SlideShare a Scribd company logo
1 of 24
Module 8
Increasing Security for
Windows Servers
Module Overview
• Windows Security Overview
• Configuring Windows Firewall with Advanced Security
• Deploying Updates with Windows Server Update Services
Lesson 1: Windows Security Overview
• Discussion: Identifying Security Risks and Costs
• Applying Defense-In-Depth to Increase Security
• Best Practices for Increasing Security
Discussion: Identifying Security Risks and Costs
What are some of the risks and
associated costs to Windows-
based networks?
5 min
Applying Defense-In-Depth to Increase Security
Defense-in-depth provides multiple layers of defense to
protect a networking environment
Security documents, user
education
Policies, Procedures, & Awareness
Physical Security
OS hardening,
authentication
Firewalls
Guards, locks
Network segments,
IPsec
Application hardening,
antivirus
ACLs, encryption, EFS
Perimeter
Internal Network
Host
Application
Data
Best Practices for Increasing Security
Some best practices for increasing security are:
Windows Server 2008
Apply all available security updates quickly
Follow the principle of least privilege
Restrict console login
Restrict physical access
Lesson 2: Configuring Windows Firewall with
Advanced Security
• What Is Windows Firewall with Advanced Security?
• Discussion: Why Is a Host-Based Firewall Important?
• Firewall Profiles
• Demonstration: How to Configure Firewall Profiles
• Deploying Windows Firewall Rules
What Is Windows Firewall with Advanced Firewall?
Inbound rules
Outbound rules
Connection security rules
Windows Firewall with Advanced Security is a host-based
firewall the protects individual servers
Control inbound communication initiated from the network
All inbound requests are blocked by default
Control outbound communication initiated by the host
All outbound requests are allowed by default
Configure IPsec for encryption and authentication
Discussion: Why Is a Host-Based Firewall Important?
Why is it important to use a host-
based firewall like Windows
Firewall with Advanced Security?
5 min
Firewall Profiles
The firewall profiles are:
Domain
Public
Private
Firewall profiles are a set of configuration settings that apply to
a particular network type
Windows Server 2008 R2 introduces the ability to have multiple
active firewall profiles
Demonstration: How to Configure Firewall Profiles
In this demonstration you will see how to configure
firewall profiles
Deploying Windows Firewall Rules
You can deploy Windows Firewall rules:
• Manually
• By exporting and importing firewall rules
• By using Group Policy
Lesson 3: Deploying Updates with Windows
Server Update Services
• What Is Windows Server Update Services?
• Windows Server Update Process
• Server Requirements for WSUS
• Configuring Automatic Updates
• WSUS Administration
• What Are Computer Groups?
• Approving Updates
What Is Windows Server Update Services?
Automatic
Updates
Server running
Windows Server
Update Services
Automatic
Updates
LAN
Internet
Test Clients
Windows Server Update Services Process
Update
Management
Phase 1: Assess
• Set up a production environment that will support update
management for both routine and emergency scenarios
Phase 3: Evaluate and Plan
• Test updates in an environment that resembles, but is
separate from, the production environment
• Determine the tasks necessary to deploy updates into
production, plan the update releases, build the releases,
and then conduct acceptance testing of the releases
Phase 4: Deploy
•Approve and schedule
update installations
•Review the process
after the deployment is
complete
Phase 4: Deploy
• Approve and
schedule update
installations
• Review the process
after the deployment
is complete
Phase 2: Identify
• Discover new updates
in a convenient
manner
• Determine whether
updates are relevant
to the production
environment
Identify
Evaluate
and Plan
Deploy
Assess
Server Requirements for WSUS
Software requirements:
Hardware requirements are similar to the Windows
operating system
IIS 6.0 or later
Microsoft .NET Framework 2.0 or later
Microsoft Management Console 3.0
Microsoft Report Viewer Redistributable 2008
SQL Server 2008, SQL Server 2005 SP2, or
Windows Internal Database
Configuring Automatic Updates
WSUS Server Client Server
Client computers must be configured to use the WSUS
server as a source for updates
Group Policy is used to configure the client servers
Other Group Policy settings related to Auto:
Update frequency
Update installation schedule
Whether automatic restarts are allowed
Default computer group in WSUS
WSUS Administration
What Are Computer Groups?
Computer groups are a way to organize WSUS clients
Create custom computer groups to control update
application
Default computer groups:
All Computers
Unassigned Computers
Approving Updates
Updates can be approved automatically but it is not
recommended
Updates should be tested before they are approved
for production
Updates can be declined if they are not required
Updates can be removed if they cause problems
Lab: Increasing Security for Windows Servers
• Exercise 1: Deploying a Windows Firewall Rule
• Exercise 2: Implementing WSUS
Logon information
Virtual machine
NYC-DC1,
NYC-SVR1
User name Administrator
Password Pa$$w0rd
Estimated time: 45 minutes
Lab Scenario
• Your organization has implemented new software for
monitoring client computers and servers. This software
is already installed on the computers, but your central
monitoring console is unable to initiate communication with
the software. The installation routine for the software did
not open the necessary port in Windows Firewall.
• You need to deploy a Windows Firewall rule that allows all
computers in the organization to respond to communication
attempts from the centralized monitoring console that runs
on port 10005. Documentation from the product vendor
indicates that you can test this port by using a Web browser
to view an XML file.
• In the past management of updates for clients and servers
in your organization has been ad hoc. Some servers have
not had updates applied while other are applying updates
immediately. This has resulted in an insecure environment.
You are implementing WSUS to begin implementing a
controlled process for applying updates to clients and
servers.
Lab Review
• Why was it appropriate to deploy the firewall rule by using
Group Policy?
• Is the use of wuauclt.exe typically required when
implementing WSUS?
Module Review and Takeaways
• Review Questions
• Tools

