Module 3 l Objectives –Identify the security risks associated with specific NT Services –Understand the risk introduced by specific protocols –Identify.

Slides:



Advertisements
Similar presentations
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Advertisements

CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Module 4: Implementing User, Group, and Computer Accounts
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
LAN Protocols and TCP/IP © N. Ganesan, Ph.D.. Module A Preview of Major LAN Protocols.
Lesson 17 – UNDERSTANDING OTHER NETWARE SERVICES.
Overview of Client Configuration By Nanda Ganesan, Ph.D. © Nanda Ganesan.
By Rashid Khan Lesson 4-Preparing to Serve: Understanding Microsoft Networking.
Hussain Ali Department of Computer Engineering KFUPM, Dhahran, Saudi Arabia Microsoft Networking.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Installing and Maintaining ISA Server. Planning an ISA Server Deployment Understand the current network infrastructure Review company security policies.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Overview of Client Configuration By Nanda Ganesan, Ph.D. © Nanda Ganesan.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
1 Module 12 Configuring Windows NT Protocols. 2  Overview Using the Network Program in Control Panel TCP/IP NWLink NetBEUI Configuring Network Bindings.
Avanade: 10 tips for å sikring av dine SQL Server databaser Bernt Lervik Infrastructure Architect Avanade.
VPRC Domain Migration Migrating resources from the VPRC domain to the ASURITE domain.
1 Chapter Overview Understanding the Windows 2000 Networking Architecture Using Microsoft Management Console.
Overview of Active Directory Domain Services Lesson 1.
Chapter 8 Hardening Your SQL Server Instance. Hardening  Hardening The process of making your SQL Server Instance more secure  New features Policy based.
Intranet, Extranet, Firewall. Intranet and Extranet.
Overview: Identify the Internet protocols and standards Identify common vulnerabilities and countermeasures Identify specific IIS/WWW/FTP concerns Identify.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 12: Routing.
1 Chapter Overview Installing the TCP/IP Protocols Configuring TCP/IP.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Overview of Client Configuration By Nanda Ganesan, Ph.D. © Nanda Ganesan.
Networking Functions of windows NT Sever
Windows 7 Firewall.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
Module 11: Remote Access Fundamentals
8.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 8: Planning.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Chapter Two Clients and Servers: Who’s the Boss?.
Networking in Windows NT Layered Network Architecture Network Interface Card Network Adapter Card Drivers NDIS InterfaceStreams Transport Protocols.
 Identify Active Directory functions and Benefits.  Identify the major components that make up an Active Directory structure.  Identify how DNS relates.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Microsoft enterprise concepts. NT Layered Network Architecture Network Interface Card Network Adapter Card Drivers NDIS InterfaceStreams Transport Protocols.
INFORMATION SECURITY UNIX & DB2. Introduction THE OBJECTIVE IS TO DESIGN SECURITY MEASURES FOR A MILITARY SYSTEM SYSTEM RUNNING A DB2 SERVER ON UNIX FOCUS.
Module 5: Designing Security for Internal Networks.
1 Installing and Maintaining ISA Server Planning an ISA Server Deployment Understand the current network infrastructure. Review company security.
Small Business Security Keith Slagle April 24, 2007.
Managing Local Users & Groups. OVERVIEW Configure and manage user accounts Manage user account properties Manage user and group rights Configure user.
Module 11: Designing Security for Network Perimeters.
Module 9: Designing Security for Data. Overview Creating a Security Plan for Data Creating a Design for Security of Data.
Lecture 6: Examples on Windows Operating Systems.
1 Firewall Rules. 2 Firewall Configuration l Firewalls can generally be configured in one of two fundamental ways. –Permit all that is not expressly denied.
Module 10: Windows Firewall and Caching Fundamentals.
Module 11: Designing an Active Directory Federation Services Implementation in Windows Server 2008.
1 © Copyright N Ganesan CHAPTER Exploring the Installed Network Properties.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
MIS Chapter 41 Chapter 4 – Implementing and Managing Group and Computer Accounts MIS 431 – Created Spring 2006.
Module 7: Designing Security for Accounts and Services.
Chapter 6 Server Management: Domains Workgroup Domain Trust Relationship Examples.
MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition (70-294) Chapter 1: Overview of the Active.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Securing Access to Data Using IPsec Josh Jones Cosc352.
© Copyright Nanda Ganesan1 CHAPTER NT Domains. © Copyright Nanda Ganesan2 Chapter Objectives Give an overall picture of the NT networking architecture.
Module 2: Implementing an Active Directory Forest and Domain Structure.
Module 3: Enabling Access to Internet Resources
Microsoft enterprise concepts
Implementing Active Directory Domain Services
Securing the Network Perimeter with ISA 2004
Network Operating Systems Examples
Overview of Active Directory Domain Services
Presentation transcript:

Module 3 l Objectives –Identify the security risks associated with specific NT Services –Understand the risk introduced by specific protocols –Identify ways to strengthen the defensive rings against an outside threat

Rings Of Defense

Module 3 –Services –Protocols –Trust Relationships –NT Domains Overview

Network and Domain Security l Least Service Rule l Run As Who?

Network Security l NetBEUI l NetBios l NWLink IPX/SPX l TCP/IP

Network Security l Protocol Isolation –Service –Gateway l TCP/IP Security –Port Filtering

Firewall or Proxy Server

Binding Relationships WorkstationServer WS SVR WSSVR IPX/SPX TCP/IP IPX/SPX

l “Planning and administration of a secure system still has to be done by humans, and even in a highly trusted system such as Windows NT, security it is not automatic. It is still the system administrator who is responsible for implementing an organization’s security policy.” Network and Domain Security

Domain Security l Identify the preferred way of networking and authenticating NT and it’s users l Understand the risks and benefits of Trust Relationships l Understand the proper use of Global and Local Groups l Understand network authentication Overview (Part 2)

l Domain Models l Single Domain Model l Single Master Domain Model l Multiple Master Domain Model Domain Security

l Trusted Domains l Types of Trusts Resource Master Domain Security

Notes Only

l Trusted Domain l Trusting Domain Network and Domain Security

l DC Accounts l Local Accounts l Domain Accounts l Domain Admins l Domain Users l Domain Guests Domain Security

l Global Groups l Local Groups Domain Security

l Logging On To Domains l Discovery l Secure Channels l Pass-Through Authentication Domain Security

l Security l Threats l Countermeasures Network and Domain Security