Module 10: Implementing Administrative Templates and Audit Policy.

Slides:



Advertisements
Similar presentations
Guide to MCSE , Enhanced 1 Activity 14-1: Browsing Security Templates Objective: To become familiar with built-in security templates Start  Run.
Advertisements

Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Lesson 17: Configuring Security Policies
 Overview User Accounts Groups User Rights Permissions.
Managing User Settings with Group Policy
Module 4: Implementing User, Group, and Computer Accounts
Chapter 7 HARDENING SERVERS.
6.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 14: Windows Server 2003 Security Features.
Hands-On Microsoft Windows Server 2003 Administration Chapter 4 Managing Group Policy.
12.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
MIS Chapter 91 Ch. 9 – Implement and Use Group Policy MIS 431 – created Spring 2006.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
7.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 7: Introducing Group Accounts.
Guide to MCSE , Enhanced 1 Activity 9-1: Creating a Group Policy Object Using the MMC Objective: To create a GPO using the Group Policy Object Editor.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Corso referenti S.I.R.A. – Modulo 2 Local Security 20/11 – 27/11 – 05/12 11/12 – 13/12 (gruppo 1) 12/12 – 15/12 (gruppo 2) Cristiano Gentili, Massimiliano.
Module 8: Implementing Administrative Templates and Audit Policy.
Event Viewer Was of getting to event viewer Go to –Start –Control Panel, –Administrative Tools –Event Viewer Go to –Start.
Deploying and Managing Software by Using Group Policy.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Module 2: Managing User and Computer Accounts
Microsoft ® Official Course Module 9 Configuring Applications.
1 Chapter Overview Monitoring Server Performance Monitoring Shared Resources Microsoft Windows 2000 Auditing.
1 Chapter Overview Planning an Audit Policy Implementing an Audit Policy Using Event Viewer.
Working with Workgroups and Domains
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Week 6 - Implement Group Policy
September 18, 2002 Introduction to Windows 2000 Server Components Ryan Larson David Greer.
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
Securing Microsoft® Exchange Server 2010
Hands-On Microsoft Windows Server 2008
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Module 6: Designing Active Directory Security in Windows Server 2008.
Configuring Encryption and Advanced Auditing
1 Objectives Audit Policies Update and maintain your clients using Windows Server Update Service Microsoft Baseline Security Analyzer Windows Firewalls.
Module 14: Configuring Server Security Compliance
Securing AD DS Module A 3: Securing AD DS
Module 7: Fundamentals of Administering Windows Server 2008.
Module 9: Preparing to Administer a Server. Overview Introduction to Administering a Server Configuring Remote Desktop to Administer a Server Managing.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Module 2: Managing User and Computer Accounts. Overview Creating User Accounts Creating Computer Accounts Modifying User and Computer Account Properties.
Introduction to Microsoft Management Console (MMC) MMC is a common console framework for management applications. MMC provides a common environment for.
Module 6: Configuring User Environments Using Group Policy.
Module 5: Configuring Internet Explorer and Supporting Applications.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Module 5: Implementing Group Policy
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Module 3: Managing a Microsoft ® Windows ® Small Business Server Environment.
Module 6: Deploying and Managing Software by Using Group Policy.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Managing Local Users & Groups. OVERVIEW Configure and manage user accounts Manage user account properties Manage user and group rights Configure user.
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 21 Administering User Accounts and Groups 1.
1 Introduction to Auditing Auditing allows you to track User activities. Microsoft Windows 2000 activities. Windows 2000 records events in the security.
NetTech Solutions Security and Security Permissions Lesson Nine.
Administering Groups Chapter Eight. Exam Objectives In this Chapter:  Plan a security group hierarchy based upon delegation requirements  Plan a security.
Week 4 Objectives Overview of Group Policy Group Policy Processing Implementing a Central Store for Administrative Templates.
Understand Audit Policies LESSON Security Fundamentals.
Windows Server 2003 群組原則設定與管理 林寶森
L Identify the “out-of-the-box” audit settings l Identify recommended minimum audit settings l Configure security event log settings to meet recommendations.
Windows Server 2003 群組原則設定與管理 林寶森
Module 8: Implementing Group Policy. Overview Multimedia: Introduction to Group Policy Implementing Group Policy Objects Implementing GPOs on a Domain.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
Module 10: Managing and Monitoring Network Access
Bethesda Cybersecurity Club
Security Templates Lecture 7.
Module 8: Implementing Group Policy
Presentation transcript:

Module 10: Implementing Administrative Templates and Audit Policy

Overview Overview of Security in Windows Server 2003 Using Security Templates to Secure Computers Testing Computer Security Policy Configuring Auditing Managing Security Logs

Lesson: Overview of Security in Windows Server 2003 What Are User Rights? User Rights vs. Permissions User Rights Assigned to Built-in Groups How to Assign User Rights

What Are User Rights? Examples of User Rights

User Rights vs. Permissions User Rights: Actions on System User Rights: Actions on System Permissions: Actions on Object

User Rights Assigned to Built-in Groups Built-in local groups: Administrators Backup Operators Power Users Remote Desktop Users Users Administrators Backup Operators Power Users Remote Desktop Users Users Groups in Builtin container: Account Operators Administrators Backup Operators Pre-Windows 2000 Compatible Access Print Operators Server Operators Account Operators Administrators Backup Operators Pre-Windows 2000 Compatible Access Print Operators Server Operators Groups in Users container: Domain Admins Enterprise Admins Domain Admins Enterprise Admins

How to Assign User Rights Your Instructor will demonstrate how to manually assign user rights

Practice: Assigning User Rights In this practice, you will:  Remove a user right and test if it was removed  Add a user right and test if it was added

Lesson: Using Security Templates to Secure Computers What Is a Security Policy? What Are Security Templates? What Are Security Template Settings? How to Create a Custom Security Template How to Import a Security Template

What Is a Security Policy?

