E N D
1. Rule:
Follow the exact same format in this slide template.
Indicate your rank/title, first, last name, office symbol, AKO email address, office phone number.Rule:
Follow the exact same format in this slide template.
Indicate your rank/title, first, last name, office symbol, AKO email address, office phone number.
3. Background (Problem) The Army has two different messaging environments spread across multiple Active Directory environments.
Exchange 5.5 (30%)
Exchange 2003 (70% migrated)
Exchange 2003 is 4 years old
Exchange 5.5 is no longer supported
Standardized operating system (OS) environment by 2008
Standardized naming convention and User Attribute environment
“Lessons Learned” from Exchange 2003 migration need to be applied for migration to Exchange 2007.
5. Exchange Environment Transition
6. Approved AD Forest
Deployed and completed EDS-Lite implementation
Directory is IAW with Naming Standards
Contacts imported
Exchange 2003 deployed throughout the Forest or approved waiver from CIO/G-6
Release of Exchange 2007 SP1
S/MIME support in OWA
Mobile remote wipe confirmation
7. Solution Utilizing the current CONUS Active Directory forest and the Exchange 2003 environment, “Move” all mailboxes to Exchange 2007 utilizing the Area Processing Center concept.
8. Why Exchange 2007?
9. Operational Efficiency
11. Microsoft IT Legacy Exchange Server 2003 Pre-Consolidation Environment
12. Microsoft IT Legacy Exchange Server 2007 Post-Consolidation Environment
13. How?
16. Process to Upgrade to Exchange 2007 Deploy the Client Access Server Role (CAS)
Deploy the Hub Transport Server Role
Deploy the Mailbox Server Role
Move resources to Exchange 2007 servers
Uninstall previous versions of Exchange Server and delete administrative and routing Groups
Deploy the Unified Messaging Server role and the Edge Transport Server role
18. Process to Upgrade to Exchange 2007 Deploy the Client Access Server Role (CAS)
Deploy the Hub Transport Server Role
Deploy the Mailbox Server Role
Move resources to Exchange 2007 servers
Uninstall previous versions of Exchange Server and delete administrative and routing Groups
Deploy the Unified Messaging Server role and the Edge Transport Server role
20. Process to Upgrade to Exchange 2007 Deploy the Client Access Server Role (CAS)
Deploy the Hub Transport Server Role
Deploy the Mailbox Server Role
Move resources to Exchange 2007 servers
Uninstall previous versions of Exchange Server and delete administrative and routing Groups
Deploy the Unified Messaging Server role and the Edge Transport Server role
22. Active Directory (AD) W2K3 Update NIPRNET
15 approved forests
Deployed
SIPRNET
One Forest per theater (6)
Deployed
CONUS SIPRNET expansion (on-going)
AD Next Phase
25. How RODC Works
26. Network Access ProtectionHow it works
27. BitLocker™ Drive Encryption
Designed specifically to help prevent a thief who boots another Operating System or runs a hacking tool from breaking Windows file and system protections
Secure Startup - Helps provides data protection on your Windows systems, even when the system is in unauthorized hands
Uses a v1.2 TPM or USB flash drive for key storage BitLocker Drive Encryption is a hardware-based data protection feature that helps to address the growing concern over corporate and customer data on lost or stolen machines. The feature uses full volume encryption to help ensure that a thief or hacker who obtains a system is not able to access the data that resides on it. Data is protected by helping to prevent unauthorized users from breaking Windows file and system protection on lost or stolen computers. This protection is achieved by encrypting the entire Windows volume. This improves data security and reduces equipment repurposing concerns. The feature is simple to deploy, use and enables easy recovery.
Secure Startup is a new feature in Microsoft® Windows Server™ Code Name “Longhorn.” Secure Startup leverages the Trusted Platform Module to deny access to the system volume when Windows is not running. By accessing the system volume when Windows is shut down it is possible to circumvent Windows security controls and gain unrestricted access to the computer.
How Secure Startup Works
Secure Startup prevents access to files on the system volume when the operating system is shut down by encrypting the system volume and storing the key required for decryption inside the Trusted Platform Module. During the startup process the Trusted Platform Module verifies the integrity of the Windows operating system before allowing it to access the key required to decrypt the system volume.
Secure Startup and Encrypting File System
Secure Startup can only be used to encrypt the system volume before Windows is started. Data stored on other volumes is not encrypted by Secure Startup. To encrypt data on volumes other than the system volume, use the Encrypting File System (EFS). Data encrypted by using EFS can be accessed only by using keys stored on the system volume. As a result, files encrypted with EFS are more secure on a system with Secure Startup enabled even when those files are not located on the system volume.
