SlideShare a Scribd company logo
Module 8
Increasing Security for
Windows Servers
Module Overview
• Windows Security Overview
• Configuring Windows Firewall with Advanced Security
• Deploying Updates with Windows Server Update Services
Lesson 1: Windows Security Overview
• Discussion: Identifying Security Risks and Costs
• Applying Defense-In-Depth to Increase Security
• Best Practices for Increasing Security
Discussion: Identifying Security Risks and Costs
What are some of the risks and
associated costs to Windows-
based networks?
5 min
Applying Defense-In-Depth to Increase Security
Defense-in-depth provides multiple layers of defense to
protect a networking environment
Security documents, user
education
Policies, Procedures, & Awareness
Physical Security
OS hardening,
authentication
Firewalls
Guards, locks
Network segments,
IPsec
Application hardening,
antivirus
ACLs, encryption, EFS
Perimeter
Internal Network
Host
Application
Data
Best Practices for Increasing Security
Some best practices for increasing security are:
Windows Server 2008
Apply all available security updates quickly
Follow the principle of least privilege
Restrict console login
Restrict physical access
Lesson 2: Configuring Windows Firewall with
Advanced Security
• What Is Windows Firewall with Advanced Security?
• Discussion: Why Is a Host-Based Firewall Important?
• Firewall Profiles
• Demonstration: How to Configure Firewall Profiles
• Deploying Windows Firewall Rules
What Is Windows Firewall with Advanced Firewall?
Inbound rules
Outbound rules
Connection security rules
Windows Firewall with Advanced Security is a host-based
firewall the protects individual servers
Control inbound communication initiated from the network
All inbound requests are blocked by default
Control outbound communication initiated by the host
All outbound requests are allowed by default
Configure IPsec for encryption and authentication
Discussion: Why Is a Host-Based Firewall Important?
Why is it important to use a host-
based firewall like Windows
Firewall with Advanced Security?
5 min
Firewall Profiles
The firewall profiles are:
Domain
Public
Private
Firewall profiles are a set of configuration settings that apply to
a particular network type
Windows Server 2008 R2 introduces the ability to have multiple
active firewall profiles
Demonstration: How to Configure Firewall Profiles
In this demonstration you will see how to configure
firewall profiles
Deploying Windows Firewall Rules
You can deploy Windows Firewall rules:
• Manually
• By exporting and importing firewall rules
• By using Group Policy
Lesson 3: Deploying Updates with Windows
Server Update Services
• What Is Windows Server Update Services?
• Windows Server Update Process
• Server Requirements for WSUS
• Configuring Automatic Updates
• WSUS Administration
• What Are Computer Groups?
• Approving Updates
What Is Windows Server Update Services?
Automatic
Updates
Server running
Windows Server
Update Services
Automatic
Updates
LAN
Internet
Test Clients
Windows Server Update Services Process
Update
Management
Phase 1: Assess
• Set up a production environment that will support update
management for both routine and emergency scenarios
Phase 3: Evaluate and Plan
• Test updates in an environment that resembles, but is
separate from, the production environment
• Determine the tasks necessary to deploy updates into
production, plan the update releases, build the releases,
and then conduct acceptance testing of the releases
Phase 4: Deploy
•Approve and schedule
update installations
•Review the process
after the deployment is
complete
Phase 4: Deploy
• Approve and
schedule update
installations
• Review the process
after the deployment
is complete
Phase 2: Identify
• Discover new updates
in a convenient
manner
• Determine whether
updates are relevant
to the production
environment
Identify
Evaluate
and Plan
Deploy
Assess
Server Requirements for WSUS
Software requirements:
Hardware requirements are similar to the Windows
operating system
IIS 6.0 or later
Microsoft .NET Framework 2.0 or later
Microsoft Management Console 3.0
Microsoft Report Viewer Redistributable 2008
SQL Server 2008, SQL Server 2005 SP2, or
Windows Internal Database
Configuring Automatic Updates
WSUS Server Client Server
Client computers must be configured to use the WSUS
server as a source for updates
Group Policy is used to configure the client servers
Other Group Policy settings related to Auto:
Update frequency
Update installation schedule
Whether automatic restarts are allowed
Default computer group in WSUS
WSUS Administration
What Are Computer Groups?
Computer groups are a way to organize WSUS clients
Create custom computer groups to control update
application
Default computer groups:
All Computers
Unassigned Computers
Approving Updates
Updates can be approved automatically but it is not
recommended
Updates should be tested before they are approved
for production
Updates can be declined if they are not required
Updates can be removed if they cause problems
Lab: Increasing Security for Windows Servers
• Exercise 1: Deploying a Windows Firewall Rule
• Exercise 2: Implementing WSUS
Logon information
Virtual machine
NYC-DC1,
NYC-SVR1
User name Administrator
Password Pa$$w0rd
Estimated time: 45 minutes
Lab Scenario
• Your organization has implemented new software for
monitoring client computers and servers. This software
is already installed on the computers, but your central
monitoring console is unable to initiate communication with
the software. The installation routine for the software did
not open the necessary port in Windows Firewall.
• You need to deploy a Windows Firewall rule that allows all
computers in the organization to respond to communication
attempts from the centralized monitoring console that runs
on port 10005. Documentation from the product vendor
indicates that you can test this port by using a Web browser
to view an XML file.
• In the past management of updates for clients and servers
in your organization has been ad hoc. Some servers have
not had updates applied while other are applying updates
immediately. This has resulted in an insecure environment.
You are implementing WSUS to begin implementing a
controlled process for applying updates to clients and
servers.
Lab Review
• Why was it appropriate to deploy the firewall rule by using
Group Policy?
• Is the use of wuauclt.exe typically required when
implementing WSUS?
Module Review and Takeaways
• Review Questions
• Tools

