420 likes | 572 Views
Clinic. Security and Policy Enforcement in Windows Server 2008. Introduction. Name Company affiliation Title/function Job responsibility Windows Server 2003, XP and Vista experience Security Experience Expectations. Facilities. Class hours Building hours Parking Restrooms Meals
E N D
Clinic Security and Policy Enforcement in Windows Server 2008
Introduction • Name • Company affiliation • Title/function • Job responsibility • Windows Server 2003, XP and Vista experience • Security Experience • Expectations
Facilities • Class hours • Building hours • Parking • Restrooms • Meals • Phones • Messages • Smoking • Recycling
About This Clinic • Description • Clinic Objectives • Audience • Prerequisites
Clinic Outline • Security Enhancements in Windows Server 2008 • Network Access Protection
Infrastructure Optimization • Technology framework to help maximize the value of your IT investments • Structured way to drive cost reduction, security & efficiency gains and boost agility • Based on industry analyst and academic work • Provides guidance and best practices for step-by-step implementation
Overview • Methods of Security and Policy Enforcement • Network Location Awareness • Network Access Protection • Windows Firewall with Advanced Security (WFAS) • Internet Protocol Security (IPSec) • Windows Server Hardening • Server and Domain Isolation • Active Directory Domain Services Auditing • Read-Only Domain Controller (RODC) • BitLocker Drive Encryption • Removable Device Installation Control • Enterprise PKI
Technical Background • Windows Firewall with Advanced Security • Internet Security Protocol (IPSec) • Active Directory Domain Services Auditing • Read-Only Domain Controller (RODC) • BitLocker Drive Encryption • Enterprise PKI
Demonstration: Windows Firewall with Advanced Security • Creating Inbound and Outbound Rules • Creating a Firewall Rule Limiting a Service
IPSec • Integrated with WFAS • IPSec Improvements • Simplified IPSec Policy Configuration • Client-to-DC IPSec Protection • Improved Load Balancing and Clustering Server Support • Improved IPSec Authentication • Integration with NAP • Multiple Authentication Methods • New Cryptographic Support • Integrated IPv4 and IPv6 Support • Extended Events and Performance Monitor Counters • Network Diagnostics Framework Support
Demonstration: Creating IPSec Policies • Creating an IPSec Rule • Specifying different Authentication Methods • Activate and Deactivate Rules
AD Domain Services Auditing • What changes have been made to AD DS auditing?
Read-Only Domain Controller (RODC) • New Functionality • AD Database • Unidirectional Replication • Credential Caching • Password Replication Policy • Administrator Role Separation • Read-Only DNS RODC • Requirements/Special Considerations
BitLocker Drive Encryption (BDE) • Data Protection • Drive Encryption • Integrity Checking • BDE Hardware and Software Requirements
Enterprise PKI • Easier management through PKIView • Certificate Web Enrollment • Network Device Enrollment Service • Managing Certificate with Group Policy • Certificate Deployment Changes • Online Certificate Status Protocol (OCSP) Support • Cryptographic Next Generation
Implementation/Usage Scenarios • Enforce Security Policy • Improve Domain Security • Improve System Security • Improve Network Communications Security
Recommendations • Carefully test and plan all security policies • Implement Network Access Protection • Use Windows Firewall and Advanced Security to implement IPSec • Deploy Read-Only Domain Controllers, where appropriate • Implement BitLocker Drive Encryption • Take advantage of PKI improvements
Summary • Windows Server 2008 includes a variety of new security initiatives and features: • Network Access Protection • Windows Firewall and Advanced Security (WFAS) enhancements • IPSec improvements • Windows Server Hardening • Server and Domain Isolation • Active Directory Domain Services Auditing • Read-Only Domain Controllers (RODCs) • BitLocker Drive Encryption • Removeable Device Installation Control • Improvements to Enterprise PKI capabilities
Overview • Network Access Protection
Technical Background • NAP Infrastructure • NAP Platform Architecture • NAP Enforcement Methods • NAP Client Architecture • NAP Server Architecture • Component Communication
NAP Infrastructure • Automatic Remediation • Health Policy Validation • Health Policy Compliance • Limited Access
NAP Enforcement Client • IPSec • 802.1X • VPN • DHCP • NPS RADIUS
Demonstration: Network Access Protection Create a NAP Policy Using the MMC to Create NAP Configuration settings Create a new RADIUS Client Create a new System Health Validator for Windows Vista and Windows XP SP2
How NAP Works • Logical Networks • IPSec Enforcement • IEEE 802.1X • Remote Access VPNs • DHCP
NAP Authentication Process Background • Authentication Process • Network Access Protection Settings • Authorization Policies
Implementation/Usage Scenarios • Checking the Health and Status of Roaming Laptops • Ensuring the Health of Corporate Desktops • Determining the Health of Visiting Laptops • Verify the Compliance of Home Computers
Recommendations • When using IPSec – employ ESP with encryption • Carefully test and verify all IPSec Policies • Consider Using Domain Isolation • Use Quality of Service to improve bandwidth • Plan to Prioritize traffic on the network • Apply Network Access Protection to secure client computers
Summary • Network Access Protection: • Secures Remote Computers before accessing the Network • Has Client and Server Components • Can Use One or More of Several methods for Enforcement • IPSec • 802.1X • VPN • DHCP • Provides Support for Third Party Software
Lab: Network Access Protection In this lab, you will: • Network Communications using WFAS • Enforcing network communication policy using Policy-based QoS • Network Access Protection with Windows Server 2008
What Next? Windows Server 2008 Beta: https://connect.microsoft.com Home Page: http://www.microsoft.com/windowsserver/longhorn/default.mspx Webcasts: http://www.microsoft.com/windowsserver/longhorn/webcasts.mspx Forums: http://forums.microsoft.com/TechNet/default.aspx?ForumGroupID=161&SiteID=17 Network Access Protection • Home Page: http://www.microsoft.com/nap • Introduction to Network Access Protection: http://go.microsoft.com/fwlink/?LinkId=49884 • Network Access Protection Platform Architecture: http://go.microsoft.com/fwlink/?LinkId=49885 • Network Access Protection Frequently Asked Questions: http://go.microsoft.com/fwlink/?LinkId=49886 • IPSec: http://www.microsoft.com/ipsec • Server and Domain Isolation: http://www.microsoft.com/technet/network/sdiso/default.mspx