SlideShare a Scribd company logo
1 of 55
Download to read offline
Ing. Eduardo Castro, PhD
Comunidad Windows

ecastro@mswindowscr.org
http://comunidadwindows.org
“Windows Server 2008 helps
    Macquarie operate… our remote
    offices more securely and be able to used RODC to
                                  “We’ll
                                  place domain controllers at sites
    efficiently than we could in the
    past.” key infrastructure thatwhere physical security has
“The public                       always been a concern and we’ll
we Phillip Dundas
    created through our have much better control over our
deployment of Lead,
    Technical Team Windows Server
                                  remote infrastructure.”
    Windows Server Group, Information Technology
2008 has fundamentally increased confident that the bank is
    Group                           “We are
the Macquarie Group Limited security more secure, that devices
     level of information Loic Calvez
                                    now
that we have at the bank.”Senior Enterprise Infrastructure are secure,
                                    accessing our network Architect
                                  Lafarge
Security Director
                                    and that those devices meet our
PKO Bank Polski                     current network policy for access.”
                               Howard Witherby
                               Senior Vice President of Operations
                               National Bank & Trust
Security Development Lifecycle
Installation Options
Read Only Domain Controller (RODC)
Network Access Protection (NAP)
Others
Service                             DirectAccess                          BitLocker to Go
Foundation




                              Mostly Server R2




                                                                    Mostly Windows 7
             Hardening*                          AppLocker                             Multiple Firewall
             Kernel Patch                        Enhanced                              Profiles
             Protection*                         Storage Access                        Streamlined UAC
             Data Execution                      DNSSEC                                Biometric
             Prevention*                                                               Framework
                                                 Enhanced
             BitLocker*                          Auditing*                             HTTP PKI Enroll
                                                 Suite-B for EFS,                      PIV Smartcards
                                                 Kerberos, TLS
                                                 v1.2 and more
Methods of Security and Policy Enforcement
    Network Location Awareness
    Network Access Protection
Windows Firewall with Advanced Security
Internet Protocol Security
Windows Server Hardening
Server and Domain Isolation
Active Directory Domain Services Auditing
Read-Only Domain Controller
BitLocker Drive Encryption
Removable Device Installation Control
Enterprise PKI
Create inbound and outbound rules
Create a firewall rule limiting a service
Integrated with WFAS
IPSec improvements
  Simplified IPSec policy configuration
  Client-to-DC IPSec protection
  Improved load balancing and clustering server support
  Improved IPSec authentication
  Integration with NAP
  Multiple authentication methods
  New cryptographic support
  Integrated IPv4 and IPv6 support
  Extended events and performance monitor counters
  Network diagnostics framework support
What
changes
have been
made to AD
DS
auditing?
New Functionality
                                   RODC
   AD database
   Unidirectional replication
   Credential caching
   Password replication policy
   Administrator role separation
   Read-Only DNS
 Requirements/special considerations
A read-only Active Directory Domain Services
database
Unidirectional replication mitigating misinformation
even if a change is made on a RODC
Caching of only specific attributes based
Credential caching for only specific users
Separation of administrator capabilities
Read-only DNS
Pre-create RODC account allowing local
installation without the need for admin credentials
Data protection
   Drive encryption
   Integrity checking
 BDE hardware and software requirements
Easier management through PKIView
Certificate Web enrollment
Network device enrollment service
Managing certificate with group policy
Certificate deployment changes
Online certificate status protocol support
Cryptographic next generation
Enforce Security Policy
Improve Domain Security
Improve System Security
Improve Network
Communications Security
Network Access Protection          Network Access Quarantine Control



Internal, VPN, and Remote Access   Only VPN and Remote Access
Client                             Clients

IPSec, 802.1X, DHCP, and VPN       DHCP and VPN


NAP NPS and Client included in     Installed from Windows Server
Windows Server 2008; NAP client    2003 Resource Kit
included in Windows Vista
Automatic remediation
Health policy validation
Health policy compliance
Limited access
How it works
                                                                              Policy Servers
                                                                              e.g. Patch, Antivirus
                                                                  3
              1                   2
                                                    Not policy-
                                                    compliant
                                                                                    4                 Fix Up
                                                                                                      Servers
                                                                                                      e.g. Patch
                                                                              Restricted
 Windows                              Microsoft                                Network
  Client                                NPS
                  DHCP, VPN,                            Policy-
                  Switch/Router                        compliant

    Client requests access to network and presents current
1
    health state                                                        5         Corporate Network
    DHCP, VPN, or Switch/Router relays health status to
2   Microsoft Network Policy Server (NPS) via Remote
    Authentication Dial-In User Service (RADIUS)
    Network Policy Server (NPS) validates against IT-defined
3   health policy
    If not policy-compliant, client is put in a restricted VLAN
4
    and given access to fix up resources to download patches,
    configurations, signatures (Repeat 1 - 4)
5   If policy-compliant, client is granted full access to corporate network
IPSec

802.1X


VPN


DHCP

NPS
 RADIUS
Create a NAP policy
Use the MMC to create NAP
configuration settings
Create a new RADIUS client
Create a new system health validator
for Windows Vista and Windows XP
SP2
Logical Networks
IPSec Enforcement
IEEE 802.1X
Remote Access VPNs
DHCP
Checking the health and status of roaming
laptops
Ensuring the health of corporate desktops
Determining the health of visiting laptops
Verify the compliance of home computers
Carefully test and plan all security policies
Implement Network Access Protection
Use Windows Firewall and Advanced
Security to implement IPSec
Deploy Read-Only Domain Controllers,
where appropriate
Implement BitLocker Drive Encryption
Take advantage of PKI improvements
Group Policy Changes
How Group Policy works now...
                                                                                   Windows
  Group Policy Service
               Process                          Group Policy
                                                Templates                       Vista/Windows
                                                                                 Server 2008
    GP now runs in a
    Part of Winlogon                                                            ADM
                                                Templates
                                                  ADM templates               ADM
    shared service                                                              ADM
                                                 ADM Templates now in
                                                  difficult to manage ADM ADM
    Hardened Service, more                                                         ADMX
    reliable                                  Local GPOs (ADMX,
                                                 ADMX files                         ADM

