Sander Berkouwer Microsoft MVP Directory Services 2009 - 2015 Microsoft Netherlands Virtual Technical Evangelist Blogger on DirTeam.com ServerCore.Net.

Slides:



Advertisements
Similar presentations
Chapter 20 Oracle Secure Backup.
Advertisements

Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Access Control Chapter 3 Part 3 Pages 209 to 227.
Brian Desmond Moran Technology Consulting
Kerberos Part 1 CNS 4650 Fall 2004 Rev. 2. The Name Greek Mythology Cerberus Gatekeeper of Hates Only allowed in dead Prevented dead from leaving Spelling.
Module 3 Windows Server 2008 Branch Office Scenario.
1 Week #1 Objectives Review clients, servers, and Windows network models Differentiate among the editions of Server 2008 Discuss the new Windows Server.
ACCESS CONTROL MANAGEMENT Project Progress (as of March 3) By: Poonam Gupta Sowmya Sugumaran.
Security and Policy Enforcement Mark Gibson Dave Northey
Michael Kleef Technology Advisor | Microsoft Australia
Introduction to Kerberos Kerberos and Domain Authentication.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 7 Configuring File Services in Windows Server 2008.
Understanding Active Directory
Migrating Applications to Windows Azure Virtual Machines Michael Washam Senior Technical Evangelist Microsoft Corporation.
John Savill Solutions Architect EMC Session Code: WSV403.
Module 1: Installing Active Directory Domain Services
Module 1: Installing Active Directory Domain Services
Clinic Security and Policy Enforcement in Windows Server 2008.
Module 1 Introduction to Managing Microsoft® Windows Server® 2008 Environment.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Chapter 2: Installing and Upgrading to Windows Server 2008 R2 BAI617.
Welcome Thank you for taking our training. Collection 6421: Configure and Troubleshoot Windows Server® 2008 Network Course 6690 – 6709 at
Chapter 4 Windows NT/2000 Overview. NT Concepts  Domains –A group of one or more NT machines that share an authentication database (SAM) –Single sign-on.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Week #7 Objectives: Secure Windows 7 Desktop
Securing AD DS Module A 3: Securing AD DS
Module 7: Fundamentals of Administering Windows Server 2008.
Module 1: Installing and Configuring Servers. Module Overview Installing Windows Server 2008 Managing Server Roles and Features Overview of the Server.
Active Directory Windows2003 Server. Agenda What is Active Directory What is Active Directory Building an Active Directory Building an Active Directory.
Maintaining Active Directory Domain Services
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
From Virtualization Management to Private Cloud with SCVMM 2012 Dan Stolts Sr. IT Pro Evangelist Microsoft Corporation
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
Craig A. Brown Practice Leader – Microsoft Global Knowledge MCT, Since 1996 MCSA/MCSE NT/2000/2003 MCDST MCITP: ES / CS.
ACCESS CONTROL MANAGEMENT Project Progress (as of March 3) By: Poonam Gupta Sowmya Sugumaran.
Module 11: Read-Only Domain Controllers. Overview Describe the Read-Only Domain Controllers role Use Read-Only Domain Controllers.
GPO - WINDOWS SERVER AGENDA: Introduction Group Policy Overview Types of Group Policies/Objects Associated Technologies How to implement.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
Module 15 Managing Windows Server® 2008 Backup and Restore.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Introduction to Active Directory Domain Services
Windows Role-Based Access Control Longhorn Update
Module 1: Implementing Active Directory ® Domain Services.
Page 1 User Accounts Lecture 3 Hassan Shuja 09/21/2004.
System Center Lesson 4: Overview of System Center 2012 Components System Center 2012 Private Cloud Components VMM Overview App Controller Overview.
Hosting Websites and Web Applications with Microsoft ® SQL Server ® 2008.
Installing a Domain Controller
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
BYOD ESSENTIALS FOR IT PROS SANDER BERKOUWER, DirTeam.
EDISCOVERY AND ARCHIVING IN OFFICE 365 Scott Schnoll, Microsoft Corporation.
ASP.NET 2.0 Security Alex Mackman CM Group Ltd
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Internet of Things Windows IoT for small devices CATALIN GHEORGHIU I Computer Solutions.
Kerberos Miha Pihler MVP – Enterprise Security Microsoft Certified Master | Exchange 2010.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
MCSA Windows Server 2012 Pass Upgrading Your Skills to MCSA Windows Server 2012 Exam By The Help Of Exams4Sure Get Complete File From
UFIT Infrastructure Self-Service. Service Offerings And Changes Virtual Machine Hosting Self service portal Virtual Machine Backups Virtual Machine Snapshots.
Supporting Windows 8.1 Krystle Portocarrero | Training Experts Inc.
VceTests VCE Test Dumps
VCE Dumps
SAP R/3 Installation on WIN NT-ORACLE
Designing IIS Security (IIS – Internet Information Service)
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
Presentation transcript:

Sander Berkouwer Microsoft MVP Directory Services Microsoft Netherlands Virtual Technical Evangelist Blogger on DirTeam.com ServerCore.Net About

Current Situation Challenges Challenges when virtualizing DCs on Hyper-V Challenges when virtualizing DCs on Azure IaaS Solutions Picking the right solutions for your challenges Agenda

CURRENT SITUATION

Flexibility Get DCs there fast, move them without downtime Cost saving and cost predictability Virtualization increases hardware usage Hardware maintenance and upgrades are more predictable Less dependencies on hardware Quickly add/remove hardware, no outages Why do we virtualize DCs?