More Related Content

What's hot

OSSIM User Training: Get Improved Security Visibility with OSSIM
OSSIM User Training: Get Improved Security Visibility with OSSIMOSSIM User Training: Get Improved Security Visibility with OSSIM
OSSIM User Training: Get Improved Security Visibility with OSSIMAlienVault
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide Lauren Bell
 
Unified device management_the_royal_albert_hall_v4_public
Unified device management_the_royal_albert_hall_v4_publicUnified device management_the_royal_albert_hall_v4_public
Unified device management_the_royal_albert_hall_v4_publicHerman Arnedo
 
N central 9 5 service pack 1
N central 9 5 service pack 1N central 9 5 service pack 1
N central 9 5 service pack 1Solarwinds N-able
 
Kerio Control 7 Overview
Kerio Control 7 OverviewKerio Control 7 Overview
Kerio Control 7 Overviewrkoscak
 
V mware thin app 4.5 what_s new presentation
V mware thin app 4.5 what_s new presentationV mware thin app 4.5 what_s new presentation
V mware thin app 4.5 what_s new presentationsolarisyourep
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint ProtectionMindRiver Group
 
Server Hardening Primer - Eric Vanderburg - JURINNOV
Server Hardening Primer - Eric Vanderburg - JURINNOVServer Hardening Primer - Eric Vanderburg - JURINNOV
Server Hardening Primer - Eric Vanderburg - JURINNOVEric Vanderburg
 
Software Deployment by DeskCenter USA
Software Deployment by DeskCenter USASoftware Deployment by DeskCenter USA
Software Deployment by DeskCenter USADeskCenter USA Inc.
 
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery. NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery. ManageEngine, Zoho Corporation
 
VMworld 2013: vSphere Upgrade Series Part 2: vSphere Hosts and Virtual Machines
VMworld 2013: vSphere Upgrade Series Part 2: vSphere Hosts and Virtual Machines VMworld 2013: vSphere Upgrade Series Part 2: vSphere Hosts and Virtual Machines
VMworld 2013: vSphere Upgrade Series Part 2: vSphere Hosts and Virtual Machines VMworld
 
Os Deployment With Configuration Manager 2007
Os Deployment With Configuration Manager 2007Os Deployment With Configuration Manager 2007
Os Deployment With Configuration Manager 2007Amit Gatenyo
 
Mastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installationMastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installationnetworkershome
 
Introduction to Trusted Virtual Client
Introduction to Trusted Virtual ClientIntroduction to Trusted Virtual Client
Introduction to Trusted Virtual Clientgustavoeliano
 
SpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu JaegerSpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu JaegerSpiceworks
 

What's hot (20)

OSSIM User Training: Get Improved Security Visibility with OSSIM
OSSIM User Training: Get Improved Security Visibility with OSSIMOSSIM User Training: Get Improved Security Visibility with OSSIM
OSSIM User Training: Get Improved Security Visibility with OSSIM
 
Lession 7
Lession 7Lession 7
Lession 7
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide
 
Unified device management_the_royal_albert_hall_v4_public
Unified device management_the_royal_albert_hall_v4_publicUnified device management_the_royal_albert_hall_v4_public
Unified device management_the_royal_albert_hall_v4_public
 