                                                 ADML)
                                              Multiple flexibility with a single local
                                               Limited Local
           Settings
           Group Policy Settings              GPOs
                                               GPOLGPO’s
             Over 800 policy settings in
             ~1,800 new policy changes               LGPO
                                                                    Local Computer
                                                                    Local Computer Policy
             with Windows Vista                     LGPO                   Policy
             XP                                      Admin        Admin/Non-Admin Group Policy
             Extended GP for new Windows
             Vista features coverage
             Incomplete                               User
                                                                 User Specified Group Policy

Network Location missing key
          means
Awareness scenarios of
 Limited awareness
          (NLA)                                  Templates and
                                                 Group Policy Central
 NLA service provides the latest
 changing network                                Replication
                                                 Store
 network information                                                      ADMX
 conditions query or register with
 Applications can
                                                   Centralized repository ADML
                                                   Journal Wrap
 NLA for network change indications                for ADMX
                                                   anyone? Bloated
                                                     SysVol
                                                DC Created in the Sysvol
            Troubleshootin
            Group Policy Logging                   SYSVOL? l Policie
                                                       DC
                                                            SysVo
                                                                +
            gAdministrative log                    on DC          s
                                                              + GUID
              Applications and Services log        in each domain ADM
                                                                +
              Userenv log                                     + Policy
              XML based event logs                 New Replicator with
                                                                Definitions
                                                                ADMX, ADML
                                                                Files
              GP Result
              New Tools - GPOLogView             FRS/DFS-R
                                                   DFS-R
What is new?
 GP PowerShell features
    Adding to GP scripts extensions
    PowerShell cmdlets to perform GP operations
 Starter GPOs in-box in Windows 7
    Best practices that map to the security guide
 ADMX enhancements
 GP Preferences enhancements
    GP Preferences, new in Windows Server 2008
    New items added to support new OS
    functionality
Import-module GroupPolicy
get-help *-gp*
    New                          Get                             Set

•New-GPLink                  •Get-GPInheritance              •Set-GPInheritance
•New-GPO                     •Get-GPO                        •Set-GPLink
•New-GPStarterGPO            •Get-GPOReport                  •Set-GPPermissions
                             •Get-GPPermissions              •Set-GPPrefRegistryValue
                             •Get-GPPrefRegistryValue        •Set-GPRegistryValue
                             •Get-GPRegistryValue
                             •Get-GPResultantSetofPolicy
                             •Get-GPStarterGPO




                    Remove                       Misc
                • Remove-GPLink              • Backup-GPO
                • Remove-GPO                 • Copy-GPO
                • Remove-                    • Import-GPO
                  GPPrefRegistryValue        • Rename-GPO
                • Remove-                    • Restore-GPO
                  GPRegistryValue
Have heard up to 11,000 GPOs
Not best practice
  GPMC has perf issues loading
  Management difficulties
  Troubleshooting difficulties
  Migration difficulties
Recommendation:
  Consolidate
  AGPM is tested up to 2000 GPOs
New UI: More intuitive, integrated help content,
no more tabs

Support for:
REG_MultiSZ
REG_QWORD
Starter GPOs & ADMX UI
Preference Settings
   Not true “Policy”
More control of desktop – more settings!
   Not limited to policy-aware applications
Ease of administration through rich UI
Better targeting
New in Windows 7
   Support for new Power Plan settings
   Support for new Schedule task triggers, actions, etc.
Group Policies              Group Policy
                            Preferences
(Native / Managed)
                            • Users can change
• Setting are enforced,       settings
  user cannot change        • Multiple items per
  settings                    GPO
• Settings revert back to   • Can write registry
  original setting            settings to more than
• Highest precedence          HKCU, HKLM hives
• Work only on specific     • Granular Targeting of
  registry location           individual items
Drive Mappings
Regional Settings
Printer Mappings
Shortcuts
Start Menu
Internet Explorer
Settings
Local Users and
Groups
Services
Network Shares
Environment
Variables
Familiar Experience
  Clearer to understand
  and find
  Easy to manage
  Better control of individual
  settings – Red/Green
Powerful browsers
  Avoids typing errors
  Configure settings quicker
29 different targeting options
 Boolean AND, OR, IS, IS NOT
 Wildcard support
    “WSBNE*”



Target on the item, not just the GPO
Robust targeting
                          29 types
 Item level targeting,    Boolean logic (And, Or, Not)
    not GPO level         Collections




Intuitive UI

 No need to learn
query languages
Apply once and do not reapply
 Remove when no longer applicable
 Create – Replace - Update - Delete




More than just Enable vs Disable
Active Directory: Windows 2000
Console - Group Policy Manager Console - Snap-
in
   Part of the Remote Server Admin Tool (link and end)
   One Windows 7 client or Windows Server 2008 R2
   Terminal Server
Client - Client Side Extensions (CSE’s)
3000 Total ADMX settings
300 new ADMX settings
  IE more than 90 new
  Bitlocker
  Taskbar
  Power
  Terminal Services rebranded
  “Remote Desktop Services”
Settings Spreadsheet
12 settings added under Security Options
  Restrict NTLM (multiple)
  Kerberos encryption types
  Local System null session fallback
Only supported on Windows 7 & Windows
Server 2008 R2
Settings Spreadsheet
Wireless Network (IEEE 802.11) Policies
Public Key Policies
    Certificate Services Client - Certificate
    Enrollment Policy
    BitLocker Drive Encryption
Network Access Protection
    Enforcement Clients: Removed RAQ EC and
    TS Gateway
    Enforcement Clients: Added RD Gateway QEC
Application Control Policies – AppLocker
    More info
Advanced Audit Policy Configuration
    More info
Name Resolution Policy
Storage                Storage              Compliance   Security and
    growth                 cost                              Information leakage