When Active Directory fails… Domain Controllers are centers of universes Domain Controllers are at the centers of many infrastructures (Read-only) Domain Controllers can be distributed everywhere Sensitive Information DCs contain information on replication, accounts, credentials DNS Servers contain caches of queries (info on visited sites) Sensitive Domain Controllers

CHALLENGES

Performance Snapshots Security Integration components Backup and restore Can you trust Hyper-V administrators? Challenges with DCs on Hyper-V

Connectivity Knowledge of Azure taxonomy Knowledge of Azure topology Dynamic IPv4, IPv6 addressing Under the hoof Azure IaaS uses Hyper-V Can you trust the Azure Administrator? Challenges with DCs on Azure

Advanced Persistent Threats Pass the Hash (PtH) attacks Pass the Ticket (PtT) attacks Kerberos Golden Tickets Security Legal organizational requirements Job security Why is this important?

A REALITY CHECK

Typical Kerberos flow 1.During startup, logon the client requests a Ticket Granting Ticket (TGT) from the Key Distribution Center (KDC). The TGT is then processed clientside 2.For accessing a service within the Kerberos Realm, the client requests a Service Ticket (TGS), based on the TGT on any KDC. 3.Client presents the TGS to the service. Based on authorization, access is granted (or not) Kerberos 5 Primer TGT TGS

KRBTGT’s account password signs everything I don’t need to ask for a TGT when I know the password TGTs and TGSs are processed and enforced clientside I don’t need to play by the rules to get access permissions I can just insert the well-known SIDs I want into my TGT Only restriction: maximum TGT lifetime of 10 years. The keys to your kingdom

DEMO KRBTGT

SOLUTIONS

KRBTGT Account Password Reset Scripts KRBTGT account password is used to encrypt TGTs,TGSs KRBTGT account password needs to be reset twice Reset-KrbtgtKeyInteractive v1.4 Reset-KrbtgtKeyInteractive.ps1 Download from the TechNet Gallery Reset KRBTGT

Support for virtualization hosts BitLocker for boot and system volumes BitLocer on Cluster Shared Volumes (CSVs) Support in virtual machines BitLocker not supported on boot and system volumes BitLocker on data disks, but TPM is unavailable BitLocker Drive Encryption

Backups Treat backups like you would virtual Domain Controllers Hardware encryption Offered by all of todays backup hardware, on by default Software encryption Offered by many of todays backup software, off by default Authorizing access based on Active Directory accounts? Encryption of backups

Default ACLs on VHD(X)s Administrators – full control SYSTEM – full control Hyper-V Administrators – full control - Read and write Change ACLs Note: Administrators have Take Ownership Access Control Lists on VHD(X)s

Server Core installations Virtualization hosts without a Graphical User Interface (GUI) Less susceptive to human error Less susceptive to vulnerabilities Installation options 2008 (R2): Choose at installation 2012 (R2): Choose at installation of add/remove after install Server Core Virtualization Hosts

New security group on Hyper-V hosts Introduced with Windows 8, Windows Server 2012 Principle of least administrative privilege Remove Hyper-V Administrators from Administrators Hyper-V Administrators have access to all Hyper-V features Hyper-V Administrators have full control on VHD(X)s Hyper-V Administrators group

Integration Components They’re drivers and services for VMs ICs enlighten Virtual Machines Capabilities OS shutdown, time synchronization, data exchange, heartbeat, backup and guest services Integration Components

Read-only Domain Controllers Read-only Domain Controllers offer: Read-only Active Directory database and DNS RODC filtered attribute set Unidirectional replication Granular credential caching Administrator role separation Read-only Domain Controllers offer individual KRBTGT accounts Read-only Domain Controllers

System Key Protection Additional protection of secrets Protection methods Password startup System Generated password Store Startup Key on Floppy Disk Store Startup Key Locally Syskey

DEMO SYSKEY

Monitoring Auditing Backup Administrator role separation Communication Documentation Processes

Client Side Encryption Available in Hyper-V in latest TPs of Windows 10 Available in Hyper-V in upcoming TP of Windows Server vNext Currently in development for Azure Storage Objects (source)source Azure Key Vault Currently in public Preview for Azure Hardware Security Module (HSM) in the cloud Sneak Preview

DEMO VTPMS

CONCLUDING

Domain Controllers contain sensitive information DCs contain info on replication, accounts, credentials DNS Servers contain caches on queries (visited sites) Virtualizing Domain Controllers Virtualizing DCs safely is not an easy task Virtualizing DCs is not just a technical challenge Do we really want to virtualize Domain Controllers? Concluding

Nagrađujemo vas sa 100 WinCoin bodova što ste posjetili predavanje. Osvojite dodatnih 100 WinCoin bodova ukoliko popunite službeni upitnik. HVALA!

MVA Successful proffessionals never stop learning. Microsoft Virtual Academy offers online Microsoft trainings led by experts to help proffessionals to upgrade their knowledge. Trainings are prepared by leading eyperts from different technology areas. After you take a training, you can test your knowledge. To better understand this session, I advise you to take following trainings: XXX1 XXX2 XXX3 Training name 1 link1 Training name 2 link1 Training name 3 link1