360 likes | 863 Views
Objectives. Manage security in Windows Server 2008 with various Windows utilitiesDiscuss threats to Internet Protocol SecurityCreate Internet Protocol Security policiesDiscuss Network Access ProtectionInstall Network Access Protection. 2. Managing Security in Server 2008. Tools for managing ne
E N D
1. Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 10
Securing Windows Server 2008
2. Objectives Manage security in Windows Server 2008 with various Windows utilities
Discuss threats to Internet Protocol Security
Create Internet Protocol Security policies
Discuss Network Access Protection
Install Network Access Protection 2
3. Managing Security in Server 2008 Tools for managing network security
Security Configuration Wizard
Windows Firewall
Encrypting File System
BitLocker
Microsoft Baseline Security Analyzer 3
4. Security Configuration Wizard Security Configuration Wizard (SCW)
Provides a step-by-step wizard for hardening your network servers
Security policies can be created for:
Role-based service configuration
Network security
Registry settings
Audit policy
4
5. Windows Firewall Allows users to turn the firewall off or on
By default, Windows Firewall is turned on and allows exceptions for programs and ports
Allows you to create exceptions for inbound traffic
Exception
Instruction to open a port briefly, allow a program or service to pass information, and then close the port
5
6. 6
7. 7
8. Windows Firewall (continued) Windows Firewall with Advanced Security
Provides a more robust interface for managing the firewall policies in detail
Used to manage Windows Firewall based on port, services, applications, and protocols
8
9. 9
10. Windows Firewall (continued) Windows Firewall with Advanced Security Console
Can be used to manage the following areas
Inbound rules
Outbound rules
Connection security rules
Monitoring
10
11. Windows Firewall (continued) Windows Server 2008 uses the following network profiles
Public
Private
Domain
Deploying Windows Firewall Settings via Group Policy
WFAS allows you to import or export firewall policies
11
12. Encrypting File Services Symmetric encryption
Uses a single key and is faster and more efficient than public key encryption
Public key (asymmetric) encryption
Each user has a public key available to everyone and a private key known only to the user
EFS in Windows Server 2008
When a user encrypts a file, a symmetric file encryption key (FEK) is generated that EFS uses to encrypt the file 12
13. BitLocker Provides hard drive–based encryption of servers and Windows Vista computers
Encrypts entire Windows system volume of a computer running Windows Server 2008
Designed to enhance protection against data theft or exposure on computers that are lost or stolen
13
14. BitLocker (continued) Four authentication modes used by BitLocker
BitLocker with a TPM
BitLocker with Universal Serial Bus (USB) flash drive in place of TPM
BitLocker with a TPM and a personal identification number (PIN)
BitLocker with a TPM and a USB flash drive
14
15. BitLocker (continued) Installing BitLocker
Hard drive that supports BitLocker needs to be configured before installing BitLocker
BitLocker requires at least 1.5 GB of unallocated or available drive space
System volume is responsible for maintaining the unencrypted boot information
Boot volume will contain the OS files and be encrypted by BitLocker
15
16. Microsoft Baseline Security Analyzer When MBSA scans a computer, it creates a report that is organized into the following areas
Security Assessment
Security Update Scan Results
Windows Scan Results
Internet Information Services (IIS) Scan Results
SQL Server Scan Results
Desktop Application Scan Results 16
17. Microsoft Baseline Security Analyzer (continued) Scanning a computer with MBSA
You can perform MBSA scans using:
The GUI-based tool
The mbsacli.exe command- line tool
One requirement of MBSA is Internet connectivity 17
18. Internet Protocol Security An open-standards framework for securing network communications
IPSec meets three basic goals
Authentication
Integrity
Confidentiality
18
19. IPSec Threats Depending on the configuration of IPSec, it provides protection from the following threats
Data tampering
Denial of service
Identity spoofing
Man-in-the-middle attacks
Repudiation
Network traffic sniffing
19
20. How IPSec Works IPSec modes of operation
Transport mode
Tunnel mode
Scenarios available when deploying IPSec
Site to site
Client to client
Client to site
20
21. 21
22. 22
23. How IPSec Works (continued) IPSec security association modes
IPSec uses the Internet Key Exchange (IKE) to negotiate security protocols
IKE generates the encryption and authentication keys used by IPSec for the transaction
IPSec performs transactions in two phases
Main mode/Phase 1
Quick mode/Phase 2 23
24. How IPSec Works (continued) IPSec security methods
IPSec uses two security services
Encapsulating Security Payload
Authentication Header
IPSec policies
Can be managed with the following tools
WFAS, IP Security Policy snap-in
Netsh, GPME
24
25. 25
26. 26
27. Network Authentication in Windows Server 2008 Server 2008 supports the following authentication protocols to some degree
LAN Manager authentication
NTLM version 1 authentication
NTLM version 2 authentication
All forms of NTLM use the challenge-response protocol
27
28. Introduction to Network Access Protection NAP can be broken into three parts
Health policy validation
Health policy compliance
Access limitation
28
29. NAP Terminology Enforcement Client
Enforcement Server
Host Credential Authorization Protocol
Health Registration Authority
Network Policy Server
Remediation Server
System Health Agent
System Health Validator 29
30. NAP Enforcement Methods The five types of NAP enforcement methods used by NAP
802.1x-authenticated connections
Dynamic Host Configuration Protocol (DHCP) address configurations
IPSec communications
Terminal Services Gateway (TS Gateway) connections
Virtual Private Network (VPN) connections
30
31. Implementing NAP NAP
Designed by Microsoft to allow you to customize it to meet the unique needs of your networks
Implementing and configuring NAP differs from network to network based on requirements and policies
31
32. 32
33. Installing NAP NAP is part of the NPS role
To install NAP components
Add the NPS role either through the Role Services Wizard or from the command line using servermanagercmd.exe
33
34. Summary The SCW
Guides you through the steps of hardening your network servers
Windows Firewall
Provides inbound and outbound traffic enforcement through the Windows Firewall and WFAS consoles
EFS
Microsoft’s built-in service for providing folder- and file-level encryption
BitLocker
Provides hard drive–based encryption of servers 34
35. Summary (continued) At startup
BitLocker performs a system integrity authentication prior to booting into the OS
MBSA
Scans single or multiple computers on a network and lets you view existing security scan reports
IPSec
An open-standards framework for securing network communications
Works at the network layer of the OSI model
35
36. Summary (continued) On Windows networks
Windows Server 2008 uses Kerberos as its default authentication method in Active Directory domains
To use NAP policies
A client must be a part of the NAP infrastructure on a network
The HRA
Distributes health certificates to NAP clients that comply with network health Requirements
36