Increasing data management needs / many data management products

                                     Security
                      HSM                          Archive


                 Backup                               Encryptio
                                                         n

              Replicatio
                                                        Expiration
                 n
Business                                      IT

              Need per project share




       Make sure business secret files
              do not leak out




             Backup files with personal
           information to encrypted store


           Expire low business impact files
           created three years ago and not
                  touched for a year
Step 1:
Classify data




   Step 2:
Apply policy
according to
classification
Information
                                                         Personal

                                                                       Secrecy
Business                                            IT

                Need per project share




           Make sure business secret files do
                     not leak out




               Backup files with personal
             information to encrypted store




        Expire low business impact files created
       three years ago and not touched for a year
IT Scripts           Automatic classification
                                            Location
   Step 1:       Manual
                                            Content
Classify data    Line Of Business
                 application                Owner
                                            Other


                    Expiration          Search
   Step 2:
                    Reports             Backup
Apply policy
  based on          Custom commands     Archive
classification
                    Security            Leakage prevention
Extensible infrastructure-Partner ecosystem
Inbox end to end scenarios
Integration with SharePoint

     Get classification properties       Set classification properties
     API for external applications       API for external applications


                 Extract                             Store         Apply Policy
Discover
              classification    Classify data    classification      based on
  Data
                properties                         properties      classification




           Windows Server 2008 R2
           File Classification Extensibility
           points
When using IPSec – employ ESP with
encryption
Carefully test and verify all IPSec Policies
Consider using Domain isolation
Use quality of service to improve bandwidth
Plan to prioritize traffic on the network
Apply network access protection to secure
client computers
IPSec Server Domain Isolation
Full Volume Bitlocker on Servers
New elliptic curve encryption strength
Network Level Authentication for RDP
Service Profiling
New Levels of System Auditing
… and many more
© 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.
The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market
     conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.
                                 MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
Windows Server 2008 Security Overview Short

More Related Content

What's hot

Shared Oracle Hosting (Linux)
Shared Oracle Hosting (Linux)Shared Oracle Hosting (Linux)
Shared Oracle Hosting (Linux)webhostingguy
 
Label based Mandatory Access Control on PostgreSQL
Label based Mandatory Access Control on PostgreSQLLabel based Mandatory Access Control on PostgreSQL
Label based Mandatory Access Control on PostgreSQLKohei KaiGai
 
Windows Hosting Service-Level Description
Windows Hosting Service-Level DescriptionWindows Hosting Service-Level Description
Windows Hosting Service-Level Descriptionwebhostingguy
 
50357 a enu-module05
50357 a enu-module0550357 a enu-module05
50357 a enu-module05Bố Su
 
Getting started on fed ramp sec auth for csp
Getting started on fed ramp sec auth for cspGetting started on fed ramp sec auth for csp
Getting started on fed ramp sec auth for cspTuan Phan
 
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...Novell
 
Windows Server 2008 R2 Overview
Windows Server 2008 R2 OverviewWindows Server 2008 R2 Overview
Windows Server 2008 R2 OverviewSteven Wilder
 
Win08 R2 It Pro Overview
Win08 R2 It Pro OverviewWin08 R2 It Pro Overview
Win08 R2 It Pro Overviewguest092b9a8
 
Domain Services for Windows: Best Practices for Windows Interoperability
Domain Services for Windows: Best Practices for Windows InteroperabilityDomain Services for Windows: Best Practices for Windows Interoperability
Domain Services for Windows: Best Practices for Windows InteroperabilityNovell
 
NetMagic Dedicated Hosting
NetMagic Dedicated HostingNetMagic Dedicated Hosting
NetMagic Dedicated Hostingwebhostingguy
 
50357 a enu-module02
50357 a enu-module0250357 a enu-module02
50357 a enu-module02Bố Su
 
DirectShare Quick Start Setup Guide
DirectShare Quick Start Setup GuideDirectShare Quick Start Setup Guide
DirectShare Quick Start Setup GuideChristian Petrou
 
Consolidation Planning: Getting the Most from Your Virtualization Initiative
Consolidation Planning: Getting the Most from Your Virtualization InitiativeConsolidation Planning: Getting the Most from Your Virtualization Initiative
Consolidation Planning: Getting the Most from Your Virtualization InitiativeNovell
 
CloudBridge and Repeater Datasheet
CloudBridge and Repeater DatasheetCloudBridge and Repeater Datasheet
CloudBridge and Repeater DatasheetNuno Alves
 
Website hosting and infrastructure
Website hosting and infrastructureWebsite hosting and infrastructure
Website hosting and infrastructurewebhostingguy
 
50357 a enu-module01
50357 a enu-module0150357 a enu-module01
50357 a enu-module01Bố Su
 
Installing and Configuring Novell Conferencing
Installing and Configuring Novell ConferencingInstalling and Configuring Novell Conferencing
Installing and Configuring Novell ConferencingNovell
 
How to use iSCSI Storage with DirectShare DirectCFS
How to use iSCSI Storage with DirectShare DirectCFSHow to use iSCSI Storage with DirectShare DirectCFS
How to use iSCSI Storage with DirectShare DirectCFSChristian Petrou
 

What's hot (18)

Shared Oracle Hosting (Linux)
Shared Oracle Hosting (Linux)Shared Oracle Hosting (Linux)
Shared Oracle Hosting (Linux)
 
Label based Mandatory Access Control on PostgreSQL
Label based Mandatory Access Control on PostgreSQLLabel based Mandatory Access Control on PostgreSQL
Label based Mandatory Access Control on PostgreSQL
 
Windows Hosting Service-Level Description
Windows Hosting Service-Level DescriptionWindows Hosting Service-Level Description
Windows Hosting Service-Level Description
 
50357 a enu-module05
50357 a enu-module0550357 a enu-module05
50357 a enu-module05
 
Getting started on fed ramp sec auth for csp
Getting started on fed ramp sec auth for cspGetting started on fed ramp sec auth for csp
Getting started on fed ramp sec auth for csp
 
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
Novell SecureLogin Installation, Deployment, Lifecycle Management and Trouble...
 
