Welcome to the GIG Event 1. MICROSOFT ACTIVE DIRECTORY SERVICES Presenter: Avinesh MCP, MCTS 2.

Slides:



Advertisements
Similar presentations
1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senns Information Technology, 3 rd Edition Chapter 7 Enterprise Databases.
Advertisements

Active Directory: Beyond The Basics
Enabling Secure Internet Access with ISA Server
© SafeNet Confidential and Proprietary Administering SafeNet StorageSecure Smart Card Module 3: Lesson 5 SafeNet StorageSecure Storage Security Course.
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
COMP091 OS1 Active Directory. Some History Early 1990s Windows for Workgroups introduced peer-to-peer networking based on SMB over netbios (tcp/ip still.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 6 Managing and Administering DNS in Windows Server 2008.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
How to Succeed with Active Directory Robert Williams, PhD CEO Secure Logistix Corporation.
System and Network Security Practices COEN 351 E-Commerce Security.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 1: Introduction to Active Directory.
Chapter 7 HARDENING SERVERS.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Chapter 4 Introduction to Active Directory and Account Management
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 7 Configuring File Services in Windows Server 2008.
Understanding Active Directory
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Module 1: Installing Active Directory Domain Services
11 REVIEWING MICROSOFT ACTIVE DIRECTORY CONCEPTS Chapter 1.
Chapter 4 Introduction to Active Directory and Account Management
Module 1 Introduction to Managing Microsoft® Windows Server® 2008 Environment.
70-270: MCSE Guide to Microsoft Windows XP Professional Chapter 5: Users, Groups, Profiles, and Policies.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Using Group Policy to Manage User Environments. Overview Introduction to Managing User Environments Introduction to Administrative Templates Assigning.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Module 6: Designing Active Directory Security in Windows Server 2008.
Designing Active Directory for Security
Welcome Thank you for taking our training. Collection 6425: Configure Windows 2008 Active Directory Domain Services Course 6710 – 6719 at
Module 14: Configuring Server Security Compliance
Securing AD DS Module A 3: Securing AD DS
Module 7: Fundamentals of Administering Windows Server 2008.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
September 18, 2002 Windows 2000 Server Active Directory By Jerry Haggard.
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Lesson 17-Windows 2000/Windows 2003 Server Security Issues.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Company Confidential 1 A Course on Global Catalog And Flexible Single Master Operations (Fsmo) Roles Prepared for: *Stars* New Horizons Certified Professional.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
 Identify Active Directory functions and Benefits.  Identify the major components that make up an Active Directory structure.  Identify how DNS relates.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Page 1 Active Directory and DNS Lecture 2 Hassan Shuja 09/14/2004.
Module 1: Implementing Active Directory ® Domain Services.
CHAPTER 9 HARDENING SERVERS. C REATING A BASELINE POLICY Security parameters used to create a baseline installation can be configured using a Group Policy.
DNS DNS overview DNS operation DNS zones. DNS Overview Name to IP address lookup service based on Domain Names Some DNS servers hold name and address.
Module 7: Implementing Security Using Group Policy.
Understand Server Protection LESSON Security Fundamentals.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Implementing Server Security on Windows 2000 and Windows Server 2003
Introduction to Active Directory
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
11 DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE Chapter 7.
11 GLOBAL CATALOG AND FLEXIBLE SINGLE MASTER OPERATIONS (FSMO) ROLES Chapter 4.
Module 7: Designing Security for Accounts and Services.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Windows 2003 Architecture, Active Directory & DNS Lecture # 3 Hassan Shuja 02/14/2006.
MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition (70-294) Chapter 1: Overview of the Active.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
11 IMPLEMENTING ACTIVE DIRECTORY Chapter 2. Chapter 2: IMPLEMENTING ACTIVE DIRECTORY2 REQUIREMENTS FOR ACTIVE DIRECTORY  Microsoft Windows Server 2003.
Basharat Institute of Higher Education
Configuring Windows Firewall with Advanced Security
Implementing Active Directory Domain Services
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Welcome to the GIG Event 1

MICROSOFT ACTIVE DIRECTORY SERVICES Presenter: Avinesh MCP, MCTS 2

What is ADS? Active Directory is a database that keeps track of all the user accounts and passwords in your organization. It allows you to store your user accounts and passwords in one protected location, improving your organization's security. Active Directory is subdivided into one or more domains. A domain is a security boundary. Each domain is hosted by a server computer called a domain controller (DC). A domain controller manages all of the user accounts and passwords for a domain. 3

Active Directory Structure Hierarchical Base object Domain OU Domain OU Objects Domain Tree Domain Tree Forest

Authentication Administration Storage Compliance Authentication Administration Storage Compliance Audio Conferencing and Calendaring and Calendaring Web Conferencing Web Conferencing Telephony Video Conferencing Video Conferencing Voice Mail Instant Messaging (IM) Authentication Administration Storage Authentication Administration Storage Authentication Administration Storage Authentication Administration Storage Authentication Administration Storage Authentication Administration Storage Authentication Administration Storage Authentication Administration Storage Authentication Administration Storage Authentication Administration Storage Authentication Administration Storage Authentication Administration Storage Authentication Administration Storage Authentication Administration Storage Telephony and Voice Mail Telephony and Voice Mail Instant Messaging and Calendaring Unified Conferencing: Audio, Video, Web On-Premises Hybrid In the Cloud On-Premises Hybrid In the Cloud Communications Today Future of Communications

