17
Planning and Administering Windows Server ® 2008 Servers

Planning and Administering Windows Server ® 2008 Servers

Embed Size (px)

Citation preview

Page 1: Planning and Administering Windows Server ® 2008 Servers

Planning and Administering Windows

Server® 2008 Servers

Page 2: Planning and Administering Windows Server ® 2008 Servers

Module 5: Managing Windows Server 2008 Security

• Planning a Defense-in-Depth Strategy

• Implementing Host-Level Security for Windows Server 2008

• Implementing Network Security for Windows Server 2008

Page 3: Planning and Administering Windows Server ® 2008 Servers

Lesson: Planning a Defense-in-Depth Strategy

• Characteristics of a Defense-in-Depth Strategy

• Layers in a Defense-in-Depth Strategy

Page 4: Planning and Administering Windows Server ® 2008 Servers

Characteristics of a Defense in Depth Strategy

A robust defense-in-depth strategy includes:A robust defense-in-depth strategy includes:

A security risk management framework

Identity and access management policies

Network protection

Update management

Education

Incident response

Continual reassessment and optimization

A security risk management framework

Identity and access management policies

Network protection

Update management

Education

Incident response

Continual reassessment and optimization

Page 5: Planning and Administering Windows Server ® 2008 Servers

Layers in a Defense-in-Depth Strategy

Policies and proceduresPolicies and procedures

Physical securityPhysical security

Perimeter defensesPerimeter defenses

Network defensesNetwork defenses

Host defensesHost defenses

Application defensesApplication defenses

Data defensesData defenses

Page 6: Planning and Administering Windows Server ® 2008 Servers

Lesson: Implementing Host-Level Security for Windows Server 2008

• Assigning Administrative Permissions

• Windows Server 2008 Firewall Configuration

• Implementing Security Policies

• Implementing Security Templates

• Converting Security Configuration Wizard Settings to Security Templates

Page 7: Planning and Administering Windows Server ® 2008 Servers

Assigning Administrative Permissions

• Principle of least privilege Identify administrative permissions or

privileges required Grant only those permissions or privileges

• Granting privileges Factors affecting decision Relinquishing rights

• Principle of least privilege Identify administrative permissions or

privileges required Grant only those permissions or privileges

• Granting privileges Factors affecting decision Relinquishing rights

Page 8: Planning and Administering Windows Server ® 2008 Servers

Windows Server 2008 Firewall Configuration

• Direction

• Port

• Program

• Protocol

• Source IP address

• Destination IP address

• Connection security rule

• Direction

• Port

• Program

• Protocol

• Source IP address

• Destination IP address

• Connection security rule

Page 9: Planning and Administering Windows Server ® 2008 Servers

Implementing Security Policies

Security Configuration Wizard template settings include:

• Server roles

• Client features

• Additional services

• Firewall rules

• Authentication options

• Audit policy

Security Configuration Wizard template settings include:

• Server roles

• Client features

• Additional services

• Firewall rules

• Authentication options

• Audit policy

Page 10: Planning and Administering Windows Server ® 2008 Servers

Implementing Security Templates

• Built-in templates Configure default security settings or

recommended values

• Built-in templates Configure default security settings or

recommended values

• Microsoft templates Download additional templates with

security guides

• Microsoft templates Download additional templates with

security guides

• Custom templates Security Templates MMC snap-in Security Configuration and Analysis MMC

snap-in

• Custom templates Security Templates MMC snap-in Security Configuration and Analysis MMC

snap-in

Page 11: Planning and Administering Windows Server ® 2008 Servers

Converting Security Configuration Wizard Settings to Security Templates

Convert SCW security policies directly to GPOsConvert SCW security policies directly to GPOs

Scwcmd.exe transform /p:SCWpolicyname.xml /g:GPOnameScwcmd.exe transform /p:SCWpolicyname.xml /g:GPOname

Page 12: Planning and Administering Windows Server ® 2008 Servers

Lesson: Implementing Network Security for Windows Server 2008

• Windows Server 2008 Server Locations

• Options for Network Security

• Recommendations for Implementing Windows Server 2008 Server Core

Page 13: Planning and Administering Windows Server ® 2008 Servers

Windows Server 2008 Server Locations

• Perimeter network

• Bastion host

• Internal

• Segmented networks

• Perimeter network

• Bastion host

• Internal

• Segmented networksSegmented networks

Segmented networks

Perimeter Network

Perimeter Network

InternalInternal

Bastion hostBastion host

Page 14: Planning and Administering Windows Server ® 2008 Servers

Options for Network Security

Requirement Security Measures

Secure Network Access

• Physical security

• 802.1x authentication

• Network segmentation

• Firewalls

• Network Access Protection (NAP)

Secure Network Traffic

• Network segmentation

• Firewalls

• IPSec

Page 15: Planning and Administering Windows Server ® 2008 Servers

Server Core enables you to install roles without additional services or the GUI

Server Core enables you to install roles without additional services or the GUI

Recommendations for Implementing Windows Server 2008 Server Core

• AD DS

• AD LDS

• DHCP

• DNS

• File Server

• Print Server

• IIS

• Streaming Media

• AD DS

• AD LDS

• DHCP

• DNS

• File Server

• Print Server

• IIS

• Streaming Media

ExtranetExtranet

Perimeter network

Perimeter network

Page 16: Planning and Administering Windows Server ® 2008 Servers

Lab: Managing Windows Server 2008 Security

• Exercise 1: Planning a Windows Server 2008 Security Configuration

• Exercise 2: Implementing File Server Security

Logon information

Virtual machine6430A-NYC-DC1-05

6430A-NYC-SVR1-05

User name Woodgrovebank\Administrator

Password Pa$$w0rd

Estimated time: 45 minutes

Page 17: Planning and Administering Windows Server ® 2008 Servers

Module Review and Takeaways

• Review Questions

• Best Practices

• Tools