Windows Server 2008 R2 Overview
Windows Server 2008 R2 OverviewWindows Server 2008 R2 Overview
Windows Server 2008 R2 Overview
 
Win08 R2 It Pro Overview
Win08 R2 It Pro OverviewWin08 R2 It Pro Overview
Win08 R2 It Pro Overview
 
Domain Services for Windows: Best Practices for Windows Interoperability
Domain Services for Windows: Best Practices for Windows InteroperabilityDomain Services for Windows: Best Practices for Windows Interoperability
Domain Services for Windows: Best Practices for Windows Interoperability
 
NetMagic Dedicated Hosting
NetMagic Dedicated HostingNetMagic Dedicated Hosting
NetMagic Dedicated Hosting
 
50357 a enu-module02
50357 a enu-module0250357 a enu-module02
50357 a enu-module02
 
DirectShare Quick Start Setup Guide
DirectShare Quick Start Setup GuideDirectShare Quick Start Setup Guide
DirectShare Quick Start Setup Guide
 
Consolidation Planning: Getting the Most from Your Virtualization Initiative
Consolidation Planning: Getting the Most from Your Virtualization InitiativeConsolidation Planning: Getting the Most from Your Virtualization Initiative
Consolidation Planning: Getting the Most from Your Virtualization Initiative
 
CloudBridge and Repeater Datasheet
CloudBridge and Repeater DatasheetCloudBridge and Repeater Datasheet
CloudBridge and Repeater Datasheet
 
Website hosting and infrastructure
Website hosting and infrastructureWebsite hosting and infrastructure
Website hosting and infrastructure
 
50357 a enu-module01
50357 a enu-module0150357 a enu-module01
50357 a enu-module01
 
Installing and Configuring Novell Conferencing
Installing and Configuring Novell ConferencingInstalling and Configuring Novell Conferencing
Installing and Configuring Novell Conferencing
 
How to use iSCSI Storage with DirectShare DirectCFS
How to use iSCSI Storage with DirectShare DirectCFSHow to use iSCSI Storage with DirectShare DirectCFS
How to use iSCSI Storage with DirectShare DirectCFS
 

Viewers also liked

Your Website - Still the Bullseye
Your Website - Still the BullseyeYour Website - Still the Bullseye
Your Website - Still the BullseyeTrivera Interactive
 
Obtenga más de Microsoft SQL Server 2012 en el entorno de nube privada
Obtenga más de Microsoft SQL Server  2012 en el entorno de nube privadaObtenga más de Microsoft SQL Server  2012 en el entorno de nube privada
Obtenga más de Microsoft SQL Server 2012 en el entorno de nube privadaEduardo Castro
 
Cisco packettracer overview_20jul09
Cisco packettracer overview_20jul09Cisco packettracer overview_20jul09
Cisco packettracer overview_20jul09rahmanitayulia
 
Router configuration in packet tracer
Router configuration in packet  tracerRouter configuration in packet  tracer
Router configuration in packet tracerAnabia Anabia
 
Packet Tracer Tutorial # 2
Packet Tracer Tutorial # 2Packet Tracer Tutorial # 2
Packet Tracer Tutorial # 2Abdul Basit
 
How to use packet tracer
How to use packet tracerHow to use packet tracer
How to use packet tracerYunita Siswanti
 
Packet Tracer Tutorial # 1
Packet Tracer Tutorial # 1Packet Tracer Tutorial # 1
Packet Tracer Tutorial # 1Abdul Basit
 

Viewers also liked (12)

Mcse Training1
Mcse Training1Mcse Training1
Mcse Training1
 
smtep
smtepsmtep
smtep
 
Your Website - Still the Bullseye
Your Website - Still the BullseyeYour Website - Still the Bullseye
Your Website - Still the Bullseye
 
Obtenga más de Microsoft SQL Server 2012 en el entorno de nube privada
Obtenga más de Microsoft SQL Server  2012 en el entorno de nube privadaObtenga más de Microsoft SQL Server  2012 en el entorno de nube privada
Obtenga más de Microsoft SQL Server 2012 en el entorno de nube privada
 
Cisco packettracer overview_20jul09
Cisco packettracer overview_20jul09Cisco packettracer overview_20jul09
Cisco packettracer overview_20jul09
 
Good stoves adoption_factors_geo
Good stoves adoption_factors_geoGood stoves adoption_factors_geo
Good stoves adoption_factors_geo
 
Capacity Building and Sustainability
Capacity Building and SustainabilityCapacity Building and Sustainability
Capacity Building and Sustainability
 
Biocharculture water and sanitation
Biocharculture water and sanitationBiocharculture water and sanitation
Biocharculture water and sanitation
 
Router configuration in packet tracer
Router configuration in packet  tracerRouter configuration in packet  tracer
Router configuration in packet tracer
 
Packet Tracer Tutorial # 2
Packet Tracer Tutorial # 2Packet Tracer Tutorial # 2
Packet Tracer Tutorial # 2
 
How to use packet tracer
How to use packet tracerHow to use packet tracer
How to use packet tracer
 
Packet Tracer Tutorial # 1
Packet Tracer Tutorial # 1Packet Tracer Tutorial # 1
Packet Tracer Tutorial # 1
 

