210 likes | 407 Views
Windows Server 2008 : New features and how they help manage and secure virtualized environments. Kirk Munro, MVP Sr. Software Developer Quest Software poshoholic@hotmail.com http://poshoholic.com . Managing Windows Server 2008. Server Manager. Initial Configuration. Product Installation.
E N D
Windows Server 2008: New features and how they help manage and secure virtualized environments Kirk Munro, MVP • Sr. Software Developer • Quest Software • poshoholic@hotmail.com • http://poshoholic.com
Managing Windows Server 2008 Server Manager Initial Configuration Product Installation
demo • Server Manager
Read-Only Domain Controller RODC Main Office Remote Site • Features • Read Only Active Directory Database • Only allowed user passwords are stored on RODC • Unidirectional Replication • Role Separation • Benefits • Increases security for remote Domain Controllers where physical security cannot be guaranteed • Support • ADFS,DNS, DHCP, FRS V1, DFSR (FRS V2), Group Policy, IAS/VPN, DFS, SMS, ADSI queries, MOM
Why Branch Offices Asked for RODC Windows Server 2008 DC Read Only DC 3 4 2 RODC Branch Hub 5 6 1 6 RODC: Looks in DB: "I don't have the users secrets" RODC gives TGT to User and RODC will cache credentials Returns authentication response and TGT back to the RODC Windows Server 2008 DC authenticates request Forwards Request to Windows Server 2008 DC 5 6 4 3 2 1 User logs on and authenticates
How RODC Mitigates “Stolen DC” Issues Hub Admin Perspective • Attacker Perspective
Windows Server Core Server Core Security, TCP/IP, File Systems, RPC,plus other Core Server Sub-Systems Hyper-V AD DS DHCP AD LDS DNS Media GUI, CLR, Shell, IE, OE, etc. File Print IIS7 Small subset of the executable files and DLLs installed No GUI interface, no .NET, no PowerShell Nine available Server Roles Managed with remote tools
demo • Server Core
Active Directory Improvements • Now called Active Directory Domain Services • Fine Grained Password Control • Restartable Domain Services • Improved Auditing • Improved Disaster Recovery • Server Core Role • Fully IPv6 compliant
Admin Role Separation • Problem: • Too many accounts in the Domain Adminsgroup • Most of these DAs are really server admins (patch management, etc) • Solution: • Provides a new “local administrator” level of access per Read-Only Domain Controller • Also includes all Builtin groups (Backup Operators, etc) • Prevents “accidental” Active Directory modifications by machine administrators • Does not prevent “local administrator” from maliciously modifying the local DB • This is only a true security feature for Read-Only DC
BitLocker™ Drive Encryption Full Volume Encryption Key (FVEK) Encryption Policy • Group Policy allows central encryption policy and provides Branch Office protection • Provides data protection, even when the system is in unauthorized hands or is running a different or exploiting Operating System • Uses a v1.2 TPM or USB flash drive for key storage
Address Space Location Randomization (ASLR) • Prior to Windows Vista • Executables and DLLs load at fixed locations • Buffer overflows commonly relied on known system function addresses to cause specific code to execute • The Windows Vista loader bases modules at one of 256 random points in the address space • OS images now include relocation information • Relocation performed once per image and shared across processes • User stack locations are also randomized
USER32 USER32 ntdll ntdll kernel32 kernel32 GDI32 GDI32 RPCRT4 RPCRT4 ATTACK ATTACK ATTACK ADVAP132 ADVAP132 msvcrt msvcrt 0x7d000000 0x7d000000 Malware Protection with ASLR 0x7b000000 0x7b000000 USER32 ntdll kernel32 0x79000000 0x79000000 GDI32 0x77000000 0x77000000 RPCRT4 2008 0x75000000 0x75000000 ADVAP132 msvcrt 0x73000000 0x73000000
Service Hardening • System services presented a large attack target • Many were network facing and running as SYSTEM • Bugs allowed for privilege elevation attacks • Security Improvements • Concept of least privilege applied to services • Give few services full SYSTEM control • Reduce which services can use the network • Limit system exposure in case of compromise • “Sandbox” such low privileged services • Limit the damage to Windows in case of take over
Service Hardening • Service-specific SIDs permit a service’s access to objects to be limited • Only required objects give SID access • Specified by most Windows 2008 services • SIDs are marked disabled until service starts • Firewall policy can be applied to service SID (and many services are now blocked at the firewall) • Write-restricted service processes further limit write access • Can only modify objects allowing WRITE for service SIDs
Windows PowerShell New Command-line shell & Scripting Language Improves productivity & control Accelerates automation of system admin Easy-to-use Works with existing scripts Remote server management via WMI
Windows PowerShell Resources • TechNet ScriptCenter • Exchange Server 2007 • Terminal Server • WMI, Registry, Hardware, etc. • Community-Submitted scripts • PowerShellCommunity.org Hundreds of Scripts • Manning Publications • O’Reilly Media • Sapien Press & others… Books & Training Materials • MS MVPs • PowerShell Team Blog • Active Newsgroup and User Groups • Channel 9: DFO Show • IIS.net Community Support
demo PowerShell
Resources • Windows Server 2008: • Windows Server 2008 Administrator’s Companion by Charlie Russell • Administering Windows Server 2008 Server Core by John Paul Mueller • Core configuration commands – cscript C:\Windows\System32\SCRegEdit.wsf /cli • CoreConfigurator – User Interface for key configuration items in Server Core • PowerShell: • My Blog: http://poshoholic.com • PowerShell Community Site: http://www.powershellcommunity.org • PowerGUI Community Site: http://www.powergui.org • TechNet Script Center: http://www.microsoft.com/technet/scriptcenter/default.mspx • PowerShell: TFM (2nd edition) by Don Jones (Sapien Press) • PowerShell in Action by Bruce Payette (Manning) • Key cmdlets to help you get started: Get-Help, Get-Command, Get-Alias, Get-Member, Get-PSDrive, Get-PSProvider, Get-PSSnapin • Bootcamp: • http://www.microsoft.ca/bootcamp(slide decks available June 1, 2008)
Questions? Kirk Munro, MVP • Sr. Software Developer • Quest Software • poshoholic@hotmail.com • http://poshoholic.com