More Related Content

What's hot

OSSIM User Training: Get Improved Security Visibility with OSSIM
OSSIM User Training: Get Improved Security Visibility with OSSIMOSSIM User Training: Get Improved Security Visibility with OSSIM
OSSIM User Training: Get Improved Security Visibility with OSSIM
AlienVault
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide
Lauren Bell
 
Unified device management_the_royal_albert_hall_v4_public
Unified device management_the_royal_albert_hall_v4_publicUnified device management_the_royal_albert_hall_v4_public
Unified device management_the_royal_albert_hall_v4_public
Herman Arnedo
 
N central 9 5 service pack 1
N central 9 5 service pack 1N central 9 5 service pack 1
N central 9 5 service pack 1
Solarwinds N-able
 
Kerio Control 7 Overview
Kerio Control 7 OverviewKerio Control 7 Overview
Kerio Control 7 Overviewrkoscak
 
V mware thin app 4.5 what_s new presentation
V mware thin app 4.5 what_s new presentationV mware thin app 4.5 what_s new presentation
V mware thin app 4.5 what_s new presentation
solarisyourep
 
Manual Sophos
Manual SophosManual Sophos
Manual Sophos
Olavo Dalcorso
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint ProtectionMindRiver Group
 
Server Hardening Primer - Eric Vanderburg - JURINNOV
Server Hardening Primer - Eric Vanderburg - JURINNOVServer Hardening Primer - Eric Vanderburg - JURINNOV
Server Hardening Primer - Eric Vanderburg - JURINNOV
Eric Vanderburg
 
Software Deployment by DeskCenter USA
Software Deployment by DeskCenter USASoftware Deployment by DeskCenter USA
Software Deployment by DeskCenter USADeskCenter USA Inc.
 
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery. NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
ManageEngine, Zoho Corporation
 
Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)
ManageEngine, Zoho Corporation
 
VMworld 2013: vSphere Upgrade Series Part 2: vSphere Hosts and Virtual Machines
VMworld 2013: vSphere Upgrade Series Part 2: vSphere Hosts and Virtual Machines VMworld 2013: vSphere Upgrade Series Part 2: vSphere Hosts and Virtual Machines
VMworld 2013: vSphere Upgrade Series Part 2: vSphere Hosts and Virtual Machines
VMworld
 
Os Deployment With Configuration Manager 2007
Os Deployment With Configuration Manager 2007Os Deployment With Configuration Manager 2007
Os Deployment With Configuration Manager 2007Amit Gatenyo
 
Mastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installationMastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installation
networkershome
 