Similar to Windows Server 2008 Security Overview Short

Microsoft Direct Access (Part II)_John Delizo
Microsoft Direct Access (Part II)_John DelizoMicrosoft Direct Access (Part II)_John Delizo
Microsoft Direct Access (Part II)_John DelizoQuek Lilian
 
0505 Windows Server 2008 一日精華營 Part II
0505 Windows Server 2008 一日精華營 Part II0505 Windows Server 2008 一日精華營 Part II
0505 Windows Server 2008 一日精華營 Part IITimothy Chen
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld
 
Windows 2008 R2 Security
Windows 2008 R2 SecurityWindows 2008 R2 Security
Windows 2008 R2 SecurityAmit Gatenyo
 
W7 for IT Professionals
W7 for IT ProfessionalsW7 for IT Professionals
W7 for IT Professionalsguest632c73
 
W7 Enterprise
W7 EnterpriseW7 Enterprise
W7 Enterprisearalves
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...solarisyourep
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsPresentologics
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdfGrigoryShkolnik1
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Cisco Canada
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012gaborvodics
 
Layer 7: Fine Grained Authorization for Web Services
Layer 7: Fine Grained Authorization for Web ServicesLayer 7: Fine Grained Authorization for Web Services
Layer 7: Fine Grained Authorization for Web ServicesCA API Management
 
Governance 2.0: A New Look at SOA Governance in The Age of Cloud and Mobile
Governance 2.0: A New Look at SOA Governance in The Age of Cloud and MobileGovernance 2.0: A New Look at SOA Governance in The Age of Cloud and Mobile
Governance 2.0: A New Look at SOA Governance in The Age of Cloud and MobileCA API Management
 
System Center 2012 - January Licensing Update
System Center 2012 - January Licensing UpdateSystem Center 2012 - January Licensing Update
System Center 2012 - January Licensing UpdateSoftchoice Corporation
 

Similar to Windows Server 2008 Security Overview Short (20)

Microsoft Direct Access (Part II)_John Delizo
Microsoft Direct Access (Part II)_John DelizoMicrosoft Direct Access (Part II)_John Delizo
Microsoft Direct Access (Part II)_John Delizo
 
0505 Windows Server 2008 一日精華營 Part II
0505 Windows Server 2008 一日精華營 Part II0505 Windows Server 2008 一日精華營 Part II
0505 Windows Server 2008 一日精華營 Part II
 
Windows 7 For Itpro
Windows 7 For ItproWindows 7 For Itpro
Windows 7 For Itpro
 
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview VMworld 2013: VMware Compliance Reference Architecture Framework Overview
VMworld 2013: VMware Compliance Reference Architecture Framework Overview
 
Windows 2008 R2 Security
Windows 2008 R2 SecurityWindows 2008 R2 Security
Windows 2008 R2 Security
 
F5 TMOS v13.0
F5 TMOS v13.0F5 TMOS v13.0
F5 TMOS v13.0
 
Direct access
Direct accessDirect access
Direct access
 
W7 for IT Professionals
W7 for IT ProfessionalsW7 for IT Professionals
W7 for IT Professionals
 
W7 Enterprise
W7 EnterpriseW7 Enterprise
W7 Enterprise
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security Enhancements
 
f5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdff5_synthesis_cisco_connect.pdf
f5_synthesis_cisco_connect.pdf
 
Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?Thinking about SDN and whether it is the right approach for your organization?
Thinking about SDN and whether it is the right approach for your organization?
 
Resume
ResumeResume
Resume
 
SMS
SMSSMS
SMS
 
SMS
SMSSMS
SMS
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012
 
Layer 7: Fine Grained Authorization for Web Services
Layer 7: Fine Grained Authorization for Web ServicesLayer 7: Fine Grained Authorization for Web Services
Layer 7: Fine Grained Authorization for Web Services
 
Governance 2.0: A New Look at SOA Governance in The Age of Cloud and Mobile
Governance 2.0: A New Look at SOA Governance in The Age of Cloud and MobileGovernance 2.0: A New Look at SOA Governance in The Age of Cloud and Mobile
Governance 2.0: A New Look at SOA Governance in The Age of Cloud and Mobile
 
System Center 2012 - January Licensing Update
System Center 2012 - January Licensing UpdateSystem Center 2012 - January Licensing Update
System Center 2012 - January Licensing Update
 

More from Eduardo Castro

Introducción a polybase en SQL Server
Introducción a polybase en SQL ServerIntroducción a polybase en SQL Server
Introducción a polybase en SQL ServerEduardo Castro
 
Creando tu primer ambiente de AI en Azure ML y SQL Server
Creando tu primer ambiente de AI en Azure ML y SQL ServerCreando tu primer ambiente de AI en Azure ML y SQL Server
Creando tu primer ambiente de AI en Azure ML y SQL ServerEduardo Castro
 
Seguridad en SQL Azure
Seguridad en SQL AzureSeguridad en SQL Azure
Seguridad en SQL AzureEduardo Castro
 
Azure Synapse Analytics MLflow
Azure Synapse Analytics MLflowAzure Synapse Analytics MLflow
Azure Synapse Analytics MLflowEduardo Castro
 
SQL Server 2019 con Windows Server 2022
SQL Server 2019 con Windows Server 2022SQL Server 2019 con Windows Server 2022
SQL Server 2019 con Windows Server 2022Eduardo Castro
 
Novedades en SQL Server 2022
Novedades en SQL Server 2022Novedades en SQL Server 2022
Novedades en SQL Server 2022Eduardo Castro
 
Introduccion a SQL Server 2022
Introduccion a SQL Server 2022Introduccion a SQL Server 2022
Introduccion a SQL Server 2022Eduardo Castro
 
Machine Learning con Azure Managed Instance
Machine Learning con Azure Managed InstanceMachine Learning con Azure Managed Instance
Machine Learning con Azure Managed InstanceEduardo Castro
 