EFS can also be used to encrypt data on the system volume after the operating system is running. EFS is designed to prevent unauthorized access to data both before and after Windows is running. Secure Startup is designed to prevent unauthorized access to the system volume before Windows is running. Secure Startup prevents attackers from circumventing Windows security including EFS by accessing the system volume when Windows is shut down.
BitLocker Drive Encryption is a hardware-based data protection feature that helps to address the growing concern over corporate and customer data on lost or stolen machines. The feature uses full volume encryption to help ensure that a thief or hacker who obtains a system is not able to access the data that resides on it. Data is protected by helping to prevent unauthorized users from breaking Windows file and system protection on lost or stolen computers. This protection is achieved by encrypting the entire Windows volume. This improves data security and reduces equipment repurposing concerns. The feature is simple to deploy, use and enables easy recovery.
Secure Startup is a new feature in Microsoft® Windows Server™ Code Name “Longhorn.” Secure Startup leverages the Trusted Platform Module to deny access to the system volume when Windows is not running. By accessing the system volume when Windows is shut down it is possible to circumvent Windows security controls and gain unrestricted access to the computer.
How Secure Startup Works
Secure Startup prevents access to files on the system volume when the operating system is shut down by encrypting the system volume and storing the key required for decryption inside the Trusted Platform Module. During the startup process the Trusted Platform Module verifies the integrity of the Windows operating system before allowing it to access the key required to decrypt the system volume.
Secure Startup and Encrypting File System
Secure Startup can only be used to encrypt the system volume before Windows is started. Data stored on other volumes is not encrypted by Secure Startup. To encrypt data on volumes other than the system volume, use the Encrypting File System (EFS). Data encrypted by using EFS can be accessed only by using keys stored on the system volume. As a result, files encrypted with EFS are more secure on a system with Secure Startup enabled even when those files are not located on the system volume.
EFS can also be used to encrypt data on the system volume after the operating system is running. EFS is designed to prevent unauthorized access to data both before and after Windows is running. Secure Startup is designed to prevent unauthorized access to the system volume before Windows is running. Secure Startup prevents attackers from circumventing Windows security including EFS by accessing the system volume when Windows is shut down.
28. Minimal installation option
Low surface area
Command line interface
Limited set of server roles Adding Optional Features
Server Core supports the following optional features:
Microsoft Cluster Server
Network Load Balancing
Subsystem for UNIX-based applications
Backup
Multipath IO
Removable Storage Management
BitLocker Drive Encryption
SNMP
Installed from the command line with Ocsetup
Managing Server Core
CMD for local command execution
Terminal Server using CMD
WS-Management remote shell execute for remote command execution
WMI
Task Scheduler for scheduling jobs and tasks
Event Logging and Event Forwarding
RPC and DCOM for remote MMC support
SNMP
MMC tools
Longhorn or down-level clients with MMC
No automation
Adding Optional Features
Server Core supports the following optional features:
Microsoft Cluster Server
Network Load Balancing
Subsystem for UNIX-based applications
Backup
Multipath IO
Removable Storage Management
BitLocker Drive Encryption
SNMP
Installed from the command line with Ocsetup
Managing Server Core
CMD for local command execution
Terminal Server using CMD
WS-Management remote shell execute for remote command execution
WMI
Task Scheduler for scheduling jobs and tasks
Event Logging and Event Forwarding
RPC and DCOM for remote MMC support
SNMP
MMC tools
Longhorn or down-level clients with MMC
No automation
29. “Restartable” Active Directory Introduction:
Restart Active Directory without rebooting
Can be done through command line and MMC
Can’t boot the DC to stopped mode of Active Directory
No effect on non-related services while restarting Active Directory
Several ways to process login under stopped mode
Benefits:
Reduces time for offline operations
Improves availability for other services on DC when Active Directory is stopped
Reduces overall DC servicing requirements with Server Core
30. Terminal Services Enhancements Centralized Application Access
App Deployment (“app virtualization”)
Branch Office
Secure Anywhere Access
New features
TS Gateway
TS Remote Programs
SSO for managed clients
31. Terminal Services GatewayRemote access to internal server resources
32. Terminal Services Gateway Security (compared to VPN)
Authentication with passwords, smartcards
Uses industry standard encryption and firewall traversal (SSL, HTTPS)
RDP traffic still encrypted end-to-end – client to terminal server
Client machine health can be validated (using NAP)
SSL termination devices can terminate SSL traffic on separate device. (for intrusion detection or filtering in DMZ)
User can access Army applications and Army desktops via Web Browser
Friendly with home machines
Crosses firewalls and NATs (w/ HTTPS:443)
Granular access control at the perimeter
Connection Authorization Policy (CAP)
Resource Authorization Policy (RAP)