Introduction to Trusted Virtual Client
Introduction to Trusted Virtual ClientIntroduction to Trusted Virtual Client
Introduction to Trusted Virtual Client
gustavoeliano
 
SpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu JaegerSpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu Jaeger
Spiceworks
 

What's hot (20)

OSSIM User Training: Get Improved Security Visibility with OSSIM
OSSIM User Training: Get Improved Security Visibility with OSSIMOSSIM User Training: Get Improved Security Visibility with OSSIM
OSSIM User Training: Get Improved Security Visibility with OSSIM
 
Lession 7
Lession 7Lession 7
Lession 7
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide
 
Unified device management_the_royal_albert_hall_v4_public
Unified device management_the_royal_albert_hall_v4_publicUnified device management_the_royal_albert_hall_v4_public
Unified device management_the_royal_albert_hall_v4_public
 
N central 9 5 service pack 1
N central 9 5 service pack 1N central 9 5 service pack 1
N central 9 5 service pack 1
 
Lession 9
Lession 9Lession 9
Lession 9
 
Kerio Control 7 Overview
Kerio Control 7 OverviewKerio Control 7 Overview
Kerio Control 7 Overview
 
V mware thin app 4.5 what_s new presentation
V mware thin app 4.5 what_s new presentationV mware thin app 4.5 what_s new presentation
V mware thin app 4.5 what_s new presentation
 
Manual Sophos
Manual SophosManual Sophos
Manual Sophos
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint Protection
 
Server Hardening Primer - Eric Vanderburg - JURINNOV
Server Hardening Primer - Eric Vanderburg - JURINNOVServer Hardening Primer - Eric Vanderburg - JURINNOV
Server Hardening Primer - Eric Vanderburg - JURINNOV
 
Software Deployment by DeskCenter USA
Software Deployment by DeskCenter USASoftware Deployment by DeskCenter USA
Software Deployment by DeskCenter USA
 
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery. NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
NCM Training - Part 1- Season 2 - Configuration backup & disaster recovery.
 
Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)Copy of learn_the_art_of_firewall_security(1)
Copy of learn_the_art_of_firewall_security(1)
 
VMworld 2013: vSphere Upgrade Series Part 2: vSphere Hosts and Virtual Machines
VMworld 2013: vSphere Upgrade Series Part 2: vSphere Hosts and Virtual Machines VMworld 2013: vSphere Upgrade Series Part 2: vSphere Hosts and Virtual Machines
VMworld 2013: vSphere Upgrade Series Part 2: vSphere Hosts and Virtual Machines
 
Os Deployment With Configuration Manager 2007
Os Deployment With Configuration Manager 2007Os Deployment With Configuration Manager 2007
Os Deployment With Configuration Manager 2007
 
Mastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installationMastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installation
 
week14
week14week14
week14
 
Introduction to Trusted Virtual Client
Introduction to Trusted Virtual ClientIntroduction to Trusted Virtual Client
Introduction to Trusted Virtual Client
 
SpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu JaegerSpiceWorld London 2012 Presentation Matthieu Jaeger
SpiceWorld London 2012 Presentation Matthieu Jaeger
 

Viewers also liked

6421 b Module-07
6421 b Module-076421 b Module-07
6421 b Module-07
Bibekananada Jena
 
6421 b Module-14
6421 b Module-146421 b Module-14
6421 b Module-14
Bibekananada Jena
 
Email of Doom: New phishing attacks that threaten your clients
Email of Doom: New phishing attacks that threaten your clientsEmail of Doom: New phishing attacks that threaten your clients
Email of Doom: New phishing attacks that threaten your clients
Calyptix Security
 
6421 b Module-10
6421 b  Module-106421 b  Module-10
6421 b Module-10
Bibekananada Jena
 
Wireless Intrusion Techniques
Wireless Intrusion TechniquesWireless Intrusion Techniques
Wireless Intrusion Techniques
Cadis1
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
Avishek Datta
 
Work Flow Processes
Work Flow ProcessesWork Flow Processes
Work Flow Processes
Automation Edge
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacks
Cyren, Inc
 
Password Attack
Password AttackPassword Attack
Password Attack
Aliaqa Hosainy
 
Computer security
Computer securityComputer security
Computer security
Univ of Salamanca
 
