxy log (Wsyymmdd.log) Socks Proxy log (Spyymmdd.log) Logging can be configured to use either regular or verbose logging.

ODBC–Compliant Database Logging Advantage: Open Database Connectivity (ODBC) logging has improved search and management capabilities to review the logged data. Disadvantage: ODBC logging uses more processor time than text-based logging. Before implementing ODBC logging, determine whether the Proxy Server has any processor resource issues.

Log Reviews Ensure that reviewing the logs is one of the Proxy Server administrator’s regular assignments. Unless the logs are reviewed, there is no way to ensure that the Proxy Server is functioning as expected. If ODBC logging is used, the database product provides query mechanisms to find data related to a specific user or protocol. If text logging is used, consider purchasing a third- party product that provides reporting options for text- based log files.

Making the Decision: Implementing Internet Access Logging Examine Internet usage from the private network. Conserve disk space related to logging at the Proxy Server. Ensure that all information of a proxied session can be analyzed.

Applying the Decision: Implementing Logging at Wide World Importers Wide World Importers must enable logging of the Web Proxy and WinSock Proxy services. Log to an ODBC data source such as SQL Server to view the logs. Configure the Proxy Server to use verbose logging.

Chapter Summary Determining contents of the policy Identifying risks when private network users connect to the Internet Restricting Internet access to specific computers Restricting Internet access to specific users Restricting Internet access to specific protocols Preventing access to specific Web sites Using the IEAK to preconfigure settings Managing content downloads Preventing access to specific types of content Designing Proxy Server auditing