Configuring Encryption and Advanced Auditing

Slides:



Advertisements
Similar presentations
Microsoft ® Official Course First Look Clinic Overview of Windows 8 By Ragowo Riantory, S.Kom, MCP.
Advertisements

Module 5: Creating and Configuring Group Policy
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
14.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
5.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 5: Working with File Systems.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Module 1: Installing Active Directory Domain Services
Chapter 5 Roles and features. objectives Performing management tasks using the Server Manager console Understanding the Windows Server 2008 roles Understanding.
Deploying and Managing Windows Server 2012
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Configuring the MagicInfo Pro Display
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Two Deploying Windows Servers.
Module 13: Configuring Availability of Network Resources and Content.
Implementing Dynamic Host Configuration Protocol
Module 4: Add Client Computers and Devices to the Network.
Implementing File and Print Services
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
Week #7 Objectives: Secure Windows 7 Desktop
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 5 Windows XP Professional McGraw-Hill.
Configuring Encryption and Advanced Auditing
Module 14: Configuring Server Security Compliance
Module 7: Fundamentals of Administering Windows Server 2008.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Module 1: Implementing Active Directory ® Domain Services.
Module 5: Creating and Configuring Group Policies.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
SMS Software Distribution. Overview  Explaining How SMS Distributes Software  Managing Distribution Points  Configuring Software Distribution and the.
Managing Applications, Services, Folders, and Libraries Lesson 4.
Lesson 18: Configuring Security for Mobile Devices MOAC : Configuring Windows 8.1.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the importance of security and encryption. Objective Course Weight 2%
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
1 Remote Installation Service Windows 2003 Server Prof. Abdul Hameed.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
Installing Windows 7 Lesson 2.
SmartCenter for Pointsec - MI
Chapter Objectives In this chapter, you will learn:
Managing User and Service Accounts
Implementing Network Load Balancing
Planning and Configuring Administrative Security and Auditing
Implementing Update Management
Module Overview Installing and Configuring a Network Policy Server
Deploying and Configuring SSIS Packages
10982B 10: Troubleshooting Resource Access for Clients That Are Not Domain Members Module 10 Presentation: 75 minutes Lab: 75 minutes After completing.
Optimizing File Services
Planning a Group Policy Management and Implementation Strategy
File System Management
Introducing NTFS Reliability Security Long file names Efficiency
Preparing for the Windows 8. 1 MCSA Module 6: Securing Windows 8
How to install and manage exchange server 2010 OP Saklani.
Presentation transcript:

Configuring Encryption and Advanced Auditing Presentation: 40 minutes After completing this module, students will be able to: Secure data by using Windows® BitLocker Drive Encryption. Encrypt files by using Encrypting File System (EFS). Configure advanced auditing. Required materials To teach this module, you need the Microsoft® Office PowerPoint® file 20411C_MVA_09.pptx. Important: We recommend that you use Office PowerPoint 2007 or a newer version to display the slides for this course. If you use PowerPoint Viewer or an older version of Office PowerPoint, all the features of the slides might not display correctly. Preparation Tasks To prepare for this module: Read all of the materials for this module. Practice performing the demonstrations. Preparation for demonstrations For this module, you will use the available virtual machine environment. Before you begin the module, you must complete the following steps: On the host computer, click Start, point to Administrative Tools, and then click Hyper‑V Manager. In Hyper‑V Manager, click 20411C‑LON‑DC1, and in the Actions pane, click Start. In the Actions pane, click Connect. Wait until the virtual machine starts. Sign in using the following credentials: User name: Adatum\Administrator Password: Pa$$w0rd Repeat steps 2 through 4 for 20411C-LON-SVR1 and 20411C-LON-CL1. Note: When you are done with demonstrations in this module, revert all virtual machines to their initial checkpoint. Module 10 Configuring Encryption and Advanced Auditing

Configuring Advanced Auditing Module Overview 10: Configuring Encryption and Advanced Auditing Configuring Advanced Auditing Briefly describe the module content.

Encrypting Drives by Using BitLocker

Lesson 1: Encrypting Drives by Using BitLocker 10: Configuring Encryption and Advanced Auditing Recovering Drives Encrypted with BitLocker Briefly describe the lesson content.

BitLocker can be combined with EFS What is BitLocker? 10: Configuring Encryption and Advanced Auditing BitLocker is full drive encryption that has the following characteristics BitLocker can be used to encrypt an entire hard drive or only the used parts of a hard drive BitLocker can be combined with EFS BitLocker protects the integrity of the Windows boot process Some features of BitLocker are only usable when a Trusted Platform Module (TPM) is available on the computer Mention some of the differences between EFS and BitLocker. Briefly mention that Trusted Platform Module (TPM) chips are available on many of the computers sold for the last several years.