Novedades en sql server 2022
Novedades en sql server 2022Novedades en sql server 2022
Novedades en sql server 2022Eduardo Castro
 
Sql server 2019 con windows server 2022
Sql server 2019 con windows server 2022Sql server 2019 con windows server 2022
Sql server 2019 con windows server 2022Eduardo Castro
 
Introduccion a databricks
Introduccion a databricksIntroduccion a databricks
Introduccion a databricksEduardo Castro
 
Pronosticos con sql server
Pronosticos con sql serverPronosticos con sql server
Pronosticos con sql serverEduardo Castro
 
Data warehouse con azure synapse analytics
Data warehouse con azure synapse analyticsData warehouse con azure synapse analytics
Data warehouse con azure synapse analyticsEduardo Castro
 
Que hay de nuevo en el Azure Data Lake Storage Gen2
Que hay de nuevo en el Azure Data Lake Storage Gen2Que hay de nuevo en el Azure Data Lake Storage Gen2
Que hay de nuevo en el Azure Data Lake Storage Gen2Eduardo Castro
 
Introduccion a Azure Synapse Analytics
Introduccion a Azure Synapse AnalyticsIntroduccion a Azure Synapse Analytics
Introduccion a Azure Synapse AnalyticsEduardo Castro
 
Seguridad de SQL Database en Azure
Seguridad de SQL Database en AzureSeguridad de SQL Database en Azure
Seguridad de SQL Database en AzureEduardo Castro
 
Python dentro de SQL Server
Python dentro de SQL ServerPython dentro de SQL Server
Python dentro de SQL ServerEduardo Castro
 
Servicios Cognitivos de de Microsoft
Servicios Cognitivos de de Microsoft Servicios Cognitivos de de Microsoft
Servicios Cognitivos de de Microsoft Eduardo Castro
 
Script de paso a paso de configuración de Secure Enclaves
Script de paso a paso de configuración de Secure EnclavesScript de paso a paso de configuración de Secure Enclaves
Script de paso a paso de configuración de Secure EnclavesEduardo Castro
 
Introducción a conceptos de SQL Server Secure Enclaves
Introducción a conceptos de SQL Server Secure EnclavesIntroducción a conceptos de SQL Server Secure Enclaves
Introducción a conceptos de SQL Server Secure EnclavesEduardo Castro
 

More from Eduardo Castro (20)

Introducción a polybase en SQL Server
Introducción a polybase en SQL ServerIntroducción a polybase en SQL Server
Introducción a polybase en SQL Server
 
Creando tu primer ambiente de AI en Azure ML y SQL Server
Creando tu primer ambiente de AI en Azure ML y SQL ServerCreando tu primer ambiente de AI en Azure ML y SQL Server
Creando tu primer ambiente de AI en Azure ML y SQL Server
 
Seguridad en SQL Azure
Seguridad en SQL AzureSeguridad en SQL Azure
Seguridad en SQL Azure
 
Azure Synapse Analytics MLflow
Azure Synapse Analytics MLflowAzure Synapse Analytics MLflow
Azure Synapse Analytics MLflow
 
SQL Server 2019 con Windows Server 2022
SQL Server 2019 con Windows Server 2022SQL Server 2019 con Windows Server 2022
SQL Server 2019 con Windows Server 2022
 
Novedades en SQL Server 2022
Novedades en SQL Server 2022Novedades en SQL Server 2022
Novedades en SQL Server 2022
 
Introduccion a SQL Server 2022
Introduccion a SQL Server 2022Introduccion a SQL Server 2022
Introduccion a SQL Server 2022
 
Machine Learning con Azure Managed Instance
Machine Learning con Azure Managed InstanceMachine Learning con Azure Managed Instance
Machine Learning con Azure Managed Instance
 
Novedades en sql server 2022
Novedades en sql server 2022Novedades en sql server 2022
Novedades en sql server 2022
 
Sql server 2019 con windows server 2022
Sql server 2019 con windows server 2022Sql server 2019 con windows server 2022
Sql server 2019 con windows server 2022
 
Introduccion a databricks
Introduccion a databricksIntroduccion a databricks
Introduccion a databricks
 
Pronosticos con sql server
Pronosticos con sql serverPronosticos con sql server
Pronosticos con sql server
 
Data warehouse con azure synapse analytics
Data warehouse con azure synapse analyticsData warehouse con azure synapse analytics
Data warehouse con azure synapse analytics
 
Que hay de nuevo en el Azure Data Lake Storage Gen2
Que hay de nuevo en el Azure Data Lake Storage Gen2Que hay de nuevo en el Azure Data Lake Storage Gen2
Que hay de nuevo en el Azure Data Lake Storage Gen2
 
Introduccion a Azure Synapse Analytics
Introduccion a Azure Synapse AnalyticsIntroduccion a Azure Synapse Analytics
Introduccion a Azure Synapse Analytics
 
Seguridad de SQL Database en Azure
Seguridad de SQL Database en AzureSeguridad de SQL Database en Azure
Seguridad de SQL Database en Azure
 
Python dentro de SQL Server
Python dentro de SQL ServerPython dentro de SQL Server
Python dentro de SQL Server
 
Servicios Cognitivos de de Microsoft
Servicios Cognitivos de de Microsoft Servicios Cognitivos de de Microsoft
Servicios Cognitivos de de Microsoft
 
Script de paso a paso de configuración de Secure Enclaves
Script de paso a paso de configuración de Secure EnclavesScript de paso a paso de configuración de Secure Enclaves
Script de paso a paso de configuración de Secure Enclaves
 
Introducción a conceptos de SQL Server Secure Enclaves
Introducción a conceptos de SQL Server Secure EnclavesIntroducción a conceptos de SQL Server Secure Enclaves
Introducción a conceptos de SQL Server Secure Enclaves
 

