1 / 32

Module 7: Implementing Security Using Group Policy

Module 7: Implementing Security Using Group Policy. Module Overview. Configuring Security Policies Implementing Fine-Grained Password Policies Restricting Group Membership and Access to Software Managing Security Using Security Templates. Lesson 1: Configuring Security Policies.

xaria
Download Presentation

Module 7: Implementing Security Using Group Policy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Module 7: Implementing Security Using Group Policy

  2. Module Overview • Configuring Security Policies • Implementing Fine-Grained Password Policies • Restricting Group Membership and Access to Software • Managing Security Using Security Templates

  3. Lesson 1: Configuring Security Policies • What Are Security Policies? • What Is the Default Domain Security Policy? • What Are the Account Policies? • What Are Local Policies? • What Are Network Security Policies? • Windows Firewall with Advanced Security • Demonstration: Overview of Additional Security Settings • Demonstration: What Is the Default Domain Controller Security Policy?

  4. What Are Security Policies?

  5. What Is the Default Domain Security Policy? Domain • Provides account policies for the domain; other settings are not configured by default • Use to provide security settings that will affect the entire domain • Use domain policy to provide security settings, as a best practice. Use separate GPOs to provide other types of settings Account and security settings Default domain policy

  6. What Are the Account Policies? Account policies consist of: Policies Description Password • Enforce password history: 24 passwords • Max password age: 42 days • Min password age:1 day • Min password length: 7 characters • Complex Password: enabled • Store password using reversible encryption: disabled Account lockout • Lockout duration: not defined • Lockout threshold: 0 invalid logon attempts • Reset account lockout after: not defined Kerberos • Can only be applied at the domain level Account policies mitigate the threat of brute force guessing of account passwords

  7. What Are Local Policies? Local Policies determine the security options for a user or service account Every computer running Windows 2000 and later has a local security policy that is part of local Group Policy ü In a workgroup, you must configure local security policies to provide security ü Domain policy will override local policies in cases of conflict ü You can assign local rights through local Group Policies ü Security options control many different aspects of a computer’s security ü

  8. What Are Network Security Policies? GPO Wired Wired Windows Vista Windows Vista Wireless Wireless Windows XP Windows XP Wireless only Wireless only Define the available networks and authentication methods for wireless connections for Windows Vista and Windows XP clients, and LAN authentication for Windows Vista and Windows Server 2008 clients Separate wireless policies for Windows XP and Windows Vista ü WindowsVista policies contain more options for wireless ü Windows Vista wireless policies can deny access to wireless networks ü 802.1x authentication can be configured via Group Policy ü Only Windows Vista and later can receive wired network policies ü

  9. Windows Firewall with Advanced Security A stateful host-based firewall that allows or blocks network traffic according to its configuration Supports filtering for both incoming and outgoing traffic ü Used for advanced settings configuration ü Provides integrated firewall filtering and IPsec protection settings ü Allows rule configuration for various criteria, such as users, groups, and TCP and UDP ports ü Provides network location-aware profiles ü Can import or export policies ü Windows Server 2008 Internet Firewall rules control inbound and outbound traffic LAN Firewall

  10. Demonstration: Overview of Additional Security Settings In this demonstration, you will see how to configure additional security settings

  11. Demonstration: What Is the Default Domain Controller Security Policy? In this demonstration, you will see the default domain controller policy settings Provides an extra layer of security for domain controllers ü Provides enabled auditing ü Allows many user rights to be configured ü

  12. Lesson 2: Implementing Fine-Grained Password Policies • What Are Fine-Grained Password Policies? • How Fine-Grained Password Policies Are Implemented • Implementing Fine-Grained Password Policies • Demonstration: Implementing Fine-Grained Password Policies

  13. What Are Fine-Grained Password Policies? Fine-grained passwords allow multiple password policies to exist in the same domain Password changes: 7 days Administrator group Password changes: 14 days Password changes: 30 days Manager group End user group

  14. Considerations when implementing PSOs: A PSO has the following settings available: How Fine-Grained Password Policies Are Implemented Password Settings Container and Password Setting Objects are new schema object classes ü PSOs can be created through ADSI Edit or LDIFDE ü PSOs can only be applied to users or global groups ü • Password policies • Account lockout policies • PSO Link • Precedence