Advanced Encryption Standard (AES) How BitLocker Works 10: Configuring Encryption and Advanced Auditing Advanced Encryption Standard (AES) 128-bit encryption key or 256-bit encryption key Automated deployment with PowerShell for computers already in production New operating system deployments can utilize BitLocker before the operating system files are written to the volume Bitlocker encrypts entire hard drive Only used space encrypted (fastest) All of hard drive encrypted (most secure for existing computers) Discuss the benefits of encrypting only used space on a hard disk. Also discuss when encrypting the entire hard drive is the best choice. Discuss which choice would be best when a server has been in production for a long time and you would not want the unused space vulnerable to data recovery. Also mention the pros and cons of 128-bit encryption versus 256-bit encryption. Your discussion should include that 128-bit encryption offers faster performance but less security.

BitLocker Requirements 10: Configuring Encryption and Advanced Auditing BitLocker is supported on Windows Vista and newer Windows client operating systems Windows Server 2008 and newer Windows server operating systems Windows XP supports the ability to read and copy data from a portable hard drive encrypted with BitLocker To Go A TPM offers additional features such as System integrity verification Multifactor authentication Discuss the different options for multifactor authentication and the situations that might call for multifactor authentication, such as compliance, regulations, and high security environments. Mention that virtual machines do not have a virtual TPM available, which means that hard drives encrypted by BitLocker on virtual machines are not as secure as hard drives encrypted by BitLocker on physical computers with TPMs.

Configuring BitLocker 10: Configuring Encryption and Advanced Auditing Enable TPM on the computer (optional) Add the BitLocker Drive Encryption feature on the server Configure Group Policy (or local Group Policy) for BitLocker settings (required if the computer does not have a TPM chip) Turn on BitLocker on the desired volume(s) Mention that TPM is enabled in the BIOS on a computer. Emphasize that Group Policy, which is covered in the next topic, handles most of the configuration of BitLocker. Also, mention that students can manage BitLocker through Windows PowerShell® and the manage-bde command-line utility.

Using Group Policy to Manage BitLocker 10: Configuring Encryption and Advanced Auditing Group Policy offers approximately 40 settings to manage and configure BitLocker. Some common settings are: Choose drive encryption method and cipher strength. Deny write access to fixed data drives/removable drives not protected by BitLocker. Configure use of passwords for fixed data drives/removable data drives. Require additional authentication at startup. Allow network unlock at startup. Discuss the strategy for deploying BitLocker across a large organization and some of the things to consider in such a deployment. Topics you could address with students include how to configure TPM-enabled computers only, how to used higher-security with BitLocker for portable computers, and how to use Group Policy to minimize the administrative overhead of supporting the deployment.

Demonstration: Configuring BitLocker 10: Configuring Encryption and Advanced Auditing In this demonstration, you will see how to configure BitLocker Drive Encryption on a computer running Windows Server 2012 R2. Run Active Directory Users and Computers, find the computer object for LON-SVR1, and then go to the BitLocker Recovery tab. Show students the recovery information on the tab. Mention that this is stored in (Active Directory® Domain Services (AD DS) because of the Group Policy settings that were enabled as part of the demonstration. Preparation Steps To perform this demonstration, you will need the 20411C-LON-DC1 virtual machine and the 20411C-LON- SVR1 virtual machine. Start the virtual machines before the demonstration. Demonstration Steps Edit Group Policy to configure BitLocker: Log in to LON-DC1 as Adatum\Administrator with the password Pa$$w0rd. In Server Manager, click Tools, and then click Group Policy Management. In Group Policy Management, double-click Forest: Adatum.com, double-click Domains, double- click Adatum.com, expand Group Policy Objects, right-click the Default Domain Policy and then click Edit.. In the Group Policy Management Editor, under Computer Configuration, expand Policies, expand Administrative Templates, expand Windows Components, expand BitLocker Drive Encryption, and then click Fixed Data Drives. In the right pane, double-click the Choose how BitLocker-protected fixed drives can be recovered setting. In the Choose how BitLocker-protected fixed drives can be recovered window, click Enabled, ensure that the checkbox next to the Save BitLocker recovery information to AD DS for fixed data drives option is selected, and then click the Do not enable BitLocker until recovery information is stored to AD DS for fixed data drives option. Then click OK. Close the Group Policy Management console and the Group Policy Management Editor. Switch to LON-SVR1. (More notes on the next slide)

Recovering Drives Encrypted with BitLocker 10: Configuring Encryption and Advanced Auditing The best way to ensure recoverability is to plan properly before deploying BitLocker Recovery options include: Using the recovery key file to obtain the key. Obtaining the recovery key from AD DS. Using a DRA. Using the original BitLocker password. Discuss some of the ramifications of moving forward with BitLocker before having security policies in place, configuring Group Policy, and educating users. Possible ramifications include inconsistent recovery options, the inability for the Information Technology (IT) department to recover drives protected by BitLocker quickly and easily, different levels of security settings, and the difficulty of achieving a consistent experience and configuration across the entire computing environment.

Encrypting Files by Using EFS

Lesson 2: Encrypting Files by Using EFS 10: Configuring Encryption and Advanced Auditing Demonstration: Encrypting a File by Using EFS Briefly describe the lesson content.