6421 b Module-02
6421 b Module-026421 b Module-02
6421 b Module-02
Bibekananada Jena
 
6421 b Module-12
6421 b Module-126421 b Module-12
6421 b Module-12
Bibekananada Jena
 
Course 6421B introduction
Course 6421B introduction Course 6421B introduction
Course 6421B introduction
Bibekananada Jena
 
6421 b Module-11
6421 b Module-116421 b Module-11
6421 b Module-11
Bibekananada Jena
 
6421 b Module-13
6421 b Module-136421 b Module-13
6421 b Module-13
Bibekananada Jena
 
Prevent Malicious Hacking Attacks on your APIs
Prevent Malicious Hacking Attacks on your APIsPrevent Malicious Hacking Attacks on your APIs
Prevent Malicious Hacking Attacks on your APIs
SmartBear
 
Password Attack
Password Attack Password Attack
Password Attack
Sina Manavi
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hackingleminhvuong
 

Viewers also liked (20)

6421 b Module-07
6421 b Module-076421 b Module-07
6421 b Module-07
 
6421 b Module-14
6421 b Module-146421 b Module-14
6421 b Module-14
 
Email of Doom: New phishing attacks that threaten your clients
Email of Doom: New phishing attacks that threaten your clientsEmail of Doom: New phishing attacks that threaten your clients
Email of Doom: New phishing attacks that threaten your clients
 
6421 b Module-10
6421 b  Module-106421 b  Module-10
6421 b Module-10
 
Wireless Intrusion Techniques
Wireless Intrusion TechniquesWireless Intrusion Techniques
Wireless Intrusion Techniques
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
Work Flow Processes
Work Flow ProcessesWork Flow Processes
Work Flow Processes
 
phishing
phishingphishing
phishing
 
Webinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacksWebinar: 10 steps you can take to protect your business from phishing attacks
Webinar: 10 steps you can take to protect your business from phishing attacks
 
Password Attack
Password AttackPassword Attack
Password Attack
 
Computer security
Computer securityComputer security
Computer security
 
6421 b Module-02
6421 b Module-026421 b Module-02
6421 b Module-02
 
6421 b Module-12
6421 b Module-126421 b Module-12
6421 b Module-12
 
Course 6421B introduction
Course 6421B introduction Course 6421B introduction
Course 6421B introduction
 
6421 b Module-11
6421 b Module-116421 b Module-11
6421 b Module-11
 
6421 b Module-13
6421 b Module-136421 b Module-13
6421 b Module-13
 
Prevent Malicious Hacking Attacks on your APIs
Prevent Malicious Hacking Attacks on your APIsPrevent Malicious Hacking Attacks on your APIs
Prevent Malicious Hacking Attacks on your APIs
 
Secret Codes
Secret CodesSecret Codes
Secret Codes
 
Password Attack
Password Attack Password Attack
Password Attack
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
 

Similar to 6421 b Module-08

Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12
gameaxt
 
Windows 2012 R2 Multi Server Management
Windows 2012 R2 Multi Server ManagementWindows 2012 R2 Multi Server Management
Windows 2012 R2 Multi Server Management
Sharkrit JOBBO
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld
 
Open Audit
Open AuditOpen Audit
Open Audit
ncspa
 
System center 2012 configurations manager
System center 2012 configurations managerSystem center 2012 configurations manager
System center 2012 configurations manager
Belarmino Tomicha
 
SCCM 2019 Demo.pptx
SCCM 2019 Demo.pptxSCCM 2019 Demo.pptx
SCCM 2019 Demo.pptx
apoorvkatiyar5
 
VMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for HorizonVMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for Horizon
VMworld
 
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
VMworld
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Lumension
 
MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12
Computer Networking
 
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
 New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
AlienVault
 
Chapter08
Chapter08Chapter08
Chapter08
Muhammad Ahad
 
W982 05092004
W982 05092004W982 05092004
W982 05092004
Sumit Tambe
 
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITY
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITYCYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITY
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITY
ViscolKanady
 
6421 b Module-09
6421 b Module-096421 b Module-09
6421 b Module-09
Bibekananada Jena
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld
 
