810 likes | 958 Views
announcing. Microsoft Assessment & Planning Toolkit 5.0 Customer Technology Preview http://connect.microsoft.com. MAP: User Interface & Reports S erver Migration & Virtualization Candidates. Windows Server 2008. Virtualization. Windows 7.
E N D
announcing Microsoft Assessment & Planning Toolkit 5.0 Customer Technology Previewhttp://connect.microsoft.com
MAP: User Interface & ReportsServer Migration & Virtualization Candidates Windows Server 2008 Virtualization Windows 7 • Heterogeneous Server Environment Inventory Linux, Unix & VMware • Windows 7 & Server 2008 R2 HW & Device Compatibility Assessment • Speed up Planning with Actionable Proposals and Assessments • Collect Inventory of Servers, Desktops and Applications Agentlessly • Offers Recommendations for Server/Application Virtualization • Works with the Virtualization ROI Tool to generate ROI calculations • More on MAP: http://www.microsoft.com/map
announcing Visual Studio Team System 2010 Lab Management Beta 2
VSTS Lab Management Beta 2 • Scenarios • Create and manage virtual or physical environments • Take environment snapshots or revert to existing snapshots for virtual environments • Interact with the virtual machines in the environments through environment viewer • Define test settings for the environments • New Beta 2 Features • Simplified Environment creation & edit experience • Full-screen environment viewer • Out of the box template for application build-deploy-test workflow • Network isolation with support for domain controller Virtual Machines • “In-Use” support for shared environments
VSTS “Environments” • Typical multi-tier application consist of multiple roles Database Server, Web Server, Client, etc. • An environment is a set of roles that are required to run a specific application and the lab machines to be used for each role. • Managing environments for multi-tier applications is an error prone task today. Replicating the same environment at same or another site is even a bigger problem.
Windows Server 2008 R2 Hyper-V Security & Best Practices Jeff Woolsey Principal Group Program Mgr Windows Server, Hyper-V SVR307
Agenda • Virtualization Requirements • Hyper-V Security • Hyper-V & Storage • Windows Server 2008 R2: SCONFIG • Designing a Windows Server 2008 Hyper V & System Center Infrastructure • Deployment Considerations • Best Practices & Tips and Tricks • Microsoft Hyper-V Server 2008 R2
Virtualization Requirements • Scheduler • Memory Management • VM State Machine • Virtualized Devices • Storage Stack • Network Stack • Ring Compression (optional) • Drivers • Management API
Virtualization Stack Provided by: Rest of Windows Hyper-V ISV WindowsKernel OSKernel DeviceDrivers Windows hypervisor VirtualizationServiceClients(VSCs) Enlightenments VMBus Hyper-V Architecture Parent Partition Child Partition Guest Applications VM WorkerProcesses WMI Provider VMService Ring 3: User Mode VirtualizationServiceProviders(VSPs) Server Core Ring 0: Kernel Mode Server Hardware
Virtualization Stack Provided by: Rest of Windows Hyper-V VM WorkerProcesses WMI Provider ISV VMService WindowsKernel DeviceDrivers Windows hypervisor VirtualizationServiceClients(VSCs) VirtualizationServiceClients(VSCs) Enlightenments Enlightenments VMBus Virtualization Attacks Parent Partition Child Partition Guest Applications Ring 3: User Mode Hackers OSKernel VirtualizationServiceProviders(VSPs) Server Core VMBus Ring 0: Kernel Mode Server Hardware
What if there was no parent partition? • No defense in depth • Entire hypervisor running in the most privileged mode of the system Virtual Machine Virtual Machine Virtual Machine User Mode User Mode User Mode Ring 3 Kernel Mode Kernel Mode Kernel Mode Ring 0 Scheduler Memory Management Storage Stack Network Stack VM State Machine Virtualized Devices Drivers Management API Ring -1 Hardware
Hyper-V Hypervisor • Defense in depth • Hyper-V doesn’t use ring compression uses hardware instead (VT/AMD-V) • Further reduces the attack surface Parent Partition Virtual Machine Virtual Machine VM State Machine Virtualized Devices Management API User Mode User Mode Ring 3 Storage Stack Network Stack Drivers Kernel Mode Kernel Mode Ring 0 Ring -1 Scheduler Memory Management Hardware
