{ Security Technologies} Steve Lamb Technical Security Advisor, Microsoft UK http://blogs.technet.com/steve_lamb Stephen.lamb@microsoft.com
”Effective Security”
Agenda Overview of Windows Server 2008 Security Windows Service Hardening Network Access Protection Read-Only Domain Controllers AD Rights Management Auditing Resources
Windows Server 2008 Security Architecture Network Access Protection Read-Only Domain Controller AD Rights Management Services Auditing
Windows Services Hardening 12/10/2018 1:30 AM Windows Services Hardening U Windows Services are profiled Reduce size of high risk layers Segment the services Increase number of layers K Service … Service 1 Service … Service 2 Service A Service 3 Service B K Kernel Drivers U User-mode Drivers 6
Where is the boundary? ?
Network Access Protection Internet Boundary Zone Employees , Partners, Vendors Intranet Customers Partners Remote Employees
Network Access Protection How It Works Policy Servers e.g.., Patch, AV 1 1 Access requested Health state sent to NPS (RADIUS) NPS validates against health policy If compliant, access granted If not compliant, restricted network access and remediation Microsoft NPS 2 3 Not policy compliant 5 3 2 Remediation Servers e.g., Patch Restricted Network 4 Policy compliant DCHP, VPN Switch/Router Corporate Network 5 4
Read-Only Domain Controller 12/10/2018 1:30 AM Read-Only Domain Controller RODC Main Office Branch Office
AD Rights Management Do NOT Forward Let’s have a look @ my email
How does RMS work? Windows Server running RMS Author using Office SQL Server Active Directory Windows Server running RMS 3 1 4 2 5 3 Author using Office The Recipient
Federated Rights Management 12/10/2018 1:30 AM Federated Rights Management Contoso Adatum AD AD Federation Trust Resource Federation Server Account Federation Server RMS Web SSO
Auditing - Comparison Windows Server 2003 Windows Server 2008
Updated Event Viewer
CLI305 Is EFS Dead? ?
A Quick Review BitLocker
New Windows Firewall Inbound and Outbound Filtering New Management MMC Integrated Firewall and IPsec Policies Rule Configuration on Active Directory Groups and Users Support for IPv4 and IPv6 Advanced Rule Options On by Default (Beta 3)
Server and Domain Isolation Active Directory Domain Controller Corporate Network Server Isolation Trusted Resource Server Servers with Sensitive Data HR Workstation X Unmanaged/Rogue Computer X Managed Computer Managed Computer Untrusted Distribute policies and credentials Define the logical isolation boundaries Enable tiered-access to sensitive resources Block inbound connections from untrusted Managed computers can communicate
Crypto Next Generation (CNG) 12/10/2018 1:30 AM Crypto Next Generation (CNG) Native AES 256 in the Kernel Can plug in new algorithms FIPS 140-2 ©2005 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.
Please fill in your Evaluation Form