Transcript Overview

Clinic
Security and Policy
Enforcement in Windows
Server 2008
Introduction
Name
Company affiliation
Title/function
Job responsibility
Windows Server 2003, XP and Vista experience
Security Experience
Expectations
Facilities
Class hours
Building hours
Parking
Restrooms
Meals
Phones
Messages
Smoking
Recycling
About This Clinic
Description
Clinic Objectives
Audience
Prerequisites
Clinic Outline
Security Enhancements in Windows Server 2008
Network Access Protection
Infrastructure Optimization
Technology
framework to help
maximize the value
of your IT
investments
Structured way to
drive cost
reduction, security
& efficiency gains
and boost agility
Based on industry
analyst and
academic work
Provides guidance
and best practices
for step-by-step
implementation
Security Enhancements in
Windows Server 2008
Overview
Methods of Security and Policy Enforcement
Network Location Awareness
Network Access Protection
Windows Firewall with Advanced Security (WFAS)
Internet Protocol Security (IPSec)
Windows Server Hardening
Server and Domain Isolation
Active Directory Domain Services Auditing
Read-Only Domain Controller (RODC)
BitLocker Drive Encryption
Removable Device Installation Control
Enterprise PKI
Technical Background
Windows Firewall with
Advanced Security
Internet Security Protocol
(IPSec)
Active Directory Domain
Services Auditing
Read-Only Domain
Controller (RODC)
BitLocker Drive
Encryption
Enterprise PKI
Windows Firewall with Advanced Security
Demonstration: Windows Firewall with Advanced Security
•
Creating Inbound and Outbound Rules
•
Creating a Firewall Rule Limiting a Service
IPSec
Integrated with WFAS
IPSec Improvements
Simplified IPSec Policy Configuration
Client-to-DC IPSec Protection
Improved Load Balancing and Clustering Server Support
Improved IPSec Authentication
Integration with NAP
Multiple Authentication Methods
New Cryptographic Support
Integrated IPv4 and IPv6 Support
Extended Events and Performance Monitor Counters
Network Diagnostics Framework Support
Demonstration: Creating IPSec Policies
•
Creating an IPSec Rule
•
Specifying different Authentication
Methods
•
Activate and Deactivate Rules
AD Domain Services Auditing
What
changes have
been made to
AD DS
auditing?
Read-Only Domain Controller (RODC)
New Functionality
AD Database
Unidirectional Replication
Credential Caching
Password Replication Policy
Administrator Role Separation
Read-Only DNS
Requirements/Special Considerations
RODC
BitLocker Drive Encryption (BDE)
Data Protection
Drive Encryption
Integrity Checking
BDE Hardware and Software Requirements
Enterprise PKI
Easier management through PKIView
Certificate Web Enrollment
Network Device Enrollment Service
Managing Certificate with Group Policy
Certificate Deployment Changes
Online Certificate Status Protocol (OCSP)
Support
Cryptographic Next Generation
Implementation/Usage Scenarios
Enforce Security Policy
Improve Domain Security
Improve System Security
Improve Network Communications Security
Recommendations
Carefully test and plan all security policies
Implement Network Access Protection
Use Windows Firewall and Advanced Security to
implement IPSec
Deploy Read-Only Domain Controllers, where
appropriate
Implement BitLocker Drive Encryption
Take advantage of PKI improvements
Summary
Windows Server 2008 includes a variety of new security
initiatives and features:
• Network Access Protection
• Windows Firewall and Advanced Security (WFAS)
enhancements
• IPSec improvements
• Windows Server Hardening
• Server and Domain Isolation
• Active Directory Domain Services Auditing
• Read-Only Domain Controllers (RODCs)
• BitLocker Drive Encryption
• Removeable Device Installation Control
• Improvements to Enterprise PKI capabilities
Questions and Answers
Network Access Protection
in Windows Server 2008
Overview
Network Access Protection
Net work Access Protection
Network Access Quarantine
Control
Internal, VPN and Remote Access
Client
Only VPN and Remote Access
Clients
IPSec, 802.1X, DHCP and VPN
DHCP and VPN
NAP NPS and Client included in
Windows Server 2008 ; NAP client
included in Vista
Installed from Windows Server 2003
Resource Kit
Technical Background
NAP Infrastructure
NAP Platform Architecture
NAP Enforcement Methods
NAP Client Architecture
NAP Server Architecture
Component Communication
NAP Infrastructure
Automatic Remediation
Health Policy Validation
Health Policy Compliance
Limited Access
NAP Platform Architecture
NAP Enforcement Client
IPSec
802.1X
VPN
DHCP
NPS
RADIUS
Demonstration: Network Access Protection
•
Create a NAP Policy
•
Using the MMC to Create NAP
Configuration settings
•
Create a new RADIUS Client
•
Create a new System Health Validator for
Windows Vista and Windows XP SP2
How NAP Works
Logical Networks
IPSec Enforcement
IEEE 802.1X
Remote Access VPNs
DHCP
IPSec Enforcement in Logical Networks
Communication Initiation Process with IPSec Enforcement
NAP Client Health Certificate Process
IPSec Enforcement in NAP
802.1x Authenticated Connections
NAP Authentication Process Background
Authentication Process
Network Access Protection Settings
Authorization Policies
Implementation/Usage Scenarios
Checking the Health and Status of Roaming
Laptops
Ensuring the Health of Corporate Desktops
Determining the Health of Visiting Laptops
Verify the Compliance of Home Computers
Recommendations
When using IPSec – employ ESP with encryption
Carefully test and verify all IPSec Policies
Consider Using Domain Isolation
Use Quality of Service to improve bandwidth
Plan to Prioritize traffic on the network
Apply Network Access Protection to secure client computers
Summary
Network Access Protection:
Secures Remote Computers before accessing the
Network
Has Client and Server Components
Can Use One or More of Several methods for
Enforcement
IPSec
802.1X
VPN
DHCP
Provides Support for Third Party Software
Questions and Answers
Lab: Network Access Protection
In this lab, you will:
Network Communications using WFAS
Enforcing network communication policy
using Policy-based QoS
Network Access Protection with Windows
Server 2008
What Next?
Windows Server 2008
Beta: https://connect.microsoft.com
Home Page: http://www.microsoft.com/windowsserver/longhorn/default.mspx
Webcasts: http://www.microsoft.com/windowsserver/longhorn/webcasts.mspx
Forums: http://forums.microsoft.com/TechNet/default.aspx?ForumGroupID=161&SiteID=17
Network Access Protection
•Home
Page: http://www.microsoft.com/nap
•Introduction to Network Access Protection:
http://go.microsoft.com/fwlink/?LinkId=49884
•Network
Access Protection Platform Architecture:
http://go.microsoft.com/fwlink/?LinkId=49885
•Network
Access Protection Frequently Asked Questions:
http://go.microsoft.com/fwlink/?LinkId=49886
•IPSec:
http://www.microsoft.com/ipsec
•Server
and Domain Isolation:
http://www.microsoft.com/technet/network/sdiso/default.mspx