CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+

Slides:



Advertisements
Similar presentations
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Advertisements

Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Chapter 10 Securing Windows Server 2008 MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Module 5: Configuring Access for Remote Clients and Networks.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
Module 10: Configuring Virtual Private Network Access for Remote Clients and Networks.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
Module 8 Configuring Mobile Computers and Remote Access in Windows 7.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Troubleshooting Mobile Connectivity Problems Lesson 4.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Chapter 20: Getting from the Office to the Road: VPNs BAI617.
Chapter 12 Chapter 12: Remote Access and Virtual Private Networks.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Configuring Mobile Computing and Remote Access
Microsoft ® Official Course Module 8 Securing Windows 8 Desktops.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Working with Mobile Computers Lesson 12. Skills Matrix Technology SkillObjective DomainObjective # Configuring Vista Wireless Networking Use the Network.
CN2140 Server II Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Week #7 Objectives: Secure Windows 7 Desktop
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
70-411: Administering Windows Server 2012
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Configure and Security Remote Acess. Chapter 8 Advance Computer Network Lecture Sorn Pisey
Implementing SSTP VPN and 802.1x with RADIUS on Windows 2012 Ing. Ondřej Ševeček | Product Manager Windows Server | GOPAS a.s. MCM: Directory | MVP: Security.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Windows Vista Configuration MCTS : Mobile Computers.
Introducing Windows Vista Lesson 1. Skills Matrix Technology SkillObjective DomainObjective # Understanding Windows Vista System Requirements Identify.
Windows Vista Configuration MCTS : Advanced Networking.
Using Mobile Computers Lesson 12. Objectives Understand wireless security Configure wireless networking Use Windows mobility controls Synchronize data.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
Module Overview Overview of Wireless Networks Configure a Wireless Network.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Module 9: Configuring Network Access
Microsoft Windows NT 4.0 Authentication Protocols
Configuring and Troubleshooting Routing and Remote Access
Server-to-Client Remote Access and DirectAccess
Presentation transcript:

CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+

Agenda Chapter 12: Using Mobile Computers Exercise / Lab Quiz

Using Windows 7 on a Mobile Computer Special configuration settings ▫Power and display options Windows 7 supports tablet PCs ▫Reversible screen, touch sensitive, write on with a stylus Handheld devices, such as SmartPhones, need to be synchronized

Understanding Wireless Security Some types of attacks common to unsecured networks: ▫Eavesdropping  Attackers capture traffic ▫Masquerading  Gain access by impersonating authorized wireless users ▫Attacks against wireless clients ▫Denial of service ▫Data tampering

Wireless Networking Hardware IEEE standards ▫Dictate frequencies, transmission speeds, and ranges of wireless networking products. Newer devices can fall back to support older devices at lower speeds. Security protocols are not backward compatible: ▫Wired Equivalent Privacy (WEP) ▫WiFi Protected Access (WPA and WPA2)

Using Wired Equivalent Privacy (WEP) Uses a security setting to encrypt network traffic ▫Authentication method  Open system – Enables any client to connect without providing a password. WEP Encryption key is not required  Shared secret - Requires wireless clients to authenticate by using a secret key Administrators must configure all devices with the same shared secret key Relatively weak cryptography

Wi-Fi Protected Access (WPA and WPA2) Two encryption options: ▫Temporal Key Integrity Protocol (TKIP) ▫Advanced Encryption System (AES) WPA has two operational modes: ▫WPA-Personal (WPA-PSK) ▫WPA-Enterprise (WPA-RADIUS or WPA-802.1x)

Configuring Wireless Networking Manual configuration for wireless adapters that are supported directly by Windows 7 If there is specific driver or software, you should use that program

Windows Mobility Center Provides quick access to configuration settings used by mobile computer users

Configuring Mobile Display Options Display configurations are often changed to accommodate viewing: ▫Connecting an external display ▫Configuring multiple displays ▫Using a display projector

Configuring Presentation Settings Configuration settings that users most often adjust before giving a presentation Add exception on firewall if you want to connect Network projector ▫Start -> All Programs -> Accessories -> Connect To A Network Projector.