N central 9 5 service pack 1
N central 9 5 service pack 1N central 9 5 service pack 1
N central 9 5 service pack 1
 
Lession 9
Lession 9Lession 9
Lession 9
 
Kerio Control 7 Overview
Kerio Control 7 OverviewKerio Control 7 Overview
Kerio Control 7 Overview
 
V mware thin app 4.5 what_s new presentation
V mware thin app 4.5 what_s new presentationV mware thin app 4.5 what_s new presentation
V mware thin app 4.5 what_s new presentation
 
Manual Sophos
Manual SophosManual Sophos
Manual Sophos
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint Protection
 
Server Hardening Primer - Eric Vanderburg - JURINNOV
Server Hardening Primer - Eric Vanderburg - JURINNOVServer Hardening Primer - Eric Vanderburg - JURINNOV
Server Hardening Primer - Eric Vanderburg - JURINNOV
 
Software Deployment by DeskCenter USA
Software Deployment by DeskCenter USASoftware Deployment by DeskCenter USA
Software Deployment by DeskCenter USA
 
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery. NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
 
Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)
 
VMworld 2013: vSphere Upgrade Series Part 2: vSphere Hosts and Virtual Machines
VMworld 2013: vSphere Upgrade Series Part 2: vSphere Hosts and Virtual Machines VMworld 2013: vSphere Upgrade Series Part 2: vSphere Hosts and Virtual Machines
VMworld 2013: vSphere Upgrade Series Part 2: vSphere Hosts and Virtual Machines
 
Os Deployment With Configuration Manager 2007
Os Deployment With Configuration Manager 2007Os Deployment With Configuration Manager 2007
Os Deployment With Configuration Manager 2007
 
Mastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installationMastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installation
 
week14
week14week14
week14
 
Introduction to Trusted Virtual Client
Introduction to Trusted Virtual ClientIntroduction to Trusted Virtual Client
Introduction to Trusted Virtual Client
 
SpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu JaegerSpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu Jaeger
 

Viewers also liked

Email of Doom: New phishing attacks that threaten your clients
Email of Doom: New phishing attacks that threaten your clientsEmail of Doom: New phishing attacks that threaten your clients
Email of Doom: New phishing attacks that threaten your clientsCalyptix Security
 
Wireless Intrusion Techniques
Wireless Intrusion TechniquesWireless Intrusion Techniques
Wireless Intrusion TechniquesCadis1
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldAvishek Datta
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksCyren, Inc
 
Prevent Malicious Hacking Attacks on your APIs
Prevent Malicious Hacking Attacks on your APIsPrevent Malicious Hacking Attacks on your APIs
Prevent Malicious Hacking Attacks on your APIsSmartBear
 
Password Attack
Password Attack Password Attack
Password Attack Sina Manavi
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hackingleminhvuong
 

Viewers also liked (20)

6421 b Module-07
6421 b Module-076421 b Module-07
6421 b Module-07
 
6421 b Module-14
6421 b Module-146421 b Module-14
6421 b Module-14
 
Email of Doom: New phishing attacks that threaten your clients
Email of Doom: New phishing attacks that threaten your clientsEmail of Doom: New phishing attacks that threaten your clients
Email of Doom: New phishing attacks that threaten your clients
 
6421 b Module-10
6421 b  Module-106421 b  Module-10
6421 b Module-10
 
Wireless Intrusion Techniques
Wireless Intrusion TechniquesWireless Intrusion Techniques
Wireless Intrusion Techniques
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
Work Flow Processes
Work Flow ProcessesWork Flow Processes
Work Flow Processes
 
phishing
phishingphishing
phishing
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacks
 
Password Attack
Password AttackPassword Attack
Password Attack
 
Computer security
Computer securityComputer security
Computer security
 
6421 b Module-02
6421 b Module-026421 b Module-02
6421 b Module-02
 
6421 b Module-12
6421 b Module-126421 b Module-12
6421 b Module-12
 
Course 6421B introduction
Course 6421B introduction Course 6421B introduction
Course 6421B introduction
 
6421 b Module-11
6421 b Module-116421 b Module-11
6421 b Module-11
 
6421 b Module-13
6421 b Module-136421 b Module-13
6421 b Module-13
 
Prevent Malicious Hacking Attacks on your APIs
Prevent Malicious Hacking Attacks on your APIsPrevent Malicious Hacking Attacks on your APIs
Prevent Malicious Hacking Attacks on your APIs
 