Security Assumptions • Guests are untrusted • Trust relationships • Parent must be trusted by hypervisor • Parent must be trusted by children • Code in guests can run in all available processor modes, rings, and segments • Hypercall interface will be well documented and widely available to attackers • All hypercalls can be attempted by guests • Can detect you are running on a hypervisor • We’ll even give you the version • The internal design of the hypervisor will be well understood
Security Goals • Strong isolation between partitions • Protect confidentiality and integrity of guest data • Separation • Unique hypervisor resource pools per guest • Separate worker processes per guest • Guest-to-parent communications over unique channels • Non-interference • Guests cannot affect the contents of other guests, parent, hypervisor • Guest computations protected from other guests • Guest-to-guest communications not allowed through VM interfaces
Hyper-V & SDL • Hypervisor built with • Stack guard cookies (/GS) • Address Space Layout Randomization (ASLR) • HW Data Execution Prevention • No Execute (NX) AMD • Execute Disable (XD) Intel • Code pages marked read only • Memory guard pages • Hypervisor binary is signed • Entire stack through SDL • Threat modeling • Static Analysis • Fuzz testing & Penetration testing
Hyper-V Security Model • Uses Authorization Manager (AzMan) • Fine grained authorization and access control • Department and role based • Segregate who can manage groups of VMs • Define specific functions for individuals or roles • Start, stop, create, add hardware, change drive image • VM administrators don’t have to be Server 2008 administrators • Guest resources are controlled by per VM configuration files • Shared resources are protected • Read-only (CD ISO file) • Copy on write (differencing disks)
BitLocker– Persistent Protection • Mitigating Against External Threats… • Very Real Threat of Data Theft When a System is Stolen, Lost,or Otherwise Compromised (Hacker Tools Exist!) • Decommissioned Systems are not Guaranteed Clean • Increasing Regulatory Compliance on Storage Devices Drives Safeguards(HIPPA, SBA, PIPEDA, GLBA, etc…) • BitLocker Drive Encryption Support in Windows Server 2008/2008 R2 • Addresses Leading External Threats by Combining Drive Level Encryptionwith Boot Process Integrity Validation • Leverages Trusted Platform Model (TPM) Technology (Hardware Module) • Integrates with Enterprise Ecosystem Maintaining Keys in Active Directory • Protects Data While a System is Offline • Entire Windows Volume is Encrypted (Hibernation and Page Files) • Delivers Umbrella Protection to Applications (On Encrypted Volume) • Ensures Boot Process Integrity • Protects Against Root Kits – Boot Sector Viruses • Automatically Locks System when Tampering Occurs • Simplifies Equipment Recycling • One Step Data Wipe – Deleting Access Keys Renders Disk Drive Useless
Physical Security • Device installation group policies: "no removable devices allowed on this system" • BitLocker: encrypts drives, securing • laptops • branch office servers • BitLocker To Go: encrypts removable devices like USB sticks • Includes group policies that say, "don't let the user save data onto a USB stick unless the stick's been encrypted"
McAfee: VirusScan Enterprise for Offline Virtual Images • Reduce IT management overhead for virtual environmentsAnti-malware security profiles of offline virtual machines are updated automatically without having to bring virtual machines online, reducing the risk of infecting the rest of the virtual environment. • Ensure security for virtual machines.Automatically scan, clean and update virtual machines while offline, to eliminate the risk of dormant virtual machines threatening the corporate network. • Achieve efficiencies with security management.Minimize IT efforts and reduce operating costs with common security management for both physical and virtual environments. • Improve disaster recovery.Ensure that backup virtual images are up-to-date with respect to malware signatures before they go into production.