NEW LAUNCH! Amazon EC2 Systems Manager for Hybrid Cloud Management at Scale
NEW LAUNCH! Amazon EC2 Systems Manager for Hybrid Cloud Management at ScaleNEW LAUNCH! Amazon EC2 Systems Manager for Hybrid Cloud Management at Scale
NEW LAUNCH! Amazon EC2 Systems Manager for Hybrid Cloud Management at Scale
Amazon Web Services
 
Deploying Windows Vista Service Pack 1
Deploying Windows Vista Service Pack 1Deploying Windows Vista Service Pack 1
Deploying Windows Vista Service Pack 1
Microsoft TechNet
 
A plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s DeploymentA plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s Deployment
Bangladesh Network Operators Group
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s Missing
Black Duck by Synopsys
 

Similar to 6421 b Module-08 (20)

Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12
 
Windows 2012 R2 Multi Server Management
Windows 2012 R2 Multi Server ManagementWindows 2012 R2 Multi Server Management
Windows 2012 R2 Multi Server Management
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
 
Open Audit
Open AuditOpen Audit
Open Audit
 
System center 2012 configurations manager
System center 2012 configurations managerSystem center 2012 configurations manager
System center 2012 configurations manager
 
SCCM 2019 Demo.pptx
SCCM 2019 Demo.pptxSCCM 2019 Demo.pptx
SCCM 2019 Demo.pptx
 
VMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for HorizonVMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for Horizon
 
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
 
MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12MCSA 70-412 Chapter 12
MCSA 70-412 Chapter 12
 
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
 New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
 
Chapter08
Chapter08Chapter08
Chapter08
 
W982 05092004
W982 05092004W982 05092004
W982 05092004
 
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITY
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITYCYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITY
CYBERSECURITY PROCESSES & TECHNOLOGIES LAB #2: MANAGING HOST BASED SECURITY
 
6421 b Module-09
6421 b Module-096421 b Module-09
6421 b Module-09
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
 
NEW LAUNCH! Amazon EC2 Systems Manager for Hybrid Cloud Management at Scale
NEW LAUNCH! Amazon EC2 Systems Manager for Hybrid Cloud Management at ScaleNEW LAUNCH! Amazon EC2 Systems Manager for Hybrid Cloud Management at Scale
NEW LAUNCH! Amazon EC2 Systems Manager for Hybrid Cloud Management at Scale
 
Deploying Windows Vista Service Pack 1
Deploying Windows Vista Service Pack 1Deploying Windows Vista Service Pack 1
Deploying Windows Vista Service Pack 1
 
A plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s DeploymentA plenarily integrated SIEM solution and it’s Deployment
A plenarily integrated SIEM solution and it’s Deployment
 
PCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s MissingPCI and Vulnerability Assessments - What’s Missing
PCI and Vulnerability Assessments - What’s Missing
 

Recently uploaded

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 

Recently uploaded (20)

Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 

6421 b Module-08

  • 1. Module 8 Increasing Security for Windows Servers
  • 2. Module Overview • Windows Security Overview • Configuring Windows Firewall with Advanced Security • Deploying Updates with Windows Server Update Services
  • 3. Lesson 1: Windows Security Overview • Discussion: Identifying Security Risks and Costs • Applying Defense-In-Depth to Increase Security • Best Practices for Increasing Security
  • 4. Discussion: Identifying Security Risks and Costs What are some of the risks and associated costs to Windows- based networks? 5 min
  • 5. Applying Defense-In-Depth to Increase Security Defense-in-depth provides multiple layers of defense to protect a networking environment Security documents, user education Policies, Procedures, & Awareness Physical Security OS hardening, authentication Firewalls Guards, locks Network segments, IPsec Application hardening, antivirus ACLs, encryption, EFS Perimeter Internal Network Host Application Data
  • 6. Best Practices for Increasing Security Some best practices for increasing security are: Windows Server 2008 Apply all available security updates quickly Follow the principle of least privilege Restrict console login Restrict physical access
  • 7. Lesson 2: Configuring Windows Firewall with Advanced Security • What Is Windows Firewall with Advanced Security? • Discussion: Why Is a Host-Based Firewall Important? • Firewall Profiles • Demonstration: How to Configure Firewall Profiles • Deploying Windows Firewall Rules
  • 8. What Is Windows Firewall with Advanced Firewall? Inbound rules Outbound rules Connection security rules Windows Firewall with Advanced Security is a host-based firewall the protects individual servers Control inbound communication initiated from the network All inbound requests are blocked by default Control outbound communication initiated by the host All outbound requests are allowed by default Configure IPsec for encryption and authentication
  • 9. Discussion: Why Is a Host-Based Firewall Important? Why is it important to use a host- based firewall like Windows Firewall with Advanced Security? 5 min
  • 10. Firewall Profiles The firewall profiles are: Domain Public Private Firewall profiles are a set of configuration settings that apply to a particular network type Windows Server 2008 R2 introduces the ability to have multiple active firewall profiles
  • 11. Demonstration: How to Configure Firewall Profiles In this demonstration you will see how to configure firewall profiles
  • 12. Deploying Windows Firewall Rules You can deploy Windows Firewall rules: • Manually • By exporting and importing firewall rules • By using Group Policy
  • 13. Lesson 3: Deploying Updates with Windows Server Update Services • What Is Windows Server Update Services? • Windows Server Update Process • Server Requirements for WSUS • Configuring Automatic Updates • WSUS Administration • What Are Computer Groups? • Approving Updates
  • 14. What Is Windows Server Update Services? Automatic Updates Server running Windows Server Update Services Automatic Updates LAN Internet Test Clients
  • 15. Windows Server Update Services Process Update Management Phase 1: Assess • Set up a production environment that will support update management for both routine and emergency scenarios Phase 3: Evaluate and Plan • Test updates in an environment that resembles, but is separate from, the production environment • Determine the tasks necessary to deploy updates into production, plan the update releases, build the releases, and then conduct acceptance testing of the releases Phase 4: Deploy •Approve and schedule update installations •Review the process after the deployment is complete Phase 4: Deploy • Approve and schedule update installations • Review the process after the deployment is complete Phase 2: Identify • Discover new updates in a convenient manner • Determine whether updates are relevant to the production environment Identify Evaluate and Plan Deploy Assess
  • 16. Server Requirements for WSUS Software requirements: Hardware requirements are similar to the Windows operating system IIS 6.0 or later Microsoft .NET Framework 2.0 or later Microsoft Management Console 3.0 Microsoft Report Viewer Redistributable 2008 SQL Server 2008, SQL Server 2005 SP2, or Windows Internal Database
  • 17. Configuring Automatic Updates WSUS Server Client Server Client computers must be configured to use the WSUS server as a source for updates Group Policy is used to configure the client servers Other Group Policy settings related to Auto: Update frequency Update installation schedule Whether automatic restarts are allowed Default computer group in WSUS
  • 19. What Are Computer Groups? Computer groups are a way to organize WSUS clients Create custom computer groups to control update application Default computer groups: All Computers Unassigned Computers
  • 20. Approving Updates Updates can be approved automatically but it is not recommended Updates should be tested before they are approved for production Updates can be declined if they are not required Updates can be removed if they cause problems
  • 21. Lab: Increasing Security for Windows Servers • Exercise 1: Deploying a Windows Firewall Rule • Exercise 2: Implementing WSUS Logon information Virtual machine NYC-DC1, NYC-SVR1 User name Administrator Password Pa$$w0rd Estimated time: 45 minutes
  • 22. Lab Scenario • Your organization has implemented new software for monitoring client computers and servers. This software is already installed on the computers, but your central monitoring console is unable to initiate communication with the software. The installation routine for the software did not open the necessary port in Windows Firewall. • You need to deploy a Windows Firewall rule that allows all computers in the organization to respond to communication attempts from the centralized monitoring console that runs on port 10005. Documentation from the product vendor indicates that you can test this port by using a Web browser to view an XML file. • In the past management of updates for clients and servers in your organization has been ad hoc. Some servers have not had updates applied while other are applying updates immediately. This has resulted in an insecure environment. You are implementing WSUS to begin implementing a controlled process for applying updates to clients and servers.
  • 23. Lab Review • Why was it appropriate to deploy the firewall rule by using Group Policy? • Is the use of wuauclt.exe typically required when implementing WSUS?
  • 24. Module Review and Takeaways • Review Questions • Tools