EFS can encrypt files that are stored on an NTFS–formatted partition What Is EFS? 10: Configuring Encryption and Advanced Auditing EFS can encrypt files that are stored on an NTFS–formatted partition EFS encryption acts as an additional layer of security EFS can be used with no pre-configuration EFS is used more often to protect data on mobile computers than to protect data on file shares. Because users can save EFS-protected files on file shares, students should be aware of the possibility.

Symmetric encryption is used to protect the data How EFS Works 10: Configuring Encryption and Advanced Auditing Symmetric encryption is used to protect the data Public key encryption is used to protect the symmetric key If the concept of encryption is new to your students, spend a few minutes discussing symmetric key versus public-key encryption. Also, be sure to link public key encryption with the concepts of certificates, the public key, and the private key. If users share EFS files, the FEK is encrypted and stored once for each user. Symmetric key FEK header File Encrypted file Public key Encrypted file with FEK in header File Encryption File Decryption Private key

Recovering EFS–Encrypted Files 10: Configuring Encryption and Advanced Auditing To ensure you can recover EFS encrypted files, you should: Back up user certificates Configure a recovery agent You must back up the recovery key to: Secure against system failure Make the recovery key portable Stress to students that if their organizations will use and support EFS, they should obtain certificates from a certification authority (CA) so that they can be distributed and backed up automatically.

Demonstration: Encrypting a File by Using EFS 10: Configuring Encryption and Advanced Auditing In this demonstration, you will see how to: Verify that a computer account supports EFS on a network share Use EFS to encrypt a file on a network share View the certificate used for encryption Test access to an encrypted file Preparation Steps Start the 20411C-LON-DC1 and 20411C-LON-CL1 virtual machines. Log in to 20411C-LON-DC1 as Adatum\Administrator with the password of Pa$$w0rd. Do not log in to 20411C-LON-CL1 until directed to do so. Demonstration Steps Verify that a computer account supports EFS on a network share On LON-DC1, in Server Manager, click Tools, and then click Active Directory Users and Computers. In Active Directory Users and Computers, if necessary, expand Adatum.com, and then click Domain Controllers. Right-click LON-DC1, and then click Properties. In the LON-DC1 Properties dialog box, on the Delegation tab, verify that Trust this computer for delegation to any service (Kerberos only) is selected, and then click Cancel. This setting is on by default for domain controllers, but needs to be enabled for most file servers to support EFS. Close Active Directory Users and Computers. Use EFS to encrypt a file on a network share On LON-CL1, log in as Adatum\Doug with a password of Pa$$w0rd. On the Start screen, type \\LON-DC1\Mod10Share, and then press Enter. In File Explorer, right-click an open area, point to New, and then click Microsoft Word Document. Type MyEncryptedFile, and then press Enter to name the file. Double-click MyEncryptedFile to open it. If necessary, click Close on the Microsoft Office Activation Wizard, click Ask me later on the First things first window about update installations, and then click Accept to close the window. (More notes on the next slide)

Configuring Advanced Auditing

Lesson 3: Configuring Advanced Auditing 10: Configuring Encryption and Advanced Auditing Demonstration: Configuring Advanced Auditing Briefly describe the lesson content.

Advanced Audit Policies 10: Configuring Encryption and Advanced Auditing Windows Server 2012 and Windows Server 2008 R2 provide an additional set of Advanced Audit Policies to configure Explain the Advanced Audit Policy Configuration settings to the students, and describe how they provide greater control over auditing capability in Windows Server 2012 and Windows Server 2008 R2. Consider opening a Group Policy Object (GPO) on LON-DC1 in the Group Policy Management Editor to show students the specific settings available in each group. These settings are under: Computer Configuration\Policies\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies.

Demonstration: Configuring Advanced Auditing 10: Configuring Encryption and Advanced Auditing In this demonstration, you will see how to create and edit a Group Policy Object for Audit Policy configuration Preparation Steps To perform this demonstration, you will need the 20411C-LON-DC1 virtual machine. This machine should be running from the previous demonstration. Demonstration Steps Create and edit a GPO for audit policy configuration On LON-DC1, in Server Manager, click Tools, and then click Group Policy Management. In Group Policy Management, double-click Forest: Adatum.com, double-click Domains, double- click Adatum.com, right-click Group Policy Objects, and then click New. In the New GPO window, type File Audit in the Name field, and then press Enter. Double-click the Group Policy Objects container, right-click File Audit, and then click Edit. In the Group Policy Management Editor, under Computer Configuration, expand Policies, expand Windows Settings, expand Security Settings, expand Advanced Audit Policy Configuration, expand Audit Policies, and then click Object Access. Double-click Audit Detailed File Share. In the Properties window, select the Configure the following audit events check box. Select the Success and Failure check boxes, and then click OK. Double-click Audit Removable Storage. Select the Success and Failure check box, and then click OK. Close the Group Policy Management Editor. Close Group Policy Management.

Additional Resources & Next Steps Instructor-Led Courses 20411C: Administering Windows Server 2012 Books Exam Ref 70-411: Administering Windows Server 2012 Exams & Certifications Exam 70-411: Administering Windows Server 2012