Download presentation
Presentation is loading. Please wait.
Published byMaud Pearson Modified over 9 years ago
1
Module 9 Configuring Server Security Compliance
2
Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview of Windows Server® Update Services (WSUS) Managing WSUS
3
Applying Defense-in-Depth to Increase Security Defense-in-depth provides multiple layers of defense to protect a networking environment Security documents, user education Policies, Procedures, & Awareness Physical Security OS hardening, authentication Firewalls Guards, locks Network segments, IPsec Application hardening, antivirus ACLs, encryption, EFS Perimeter Internal Network Host Application Data
4
Core Server Security Practices Apply the latest service pack and all available security updates Use the Security Configuration Wizard to scan and implement server security Use Group Policy and security templates to harden servers Restrict scope of access for service accounts Restrict who can log on locally to servers Restrict physical and network access to servers
5
What Is Encrypting File System? EFS: File contents are protected by a symmetrical key The symmetrical key is protected by asymmetrical encryption Enabled in the properties of a file Requires a user certificate Can be used on shared files Can be configured with a recovery agent in case user certificates are lost Encrypting File System (EFS) is a system for encrypting files
6
What Is BitLocker Drive Encryption? BitLocker Drive Encryption: Helps protect data on the operating system drive Helps protect the operating system from modification Access to the operating system drive is controlled by encryption keys BitLocker is a system that encrypts the entire operating system drive and potentially data volumes
7
Troubleshooting EFS Check the following items: Unable to Encrypt The volume is NTFS User has Write access to file Roaming user profiles generally required to encrypt remote files Unable to Decrypt File location is trusted for delegation Roaming profile is available User account cannot be delegated Certificate or Private Key problems Determine if the problem occurs when encrypting or decrypting files, and whether the files are local or remote
8
What Is Auditing? Auditing tracks user and operating system activities, and records selected events in security logs, such as: What occurred? Who did it? When? What was the result? Enable auditing to: Create a baseline Detect threats and attacks Determine damages Prevent further damage Audit access to objects, management of accounts, and users logging on and off
9
Types of Events to Audit (Audit Policy) Account Logon Account Management Directory Service Access Directory Service Changes Directory Service Replication Detailed Directory Service Replication Logon Object Access Policy Change Privilege Use Process Tracking System
10
Troubleshooting Audit Policy View Security Log in Event Viewer After you configure auditing, it may not work for the following reasons: A site, a domain, or an organizational unit policy setting overrides the audit policy that you configured A GPO that overrides the audit policy setting has a higher priority The site, the domain, or the organizational unit policy setting that contains the audit policy setting has not replicated to other computers Object Access Auditing Understand how inheritance affects file and folder auditing Test an audit rule for a file or folder Open and close the file or folder View the security log to ensure Event ID 4663 is logged
11
Lesson: Overview of Windows Server Update Services (WSUS) What Is Windows Server Update Services? Obtaining Updates Windows Server Update Services Process WSUS Deployment Considerations Server Requirements for WSUS Installing WSUS WSUS Group Policy Settings Automatic Updates Configuration
12
Obtaining Updates WSUS Windows Update WSUS
13
Windows Server Update Services Process Update Management Phase 1: Assess Set up a production environment that will support update management for both routine and emergency scenarios Phase 3: Evaluate and Plan Test updates in an environment that resembles, but is separate from, the production environment Determine the tasks necessary to deploy updates into production, plan the update releases, build the releases, and then conduct acceptance testing of the releases Phase 4: Deploy Approve and schedule update installations Review the process after the deployment is complete Phase 4: Deploy Approve and schedule update installations Review the process after the deployment is complete Phase 2: Identify Discover new updates in a convenient manner Determine whether updates are relevant to the production environment Identify Evaluate and Plan Deploy Assess
14
Server Requirements for WSUS Software requirements: Windows Server 2003 SP1 or Windows Server 2008 IIS 6.0 or later Windows Installer 3.1 or later Microsoft.NET Framework 2.0 SQL Server 2005 SP1 or later (optional) Microsoft Report Viewer Redistributable 2005 Windows Server 2003 SP1 or Windows Server 2008 IIS 6.0 or later Windows Installer 3.1 or later Microsoft.NET Framework 2.0 SQL Server 2005 SP1 or later (optional) Microsoft Report Viewer Redistributable 2005
15
Installing WSUS Considerations for installing the WSUS Server: Select Update Source Select the software used to manage the WSUS database Select the Web site that WSUS will use to point client computers to WSUS Select Update Source Select the software used to manage the WSUS database Select the Web site that WSUS will use to point client computers to WSUS The WSUS Administration Console: The WSUS 3.0 administration console can be used to manage any WSUS server that has a trust relationship with the administration console computer
16
WSUS Group Policy Settings Group Policy can specify: Which WSUS server to use Whether update notifications are displayed Frequency of checking for updates Auto-restart behavior WSUS computer group membership Whether computers should wake up to apply updates Which WSUS server to use Whether update notifications are displayed Frequency of checking for updates Auto-restart behavior WSUS computer group membership Whether computers should wake up to apply updates
17
Automatic Updates Configuration Configure Automatic Updates by using Group Policy Computer Configuration/Administrative Templates/ Windows Components/Windows Update Requires updated wuau.adm administrative template Requires: Windows Vista Windows Server 2008 Windows Server 2003 Windows XP Professional SP2 Windows 2000 Professional SP4, Windows 2000 Server/Advanced Server SP3 or SP4 Configure Automatic Updates by using Group Policy Computer Configuration/Administrative Templates/ Windows Components/Windows Update Requires updated wuau.adm administrative template Requires: Windows Vista Windows Server 2008 Windows Server 2003 Windows XP Professional SP2 Windows 2000 Professional SP4, Windows 2000 Server/Advanced Server SP3 or SP4
18
WSUS Administration Command-line tools for managing updates: Wuauclt.exe – controls the Windows Update Agent Wsusutil.exe – management of WSUS Wuauclt.exe – controls the Windows Update Agent Wsusutil.exe – management of WSUS
19
Approving Updates Approval options include: Install Decline Unapprove Removal Automate approval is also supported Approval options include: Install Decline Unapprove Removal Automate approval is also supported
20
Server Core Security Updates To enable Windows Update on Server Core: Cscript c:\Windows\system32\scregedit.wsf /au /4 To manually install updates onto Server Core: Wsua.exe.msu /quiet To manually remove updates from Server Core: In.xml, replace Install with Remove and save the file. pkgmgr /n:.xml In.xml, replace Install with Remove and save the file. pkgmgr /n:.xml
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.