Implementing Native Mode and Internet Based Client Management.

Slides:



Advertisements
Similar presentations
The following 10 questions test your knowledge of Internet-based client management in Configuration Manager Configuration Manager 2007 Internet-Based.
Advertisements

Deploying and Managing Active Directory Certificate Services
Internet Based Client Management
Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy’s National Nuclear.
Chapter 9 Deploying IIS and Active Directory Certificate Services
Module 5: Configuring Access to Internal Resources.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Intel Confidential 1 Configure PKI Web Server Certificates for each Management Controller.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 15: Internet Explorer and Remote Connectivity Tools.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Senior Technical Writer
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Configuring Active Directory Certificate Services Lesson 13.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
Course 201 – Administration, Content Inspection and SSL VPN
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Introduction to Active Directory December 10th, pm Daniels 407.
Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 SAN Certificate in Unity Connection Presenter Name: Bhawna Goel.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
LANDesk Management Gateway
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
The Windows NT ® 5.0 Public Key Infrastructure Charlie Chase Program Manager Windows NT Security Microsoft Corporation.
Implementing Network Access Protection
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
1 Week 6 – NPS and RADIUS Install and Configure a Network Policy Server Configure RADIUS Clients and Servers NPS Authentication Methods Monitor and Troubleshoot.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
ArcGIS Server and Portal for ArcGIS An Introduction to Security
Module 5: Designing a Terminal Services Infrastructure.
Configuring Directory Certificate Services Lesson 13.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Module 9: Fundamentals of Securing Network Communication.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Building Security into Your System Bill Major Gregory Ponto.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Windows 2000 Certificate Authority By Saunders Roesser.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
Securing Data with Internet Protocol Security (IPSec) Designing IPSec Policies Planning IPSec Deployment.
Configuring Network Access Protection
Jason Sandys Senior Lead Consultant Catapult Systems, Inc. Session Code: MGT312.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Creating and Managing Digital Certificates Chapter Eleven.
Microsoft Virtual Academy Preparing for the Windows 8.1 MCSA Module 5: Managing Devices & Resource Access.
Configuring and Deploying Web Applications Lesson 7.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
Vmware 2V0-621D Vmware Exam Questions & Answers VMware Certified Professional 6 Presents
Managed by UT-Battelle for the Department of Energy System Center Configuration Manager at ORNL National Laboratories Information Technology Summit 2008.
Securing the Network Perimeter with ISA 2004
Managing Internet-based Client with ConfigMgr Current Branch
Server-to-Client Remote Access and DirectAccess
Building Security into Your System
System Center Configuration Manager Cloud Services – Cloud Distribution Point Presented By: Ginu Tausif.
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
Presentation transcript:

Implementing Native Mode and Internet Based Client Management

 Next version of SMS  Released in Aug 2007  SP1 in April 2008  R2 released in Oct 2008

 What does it mean  Secures your environment by signing communication between your server and clients.  Benefits  Reduces the ability of attacker to set up bogus site and distribution points and encrypts communication through SSL  Considerations  With added security comes added complexity and administration  PKI is not something to just throw in. Make sure to plan a proper deployment before you attempt to tackle native mode   

 Internet Based Client Management  Allows you to manage clients outside of intranet or VPN  Supported Functions  Software Distribution (targeting computers, not users)  Software Updates (SUP)  Desired Configuration Management  Inventory  Software Metering  Non-Supported  Operating System Deployment  WOL (Wake on LAN)  Remote Tools (remote connection, remote assistance)

 PKI Certificates  More Info: “Deploying the PKI Certificates Required for Native Mode” us/library/bb aspx us/library/bb aspx  System Center Configuration Manager  Perimeter server to host roles  Perimeter server for FSP role

 This can be your own CA or external CA (Network Solutions, Verisign, etc…)  This demonstration is using a Microsoft Windows Server 2003 CA.  Clients must be able to trust the certificates issuing authority (Trusted Root, Intermediate Root)  Clients must be able to see published CRL*