Domain Controllers on VM’s How do you backup your domain controllers running on virtual machines??  Taking snapshot? What are the side effects?? 6

Active Directory Security Fundamentals Forests Domains Trusts Kerberos OUs Group policy (GPO’s) ACLs Authentication Authorization Replication FSMOs Delegation 7

Securing Active Directory Planning Creating Maintaining Best Practices 8

Planning AD Security Considerations upon deployment of AD DC’s – Datacenter (Microsoft Online Services) Centralized & Secure (ADFS and Single sign 0n) High End Performance (uptime guarantee) – Branch Offices Lack of IT Expertise Slow connectivity to rest of organization 9

Planning AD Security Identifying Types of Threats – Spoofing – Data Tampering – Repudiation – Information Disclosure – Denial of Service – Elevation of Privilege Identifying Sources of Threats – Anonymous Users – Authenticated Users – Service Administrators – Data Administrators – Users with Physical Access 10

Establishing Secure AD Boundaries Delegation of Administration – Needs to be flexible, limited, secure, dynamic and meet the needs of the organization based upon need for autonomy and isolation Forest/Domain Model Establish Secure Trusts 11

Deploying Secure Domain Controllers Ensure predictable, repeatable, and secure domain controller deployments. – Create strong administrator password 9 characters, non-dictionary, symbols, etc. – Use TCP/IP only if possible – Disable non-essential services IIS, Messenger, SMTP, Telnet, etc. – Format partitions with NTFS – Install latest service packs and security updates – Prohibit the use of cached credentials when unlocking DC console – Install anti-virus scanning software – Maintain Secure Physical Access to Domain Controllers 12

Best Practices Domain Policies – Password Policies History Age Length Complexity – Lockout Policy Duration Threshold Reset 13

Best Practices Domain Controller Policies – User Rights Log on locally System Shutdown – Enable Auditing Account logon Account Management Directory Service Access Logon events Policy changes System events – Event Logging Security log size set to 128 MB Retention – set to overwrite events as needed 14

Best Practices Secure Service Admin Accounts – Enterprise Admins – Schema Admins – Administrators – Domain Admins – rename this acct – Server Operators – Account Operators – Backup Operators Best Practices – Rename the administrator account – Limit the number of service admin accts – Separate administrator accts from end user accts 15

Deploy Secure DNS Protecting DNS Servers – Use Active Directory–integrated DNS zones. – Implement secure updates between DNS clients and servers – Protect the DNS cache on domain controllers. – Monitor network activity. – Close all unused firewall ports. Protecting DNS Data – Use secure dynamic update. – Ensure that third-party DNS servers support secure dynamic update. – Ensure that only trusted individuals are granted DNS administrator privileges – Set ACLs on DNS data. – Use separate internal and external namespaces. 16

Maintaining Secure AD Operations Maintain Baseline Information – Create a baseline database of Active Directory infrastructure information. Audit Policies List of GPO’s and their assignments List of Trusts List of Domain Controllers, Administrative workstations Service Administrators Operations Masters (FSMO roles) Replication topology Database size (.DIT file) OS version, Service Packs, Hotfixes, Anti-Virus version – Detect and verify infrastructure changes 17

Maintaining Secure AD Operations Monitoring the AD Infrastructure – Collect information in real time or at specified time intervals. Security Event Logs – Compare this data with previous data or against a threshold value. – Respond to a security alert as directed in your organization’s practices. – Summarize security monitoring in one or more regularly scheduled reports 18

Maintaining Secure AD Operations Monitoring the AD Infrastructure – Monitoring Forest-level Changes Detect changes in the Active Directory schema. Identify when domain controllers are added or removed. Detect changes in replication topology. Detect changes in LDAP policies. Detect changes in forest-wide operations master roles. 19

Maintaining Secure AD Operations Monitoring Domain-level Changes – Detect changes in domain-wide operations master roles. – Detect changes in trusts. – Detect changes in GPOs for the Domain container and the Domain Controllers OU. – Detect changes in GPO assignments for the Domain container and the Domain Controllers OU. – Detect changes in the membership of the built-in groups. – Detect changes in the audit policy settings for the domain. 20

Best Practices DNS Use AD-integrated zones if at all possible Use forwarders instead of secondaries – Eliminates text-based zone files Treat DNS admins as service admins 21

Best Practices DHCP Configure so that: – Client updates A record – DHCP service updates PTR record 22

Best Practices DC policies Enable auditing Disable anonymous connections Digitally sign client communications Disable cached credentials 23

Best Practices FSMO placement Implications per role Availability Survivability 24

Best Practices Group Memberships Severely limit membership in administrative groups Set ACLs on groups so that only service admins can modify service admin groups Remove everyone from the Schema Administrators group – Add someone back in when needed Audit changes to service admin groups 25

Best Practices Monitoring Monitor for any unexpected DC outages – Can indicate an attack Monitor for unexpected query loads – Can indicate a DOS attack Monitor for disk space use – Can indicate a replicating DOS attack Monitor for DNS request traffic – Can indicate a DOS attack on DNS 26

Best Practices Service Administration Create separate admin and user accounts Create a separate service admin OU Establish secure admin workstations – Don’t give admin privileges on workstation Use secure updates (NTLM) between admin workstations and DCs Use the “logon locally” policy to limit service admin logons to specific admin workstations 27

Best Practices Data Administration Always use NTFS Use encryption where appropriate 28

Thank You Q And A? 29