  15. Implementing Fine-Grained Password Policies • Shadow groups can be used to apply a PSO to all users that do not already share a global group membership • A user or group could have multiple PSOs linked to them • The precedence attribute is used to resolve conflicts • Lower precedence values have higher priority • PSOs linked directly to user objects override PSOs linked to a user’s global groups • If there are no PSOs, normal domain account policies apply

  16. Demonstration: Implementing Fine-Grained Password Policies In this demonstration, you will see how to create and apply PSOs

  17. Lesson 3: Restricting Group Membership and Access to Software • What Is Restricted Group Membership? • Demonstration: Configuring Restricted Group Membership • What Is a Software Restriction Policy? • Options for Configuring Software Restriction Policies • Demonstration: Configuring Software Restriction Policies

  18. Group Policy can control group membership: What Is Restricted Group Membership? • For any group on a local computer, by applying a GPO to the OU that holds the computer account • For any group in AD DS, by applying a GPO to the domain controller

  19. Demonstration: Configuring Restricted Group Membership In this demonstration, you will see how to configure restricted groups

  20. What Is a Software Restriction Policy? • A policy-driven mechanism that identifies and controls software on a client computer • A mechanism restricting software installation and viruses • A component with two parts: • A default rule with three options: Unrestricted, Basic, and Disallowed • Exceptions to the default rule

  21. Options for Configuring Software Restriction Policies • Hash Rule • Use to employ MD5 or SHA1 hash of a file to confirm identity • Use to allow or prohibit a certain file version from being run • Certificate Rule • Checks for digital signature on application • Use when you want to restrict Win32 applications and ActiveX content • Path Rule • Use when restricting a file path • Use when multiple files exist for the same application • Essential when SRPs are strict • Internet Zone Rule • Controls how Internet Zones can be accessed • Use in high-security environments to control access to Web applications

  22. Demonstration: Configuring Software Restriction Policies In this demonstration, you will see how to configure a software restriction policy

  23. Lesson 4:Managing Security Using Security Templates • What Are Security Templates? • Demonstration: Applying Security Templates • What Is the Security Configuration Wizard? • Demonstration: Configuring Server Security Using the Security Configuration Wizard • Options for Integrating the Security Configuration Wizard and Security Templates • Demonstration: Importing Security Configuration Policies into Security Templates

  24. Security templates: What Are Security Templates? Allow administrators to apply consistent security settings to multiple computers ü Can be designed based on server roles ü Can be applied via Group Policy ü

  25. Demonstration: Applying Security Templates In this demonstration, you will see how to create a security template and import it into a GPO

  26. What Is the Security Configuration Wizard? SCW provides guided attack surface reduction by: SCW supports: • Rollback • Analysis • Remote configuration • Command-line support • Active Directory integration • Policy editing • Disabling unnecessary services and Internet Information Services (IIS)Web extensions • Blocking unused ports and securing ports that are left open using IPSec • Reducing protocol exposure • Configuring audit settings

  27. Demonstration: Configuring Server Security Using the Security Configuration Wizard In this demonstration, you will see how to create a security policy using the SCW

  28. Options for Integrating the Security Configuration Wizard and Security Templates Options: • Policies created with the SCW can be applied individually • Other Security templates can be incorporated into the SCW Scwcmd.exe command-line utility can be used to convert the XML policy into a GPO

  29. Demonstration: Importing Security Configuration Policies into Security Templates In this demonstration, you will see how to transform the XML policy file into a GPO

  30. Lab: Implementing Security Using Group Policies • Exercise 1: Configuring Domain Security Settings • Exercise 2: Implementing Fine-Grained Password Policies • Exercise 3: Configuring Restricted Groups and Software Restriction Policies • Exercise 4: Configuring Security Templates • Exercise 5: Verifying the Security Configuration Logon information Estimated time: 75 minutes

  31. Lab Review • You want to control which wireless networks your Windows Vista clients will have access to. What is the best way to accomplish this? • You need to harden security on all the database servers across your organization. What tool is best suited for this task? • You used the Security Configuration Wizard to create a policy for your servers running IIS. You transformed the policy into a GPO. You applied the GPO to the proper OU, but the IIS settings are not being deployed. What is the problem?

  32. Module Review and Takeaways • Considerations • Review questions

More Related