 Certificate Revocation List  Used to determine if certificate is valid or has been revoked.  Path to list needs to be accessible to internet clients  Must be defined before creating cert (gets placed in the certificate – see image)

1. Manual installation 2. Request through /certsrv 3. Autoenrollment through Group Policy  Make sure client can trust the certificate authority  Download into trusted root  Publish through GPO  Add CTL to IIS

 Three primary types of certs needed 1. Computer/Workstation  Used for authentication  Autoenrollment  How to revoke  How to request for non-domain 2. Doc Signing  Custom cert for ConfigMgr Site Servers 3. Web  Needed for all servers hosting site server roles (IIS)

 Standard Computer certificate – can be provided by intermediate CA  Can be configured in Group Policy for autoenrollment  Demo GPO

 Standard IIS web server certificate  If internet, cert must support SAN  SAN  Subject Alternative Name  To add option to MS CA certutil -setreg policy\EditFlags +EDITF_ATTRIBUTESUBJECTALTNAME2  To add to a web based cert request - in attributes section:  san:dns= &dns= [&…]

 The name of the certificate needs to be the following:  “The site code of this site server is ”  Demo  More information:  us/library/cc aspx us/library/cc aspx

 Configure Templates  Install web cert to ConfigMgr1  Install site signing cert to ConfigMgr1  Configure AD for client autoenrollment  Configure IIS for cert  Configure ConfigMgr Site for native mode  Demo

 Install web cert to ConfigMgr2 (SAN)  Install computer cert on ConfigMgr2  Configure IIS for cert on both headers and IP  Verify IIS works from internal and external  Deploy roles to ConfigMgr2  Verify Logs  Demo

 Options to add to install – ccmsetup is bootstrapper for client.msi  Client.msi options can be passed through ccmsetup, but not vise versa.  CCMSetup.exe  /mp:mp2.mylab.com – used to define location to pull down client install files  /native - sets the communication mode for the client (http vs https). MUST be defined if client will be internet only – additional options CRL | FALLBACK | CRLANDFALLBACK  Client.msi  FSP=mp2.mylab.com – used to define fallback status point when client can’t communicate to mp (cert errors). This should be separate server than MP since it is unsecure site.  SMSSITECODE=A00 – defines the site the client will communicate to  CCMALWAYSINF=1 – the “1” option defines the client as always internet  CCMHOSTNAME=mp2.mylab.com – defines the internet FQDN management point the client will report to.  SMSMP=mp2.mylab.com – defines the management point the client will report to  Demo

 Domain Member  Will always be on local network  Pulls information from AD for assignment

 Non-Domain (not trusted or workgroup)  Will never connect to local network  Assignment defined via installation options

 Domain Member  Will connect to local network and be external on internet  Assignment defined via installation options

 Client and Server must share cert information  Clients need to have a copy of the site signing cert so that they can decrypt the communication – stored in registry, not cert store  Domain clients can obtain from AD (secure)  Non-Domain get it during install (secure) or from MP after install (less secure)  To install  SMSSIGNCERT=.\.\A00SSC.cer - defines the site server self-signing cert when clients cannot connect to AD. This is the file path to exported certificate from the site server.  Client installs the site signing cert WITHOUT the private key  Key can also be pre-staged, pulled from GC, or pulled from MP

 Certificate errors will manifest in the client and server logs as WINHTTP errors WINHTTP_CALLBACK_STATUS_SECURE_FAILURE <![LOG[[CCMHTTP] : dwStatusInformationLength is 4 ]LOG]!> <![LOG[[CCMHTTP] : *lpvStatusInformation is 0x9 ]LOG]!> WINHTTP_CALLBACK_STATUS_FLAG_CERT_REV_FAILED <![LOG[[CCMHTTP] : WINHTTP_CALLBACK_STATUS_FLAG_CERT_REV_FAILED is set ]LOG]!> WINHTTP_CALLBACK_STATUS_FLAG_INVALID_CA <![LOG[[CCMHTTP] : WINHTTP_CALLBACK_STATUS_FLAG_INVALID_CA is set ]LOG]!>  More information about winhttp errors can be found on MSDN 