Windows Server 2008 Security Overview Short

  • 1.
  • 2. Ing. Eduardo Castro, PhD Comunidad Windows ecastro@mswindowscr.org http://comunidadwindows.org
  • 3. “Windows Server 2008 helps Macquarie operate… our remote offices more securely and be able to used RODC to “We’ll place domain controllers at sites efficiently than we could in the past.” key infrastructure thatwhere physical security has “The public always been a concern and we’ll we Phillip Dundas created through our have much better control over our deployment of Lead, Technical Team Windows Server remote infrastructure.” Windows Server Group, Information Technology 2008 has fundamentally increased confident that the bank is Group “We are the Macquarie Group Limited security more secure, that devices level of information Loic Calvez now that we have at the bank.”Senior Enterprise Infrastructure are secure, accessing our network Architect Lafarge Security Director and that those devices meet our PKO Bank Polski current network policy for access.” Howard Witherby Senior Vice President of Operations National Bank & Trust
  • 4. Security Development Lifecycle Installation Options Read Only Domain Controller (RODC) Network Access Protection (NAP) Others
  • 5. Service DirectAccess BitLocker to Go Foundation Mostly Server R2 Mostly Windows 7 Hardening* AppLocker Multiple Firewall Kernel Patch Enhanced Profiles Protection* Storage Access Streamlined UAC Data Execution DNSSEC Biometric Prevention* Framework Enhanced BitLocker* Auditing* HTTP PKI Enroll Suite-B for EFS, PIV Smartcards Kerberos, TLS v1.2 and more
  • 6. Methods of Security and Policy Enforcement Network Location Awareness Network Access Protection Windows Firewall with Advanced Security Internet Protocol Security Windows Server Hardening Server and Domain Isolation Active Directory Domain Services Auditing Read-Only Domain Controller BitLocker Drive Encryption Removable Device Installation Control Enterprise PKI
  • 7.
  • 8. Create inbound and outbound rules Create a firewall rule limiting a service
  • 9. Integrated with WFAS IPSec improvements Simplified IPSec policy configuration Client-to-DC IPSec protection Improved load balancing and clustering server support Improved IPSec authentication Integration with NAP Multiple authentication methods New cryptographic support Integrated IPv4 and IPv6 support Extended events and performance monitor counters Network diagnostics framework support
  • 11. New Functionality RODC AD database Unidirectional replication Credential caching Password replication policy Administrator role separation Read-Only DNS Requirements/special considerations
  • 12. A read-only Active Directory Domain Services database Unidirectional replication mitigating misinformation even if a change is made on a RODC Caching of only specific attributes based Credential caching for only specific users Separation of administrator capabilities Read-only DNS Pre-create RODC account allowing local installation without the need for admin credentials
  • 13. Data protection Drive encryption Integrity checking BDE hardware and software requirements
  • 14. Easier management through PKIView Certificate Web enrollment Network device enrollment service Managing certificate with group policy Certificate deployment changes Online certificate status protocol support Cryptographic next generation
  • 15. Enforce Security Policy Improve Domain Security Improve System Security Improve Network Communications Security
  • 16.
  • 17. Network Access Protection Network Access Quarantine Control Internal, VPN, and Remote Access Only VPN and Remote Access Client Clients IPSec, 802.1X, DHCP, and VPN DHCP and VPN NAP NPS and Client included in Installed from Windows Server Windows Server 2008; NAP client 2003 Resource Kit included in Windows Vista
  • 18. Automatic remediation Health policy validation Health policy compliance Limited access
  • 19. How it works Policy Servers e.g. Patch, Antivirus 3 1 2 Not policy- compliant 4 Fix Up Servers e.g. Patch Restricted Windows Microsoft Network Client NPS DHCP, VPN, Policy- Switch/Router compliant Client requests access to network and presents current 1 health state 5 Corporate Network DHCP, VPN, or Switch/Router relays health status to 2 Microsoft Network Policy Server (NPS) via Remote Authentication Dial-In User Service (RADIUS) Network Policy Server (NPS) validates against IT-defined 3 health policy If not policy-compliant, client is put in a restricted VLAN 4 and given access to fix up resources to download patches, configurations, signatures (Repeat 1 - 4) 5 If policy-compliant, client is granted full access to corporate network
  • 21. Create a NAP policy Use the MMC to create NAP configuration settings Create a new RADIUS client Create a new system health validator for Windows Vista and Windows XP SP2
  • 22. Logical Networks IPSec Enforcement IEEE 802.1X Remote Access VPNs DHCP
  • 23.
  • 24. Checking the health and status of roaming laptops Ensuring the health of corporate desktops Determining the health of visiting laptops Verify the compliance of home computers
  • 25. Carefully test and plan all security policies Implement Network Access Protection Use Windows Firewall and Advanced Security to implement IPSec Deploy Read-Only Domain Controllers, where appropriate Implement BitLocker Drive Encryption Take advantage of PKI improvements
  • 26. Group Policy Changes How Group Policy works now... Windows Group Policy Service Process Group Policy Templates Vista/Windows Server 2008 GP now runs in a Part of Winlogon ADM Templates ADM templates ADM shared service ADM ADM Templates now in difficult to manage ADM ADM Hardened Service, more ADMX reliable Local GPOs (ADMX, ADMX files ADM ADML) Multiple flexibility with a single local Limited Local Settings Group Policy Settings GPOs GPOLGPO’s Over 800 policy settings in ~1,800 new policy changes LGPO Local Computer Local Computer Policy with Windows Vista LGPO Policy XP Admin Admin/Non-Admin Group Policy Extended GP for new Windows Vista features coverage Incomplete User User Specified Group Policy Network Location missing key means Awareness scenarios of Limited awareness (NLA) Templates and Group Policy Central NLA service provides the latest changing network Replication Store network information ADMX conditions query or register with Applications can Centralized repository ADML Journal Wrap NLA for network change indications for ADMX anyone? Bloated SysVol DC Created in the Sysvol Troubleshootin Group Policy Logging SYSVOL? l Policie DC SysVo + gAdministrative log on DC s + GUID Applications and Services log in each domain ADM + Userenv log + Policy XML based event logs New Replicator with Definitions ADMX, ADML Files GP Result New Tools - GPOLogView FRS/DFS-R DFS-R