Hyper-V R1 Performance • Focused on Fixed Disk Performance • Why? • Allocating storage resources upfront and prevent surprises • Result: • Excellent near native performance for Fixed VHDs • Dynamic VHDs performance had room for improvement • Let’s take a look at R2 performance…
WS2008 vs WS2008R2Dynamic VHD Throughput Comparison Up to 15x Performance Improvement with R2
Hyper-V R2 Storage Key Takeaways • Fixed Disks are on par with Native Disk Performance • Dynamic and Differencing Disks are up to 15x times faster than Hyper-V and ~15% performance delta from native
Multipath I/O (MPIO) • What is it? • Provides logical facility for routing I/O over redundant hardware paths connecting the server to storage • Works with a variety of storage types (iSCSI, SCSI, SAS, Fibre Channel) • Many hardware vendors provide MPIO capable drivers • How do I enable it? • Windows Server 2008 Full: Server Manager -> Features • Windows Server 2008 Core: start /w ocsetupMultipathIo
Enabling MPIO with iSCSI • Open iscsicpl.exe (iSCSI configuration) • Set up (discover 2 connections to iSCSI target • Open mpiocpl.exe (MPIO configuration) • Discover Multi-Path tab, “Add support for iSCSI Devices” • In iscsicpl.exe, Targets tab, Connect • Check “Enable multi-path” • Under Advanced, specify Target Portal IP • Repeat, choosing other Target Portal IP
Advanced Storage Capabilities • Is there a Hyper-V Storage Certification? • What about storage De-duplication? • What about Storage Replication? • Hyper-V is compatible with block based de-duplication and replication solutions that are certified for Windows Server 2008/2008 R2. • Solutions from: NetApp, HP, EMC, Hitachi, NEC, Compellent and more… • www.windowsservercatalog.com
Hyper-V Networking • Don’t forget the parent is a VM • Two physical network adapters at minimum • One for management • One (or more) for VM networking • Dedicated NIC(s) for iSCSI • Connect parent to back-end management network • Only expose guests to internet traffic
Hyper-V Network Configurations • Example 1: • Physical Server has 4 network adapters • NIC 1: Assigned to parent partition for management • NICs 2/3/4: Assigned to virtual switches for virtual machine networking • Storage is non-iSCSI such as: • Direct attach • SAS or Fibre Channel
Each VM on its own Switch… VM Worker Processes Child Partitions Parent Partition Applications Applications Applications User Mode WMI Provider VM 3 Windows Server 2008 VM 1 VM 2 VM Service Windows Kernel Linux Kernel Windows Kernel VSC VSC VSC Kernel Mode VSP VMBus VMBus VMBus VMBus VSP VSP Windows hypervisor Ring -1 “Designed for Windows” Server Hardware Mgmt NIC 1 VSwitch 1 NIC 2 VSwitch 2 NIC 3 VSwitch 3 NIC 4
Hyper-V Network Configurations • Example 2: • Server has 4 physical network adapters • NIC 1: Assigned to parent partition for management • NIC 2: Assigned to parent partition for iSCSI • NICs 3/4: Assigned to virtual switches for virtual machine networking
Now with iSCSI… VM Worker Processes Child Partitions Parent Partition Applications Applications Applications User Mode WMI Provider VM 3 Windows Server 2008 VM 1 VM 2 VM Service Windows Kernel Linux Kernel Windows Kernel VSC VSC VSC Kernel Mode VMBus VMBus VMBus VMBus VSP VSP Windows hypervisor Ring -1 “Designed for Windows” Server Hardware Mgmt NIC 1 iSCSI NIC 2 VSwitch 1 NIC 3 VSwitch 2 NIC 4
Legacy vs. Synthetic NIC • Legacy Network Adapter • Up to 4 per virtual machine • Pros: Needed for PXE/RIS/WDS installation • Cons: Slow • Synthetic Network Adapter • Up to 8 per virtual machine! • Pros: Blazing fast • Both: • Support VLANs • Dynamic or Static MAC addresses
Virtualized Network I/O Data PathWithout VMQ Parent Partition Parent Partition VM1 VM2 Virtual Machine Switch Virtual Machine Switch (VSP) Routing,VLAN Filtering, Data Copy Ethernet TCP/IP TCP/IP Routing VLAN filtering Data Copy Port 2 Port 1 VM NIC 1 VM NIC 2 Port 2 Port 1 Miniport Driver Miniport Driver VM BUS NIC
Networking Virtual Machine Queues • Hyper-V uses virtual machine queue (VMQ) support in new NICs to offload processing to hardware • VMQ operation: • Each VM is assigned a hardware-managed receive queue • Hardware performs MAC address lookup and VLAN ID validation • Places receive packets in appropriate queue • Queues are mapped into VM address space to avoid copy operations