Configuring Power Options Power plans ▫Enable you to create power usage profiles ▫Assign different profiles depending on  AC power source  Batteries Control Panel Group Policy ▫Comp Conf\Policies\Admin Temp\System\Power Management container Powercfg.exe

Synchronizing Data For users who connect to a network when in the office and need to take files with them when they are not connected Two types of synchronization: ▫One-way  The system replicates any changes users make to the source files to the destination ▫Two-way  Changes users make to either copy of the files are replicated to the other system

Using Offline Files A form of fault tolerance Workstations copy server-based folders to the local drive ▫Users can work with the files whether the network is operational or not, or even if they disconnect from the network When the workstation reconnects, synchronization of the files occurs

Transparent Caching Causes Windows 7 to save copies of files accessed on a remote server on a local drive Do not remain available when disconnected from the network Provides users with faster repeat access and conserves bandwidth Similar to BranchCache feature, except cached files are not shared with other workstations

Using Sync Center Central control panel for all synchronization partnerships Pairs of folders or devices are configured to synchronize their data on a regular basis

Using BitLocker Windows 7 Enterprise and Ultimate Encrypts an entire volume to protect against unauthorized persons, such as someone stealing a hard drive: ▫Increased data protection ▫Integrity checking

Understanding BitLocker Requirements Computer must have a Trusted Platform Module (TPM) and a compatible BIOS Startup PIN A personal identification number (PIN) needed to unlock Startup Key A USB flash drive containing a startup key

Understanding BitLocker Requirements Has 5 operational modes: ▫TPM + startup PIN + startup key ▫TPM + startup key ▫TPM + startup PIN ▫Startup key only ▫TPM only

Turning on BitLocker You can use BitLocker without TPM chip ▫Require additional authentication at startup Group Policy setting  Comp Conf\Policies\Admin Templates\Windows Comp\BitLocker Drive Encryption\OS Drives container To turn on/off BitLocker ▫Control Panel > System and Security > BitLocker Drive Encryption. The BitLocker Drive Encryption control panel appears

Using Data Recovery Agents (DRA) A user account authorized to recover BitLocker drives with a digital certificate on a Smart Card Must be configured using Group Policy in an AD DS Must enable DRA recovery for each type of BitLocker resource you want to recover

Using BitLocker To Go Enables user to encrypt removable USB drives – Flash drives and external HDs

Using Remote Network Connections For travelling or telecommuting users who must connect to the company network from a remote site: ▫Dial-up ▫Virtual Private Networking (VPN) ▫Direct Access (new)

VPN Protocol Encapsulation Point-to-Point Tunneling Protocol (PPTP) ▫Least secure ▫For authentication, PPTP supports only  Microsoft Challenge Handshake Authentication Protocol version 1 (MS-CHAP v1), version 2 (MS-CHAP v2)  Extensible Authentication Protocol (EAP), or Protected Extensible Authentication Protocol (PEAP) Layer 2 Tunneling Protocol (L2TP) ▫Relies on the IP security extensions (IPsec) for encryption ▫For VPN connections involving Windows XP clients, L2TP/IPsec is the preferred protocol

VPN Protocol Encapsulation (Cont.) Secure Socket Tunneling Protocol (SSTP) ▫Supported only by clients running Windows Vista SP1 or later ▫SSTP uses certificates for authentication, with the EAP-TLS authentication protocol Internet Key Exchange, Version 2 (IKEv2) ▫IKEv2 does not support the older authentication mechanisms, PAP and CHAP

VPN Connection Start -> Control Panel > Network and Internet > Network and Sharing Center -> Set up a new connection or network VPN Reconnect ▫When a VPN was interrupted, users had to manually re-establish the connection ▫VPN Reconnect enables a computer to reconnect automatically

Network Access Protection (NAP) A component of the Network Policy and Access Services role in Windows Server 2008 and Windows Server 2008 R2 Designed to prevent potentially dangerous clients – local or remote – from connecting to the network

Introducing DirectAccess Replacement for VPN Eliminates the need for clients to manually establish wide area connections to their networks Automatically connects to the network when connected to the Internet

Understanding the DirectAccess Infrastructure Invisible to the client, but complicated communications process with a long list of back- end infrastructure requirements: ▫IPV6 – Globally routable addresses ▫Ipsec – Provides additional security ▫Extensive Server requirements ▫Clients running Windows 7 Ultimate or Enterprise or Server 2008 R2, in the same domain as the DirectAccess Server

Assignment Matching Multiple Choice