  • 27. What is new? GP PowerShell features Adding to GP scripts extensions PowerShell cmdlets to perform GP operations Starter GPOs in-box in Windows 7 Best practices that map to the security guide ADMX enhancements GP Preferences enhancements GP Preferences, new in Windows Server 2008 New items added to support new OS functionality
  • 28. Import-module GroupPolicy get-help *-gp* New Get Set •New-GPLink •Get-GPInheritance •Set-GPInheritance •New-GPO •Get-GPO •Set-GPLink •New-GPStarterGPO •Get-GPOReport •Set-GPPermissions •Get-GPPermissions •Set-GPPrefRegistryValue •Get-GPPrefRegistryValue •Set-GPRegistryValue •Get-GPRegistryValue •Get-GPResultantSetofPolicy •Get-GPStarterGPO Remove Misc • Remove-GPLink • Backup-GPO • Remove-GPO • Copy-GPO • Remove- • Import-GPO GPPrefRegistryValue • Rename-GPO • Remove- • Restore-GPO GPRegistryValue
  • 29. Have heard up to 11,000 GPOs Not best practice GPMC has perf issues loading Management difficulties Troubleshooting difficulties Migration difficulties Recommendation: Consolidate AGPM is tested up to 2000 GPOs
  • 30. New UI: More intuitive, integrated help content, no more tabs Support for: REG_MultiSZ REG_QWORD
  • 31. Starter GPOs & ADMX UI
  • 32. Preference Settings Not true “Policy” More control of desktop – more settings! Not limited to policy-aware applications Ease of administration through rich UI Better targeting New in Windows 7 Support for new Power Plan settings Support for new Schedule task triggers, actions, etc.
  • 33.
  • 34. Group Policies Group Policy Preferences (Native / Managed) • Users can change • Setting are enforced, settings user cannot change • Multiple items per settings GPO • Settings revert back to • Can write registry original setting settings to more than • Highest precedence HKCU, HKLM hives • Work only on specific • Granular Targeting of registry location individual items
  • 35. Drive Mappings Regional Settings Printer Mappings Shortcuts Start Menu Internet Explorer Settings
  • 36. Local Users and Groups Services Network Shares Environment Variables
  • 37. Familiar Experience Clearer to understand and find Easy to manage Better control of individual settings – Red/Green Powerful browsers Avoids typing errors Configure settings quicker
  • 38. 29 different targeting options Boolean AND, OR, IS, IS NOT Wildcard support “WSBNE*” Target on the item, not just the GPO
  • 39. Robust targeting 29 types Item level targeting, Boolean logic (And, Or, Not) not GPO level Collections Intuitive UI No need to learn query languages
  • 40. Apply once and do not reapply Remove when no longer applicable Create – Replace - Update - Delete More than just Enable vs Disable
  • 41. Active Directory: Windows 2000 Console - Group Policy Manager Console - Snap- in Part of the Remote Server Admin Tool (link and end) One Windows 7 client or Windows Server 2008 R2 Terminal Server Client - Client Side Extensions (CSE’s)
  • 42. 3000 Total ADMX settings 300 new ADMX settings IE more than 90 new Bitlocker Taskbar Power Terminal Services rebranded “Remote Desktop Services” Settings Spreadsheet
  • 43. 12 settings added under Security Options Restrict NTLM (multiple) Kerberos encryption types Local System null session fallback Only supported on Windows 7 & Windows Server 2008 R2 Settings Spreadsheet
  • 44. Wireless Network (IEEE 802.11) Policies Public Key Policies Certificate Services Client - Certificate Enrollment Policy BitLocker Drive Encryption Network Access Protection Enforcement Clients: Removed RAQ EC and TS Gateway Enforcement Clients: Added RD Gateway QEC Application Control Policies – AppLocker More info Advanced Audit Policy Configuration More info Name Resolution Policy
  • 45. Storage Storage Compliance Security and growth cost Information leakage Increasing data management needs / many data management products Security HSM Archive Backup Encryptio n Replicatio Expiration n
  • 46. Business IT Need per project share Make sure business secret files do not leak out Backup files with personal information to encrypted store Expire low business impact files created three years ago and not touched for a year
  • 47.
  • 48. Step 1: Classify data Step 2: Apply policy according to classification
  • 49. Information Personal Secrecy Business IT Need per project share Make sure business secret files do not leak out Backup files with personal information to encrypted store Expire low business impact files created three years ago and not touched for a year
  • 50. IT Scripts Automatic classification Location Step 1: Manual Content Classify data Line Of Business application Owner Other Expiration Search Step 2: Reports Backup Apply policy based on Custom commands Archive classification Security Leakage prevention
  • 51. Extensible infrastructure-Partner ecosystem Inbox end to end scenarios Integration with SharePoint Get classification properties Set classification properties API for external applications API for external applications Extract Store Apply Policy Discover classification Classify data classification based on Data properties properties classification Windows Server 2008 R2 File Classification Extensibility points
  • 52. When using IPSec – employ ESP with encryption Carefully test and verify all IPSec Policies Consider using Domain isolation Use quality of service to improve bandwidth Plan to prioritize traffic on the network Apply network access protection to secure client computers
  • 53. IPSec Server Domain Isolation Full Volume Bitlocker on Servers New elliptic curve encryption strength Network Level Authentication for RDP Service Profiling New Levels of System Auditing … and many more
  • 54. © 2008 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.