Secret Codes
Secret CodesSecret Codes
Secret Codes
 
Password Attack
Password Attack Password Attack
Password Attack
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
 

Similar to 6421 b Module-08

Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12gameaxt
 
Windows 2012 R2 Multi Server Management
Windows 2012 R2 Multi Server ManagementWindows 2012 R2 Multi Server Management
Windows 2012 R2 Multi Server ManagementSharkrit JOBBO
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld
 
Open Audit
Open AuditOpen Audit
Open Auditncspa
 
System center 2012 configurations manager
System center 2012 configurations managerSystem center 2012 configurations manager
System center 2012 configurations managerBelarmino Tomicha
 
VMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for HorizonVMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for HorizonVMworld
 
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...VMworld
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Lumension
 
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
 New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than EverAlienVault
 
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITY
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITYCYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITY
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITYViscolKanady
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...VMworld
 
NEW LAUNCH! Amazon EC2 Systems Manager for Hybrid Cloud Management at Scale
NEW LAUNCH! Amazon EC2 Systems Manager for Hybrid Cloud Management at ScaleNEW LAUNCH! Amazon EC2 Systems Manager for Hybrid Cloud Management at Scale
NEW LAUNCH! Amazon EC2 Systems Manager for Hybrid Cloud Management at ScaleAmazon Web Services
 
Deploying Windows Vista Service Pack 1
Deploying Windows Vista Service Pack 1Deploying Windows Vista Service Pack 1
Deploying Windows Vista Service Pack 1Microsoft TechNet
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingBlack Duck by Synopsys
 

Similar to 6421 b Module-08 (20)

Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12
 
Windows 2012 R2 Multi Server Management
Windows 2012 R2 Multi Server ManagementWindows 2012 R2 Multi Server Management
Windows 2012 R2 Multi Server Management
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
 
Open Audit
Open AuditOpen Audit
Open Audit
 
System center 2012 configurations manager
System center 2012 configurations managerSystem center 2012 configurations manager
System center 2012 configurations manager
 
SCCM 2019 Demo.pptx
SCCM 2019 Demo.pptxSCCM 2019 Demo.pptx
SCCM 2019 Demo.pptx
 
VMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for HorizonVMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for Horizon
 
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
 
MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12
 
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
 New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
 
Chapter08
Chapter08Chapter08
Chapter08
 
W982 05092004
W982 05092004W982 05092004
W982 05092004
 
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITY
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITYCYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITY
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITY
 
6421 b Module-09
6421 b Module-096421 b Module-09
6421 b Module-09
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
 
NEW LAUNCH! Amazon EC2 Systems Manager for Hybrid Cloud Management at Scale
NEW LAUNCH! Amazon EC2 Systems Manager for Hybrid Cloud Management at ScaleNEW LAUNCH! Amazon EC2 Systems Manager for Hybrid Cloud Management at Scale
NEW LAUNCH! Amazon EC2 Systems Manager for Hybrid Cloud Management at Scale
 
Deploying Windows Vista Service Pack 1
Deploying Windows Vista Service Pack 1Deploying Windows Vista Service Pack 1
Deploying Windows Vista Service Pack 1
 
A plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s DeploymentA plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s Deployment
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s Missing
 

Recently uploaded

Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 

Recently uploaded (20)

Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 

6421 b Module-08

  • 1. Module 8 Increasing Security for Windows Servers
  • 2. Module Overview • Windows Security Overview • Configuring Windows Firewall with Advanced Security • Deploying Updates with Windows Server Update Services
  • 3. Lesson 1: Windows Security Overview • Discussion: Identifying Security Risks and Costs • Applying Defense-In-Depth to Increase Security • Best Practices for Increasing Security
  • 4. Discussion: Identifying Security Risks and Costs What are some of the risks and associated costs to Windows- based networks? 5 min
  • 5. Applying Defense-In-Depth to Increase Security Defense-in-depth provides multiple layers of defense to protect a networking environment Security documents, user education Policies, Procedures, & Awareness Physical Security OS hardening, authentication Firewalls Guards, locks Network segments, IPsec Application hardening, antivirus ACLs, encryption, EFS Perimeter Internal Network Host Application Data
  • 6. Best Practices for Increasing Security Some best practices for increasing security are: Windows Server 2008 Apply all available security updates quickly Follow the principle of least privilege Restrict console login Restrict physical access
  • 7. Lesson 2: Configuring Windows Firewall with Advanced Security • What Is Windows Firewall with Advanced Security? • Discussion: Why Is a Host-Based Firewall Important? • Firewall Profiles • Demonstration: How to Configure Firewall Profiles • Deploying Windows Firewall Rules
  • 8. What Is Windows Firewall with Advanced Firewall? Inbound rules Outbound rules Connection security rules Windows Firewall with Advanced Security is a host-based firewall the protects individual servers Control inbound communication initiated from the network All inbound requests are blocked by default Control outbound communication initiated by the host All outbound requests are allowed by default Configure IPsec for encryption and authentication
  • 9. Discussion: Why Is a Host-Based Firewall Important? Why is it important to use a host- based firewall like Windows Firewall with Advanced Security? 5 min
  • 10. Firewall Profiles The firewall profiles are: Domain Public Private Firewall profiles are a set of configuration settings that apply to a particular network type Windows Server 2008 R2 introduces the ability to have multiple active firewall profiles
  • 11. Demonstration: How to Configure Firewall Profiles In this demonstration you will see how to configure firewall profiles
  • 12. Deploying Windows Firewall Rules You can deploy Windows Firewall rules: • Manually • By exporting and importing firewall rules • By using Group Policy
  • 13. Lesson 3: Deploying Updates with Windows Server Update Services • What Is Windows Server Update Services? • Windows Server Update Process • Server Requirements for WSUS • Configuring Automatic Updates • WSUS Administration • What Are Computer Groups? • Approving Updates
  • 14. What Is Windows Server Update Services? Automatic Updates Server running Windows Server Update Services Automatic Updates LAN Internet Test Clients
  • 15. Windows Server Update Services Process Update Management Phase 1: Assess • Set up a production environment that will support update management for both routine and emergency scenarios Phase 3: Evaluate and Plan • Test updates in an environment that resembles, but is separate from, the production environment • Determine the tasks necessary to deploy updates into production, plan the update releases, build the releases, and then conduct acceptance testing of the releases Phase 4: Deploy •Approve and schedule update installations •Review the process after the deployment is complete Phase 4: Deploy • Approve and schedule update installations • Review the process after the deployment is complete Phase 2: Identify • Discover new updates in a convenient manner • Determine whether updates are relevant to the production environment Identify Evaluate and Plan Deploy Assess
  • 16. Server Requirements for WSUS Software requirements: Hardware requirements are similar to the Windows operating system IIS 6.0 or later Microsoft .NET Framework 2.0 or later Microsoft Management Console 3.0 Microsoft Report Viewer Redistributable 2008 SQL Server 2008, SQL Server 2005 SP2, or Windows Internal Database
  • 17. Configuring Automatic Updates WSUS Server Client Server Client computers must be configured to use the WSUS server as a source for updates Group Policy is used to configure the client servers Other Group Policy settings related to Auto: Update frequency Update installation schedule Whether automatic restarts are allowed Default computer group in WSUS
  • 19. What Are Computer Groups? Computer groups are a way to organize WSUS clients Create custom computer groups to control update application Default computer groups: All Computers Unassigned Computers
  • 20. Approving Updates Updates can be approved automatically but it is not recommended Updates should be tested before they are approved for production Updates can be declined if they are not required Updates can be removed if they cause problems
  • 21. Lab: Increasing Security for Windows Servers • Exercise 1: Deploying a Windows Firewall Rule • Exercise 2: Implementing WSUS Logon information Virtual machine NYC-DC1, NYC-SVR1 User name Administrator Password Pa$$w0rd Estimated time: 45 minutes
  • 22. Lab Scenario • Your organization has implemented new software for monitoring client computers and servers. This software is already installed on the computers, but your central monitoring console is unable to initiate communication with the software. The installation routine for the software did not open the necessary port in Windows Firewall. • You need to deploy a Windows Firewall rule that allows all computers in the organization to respond to communication attempts from the centralized monitoring console that runs on port 10005. Documentation from the product vendor indicates that you can test this port by using a Web browser to view an XML file. • In the past management of updates for clients and servers in your organization has been ad hoc. Some servers have not had updates applied while other are applying updates immediately. This has resulted in an insecure environment. You are implementing WSUS to begin implementing a controlled process for applying updates to clients and servers.
  • 23. Lab Review • Why was it appropriate to deploy the firewall rule by using Group Policy? • Is the use of wuauclt.exe typically required when implementing WSUS?
  • 24. Module Review and Takeaways • Review Questions • Tools