What Are Security Templates? TemplateDescription Default Security (Setup security.inf) Specifies default security settings Domain Controller Default Security (DC security.inf) Specifies default security settings updated from Setup security.inf for a domain controller Compatible (Compatws.inf) Modifies permissions and registry settings for the Users group to enable maximum application compatibility Secure (Securedc.inf and Securews.inf) Enhances security settings that are least likely to impact application compatibility Highly Secure (Hisecdc.inf and Hisecws.inf) Increases the restrictions on security settings System Root Security (Rootsec.inf) Specifies permissions for the root of the system drive

What Are Security Template Settings? Security Template: Setup Security Sample of Settings

How to Create a Custom Security Template Your instructor will demonstrate how to: Customize a predefined security template Create a new security template Customize a predefined security template Create a new security template

How to Import a Security Template Your instructor will demonstrate how to: Import a security template to a local computer Import a security template to a GPO Import a security template to a local computer Import a security template to a GPO

Practice: Using Security Templates to Secure Computers In this practice, you will:  Create a security template  Import a security template to a GPO

Lesson: Testing Computer Security Policy What is the Security Configuration and Analysis tool? How to Test Computer Security

What is the Security Configuration and Analysis tool? Template Setting Actual Setting Setting That Does Not Match Template

How to Test Computer Security Your instructor will demonstrate how to analyze security settings on a computer by using Security Configuration and Analysis

Practice: Testing Computer Security In this practice, you will:  Create a custom security template  Analyze the security settings on your computer with the security settings in the custom security template

Lesson: Configuring Auditing What Is Auditing? What Is Audit Policy? Types of Events to Audit Guidelines for Planning an Audit Policy How to Enable an Audit Policy How to Enable Auditing for Files and Folders How to Enable Auditing for Active Directory Objects Best Practices for Configuring Auditing

What Is Auditing? Auditing tracks user and operating system activities and records selected events in security logs Enable auditing to:  Create a baseline  Detect threats and attacks  Determine damages  Prevent further damage Audit access to objects, management of accounts, and users logging on and logging off What occurred? When? Who did it? What was the result?

What Is Audit Policy? An audit policy determines the security events that will be reported to the network administrator Set up an audit policy to:  Track success or failure of events  Minimize unauthorized use of resources  Maintain a record of activity Security events are stored in security logs

Types of Events to Audit Account Logon Account Management Directory Service Access Logon Object Access Policy Change Privilege Use Process Tracking System

Guidelines for Planning an Audit Policy Determine the computers to set up auditing on Determine which events to audit Determine whether to audit success or failure events Determine whether you need to track trends Review security logs frequently

How to Enable an Audit Policy Your instructor will demonstrate how to: Configure an audit policy on a local computer Configure an audit policy on a domain or organizational unit Configure an audit policy on a local computer Configure an audit policy on a domain or organizational unit

How to Enable Auditing for Files and Folders Your instructor will demonstrate how to enable auditing for files and folders

Practice: Enabling Auditing for Files and Folders In this practice, you will enable auditing for files and folders

How to Enable Auditing for Active Directory Objects Your instructor will demonstrate how to: Delegate an account for auditing Enable auditing for an organizational unit Delegate an account for auditing Enable auditing for an organizational unit

Practice: Enabling Auditing for an Organizational Unit In this practice, you will enable auditing for an organizational unit

Best Practices for Configuring Auditing Audit success events in the directory service access category Audit success events in the object access category Audit success and failure events in the system category Audit success and failure events in the policy change category on domain controllers Audit success and failure events in the account management category Audit success events in the logon category Audit success events in the account logon category on domain controllers Set an appropriate size for the security log

Lesson: Managing Security Logs What Are Log Files? Common Security Events Tasks Associated with Managing the Security Log Files How to Manage Security Log File Information How to View Security Log Events

What Are Log Files? Application Security System Directory service File Replication service The following logs are available in Event Viewer:

Common Security Events Logon Event Description Event ID 528 Successful logon Event ID 529 Unsuccessful logon attempt Event ID 539 Attempts to log on to a locked out account File OwnershipEvent Description Event ID 578 Change in file ownership Security LogEvent Description Event ID 517 Security log cleared ShutdownEvent Description Event ID 513 System is shut down

Tasks Associated with Managing the Security Log Files

How to Manage Security Log File Information Your instructor will demonstrate how to: Manage security log files by using Computer Management Manage security log files by using Group Policy Manage security log files by using Computer Management Manage security log files by using Group Policy

How to View Security Log Events Your instructor will demonstrate how to: Filter security log files View security log files Filter security log files View security log files

Practice: Managing Log File Information In this practice, you will:  Configure security log properties  Verify the events being recorded in a security log file

Lab A: Managing Security Settings In this lab, you will:  Create a custom security template  Test your computer configuration against the custom security template  Deploy the custom security template by using Group Policy  Audit security of an organizational unit

Course Evaluation