W2k Security At FNAL Jack Schmidt FNAL W2K Migration Working Group Chair April 16.

Slides:



Advertisements
Similar presentations
Auditing Microsoft Active Directory
Advertisements

Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
1 Figure 6-16: Advanced Server Hardening Techniques Reading Event Logs (Chapter 10)  The importance of logging to diagnose problems Failed logins, changing.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
ASU Windows 2000 AD Environment OU Presentation. Agenda OU structure Domain Admin Support OU Administrator Control/Access Migration from NT to W2K OU.
Administering Active Directory
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
7.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 7: Introducing Group Accounts.
11 WORKING WITH COMPUTER ACCOUNTS Chapter 8. Chapter 8: WORKING WITH COMPUTER ACCOUNTS2 CHAPTER OVERVIEW  Describe the process of adding a computer to.
11 WORKING WITH COMPUTER ACCOUNTS Chapter 8. Chapter 8: WORKING WITH COMPUTER ACCOUNTS2 CHAPTER OVERVIEW Describe the process of adding a computer to.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Guide to MCSE , Enhanced 1 Activity 9-1: Creating a Group Policy Object Using the MMC Objective: To create a GPO using the Group Policy Object Editor.
ManageEngine ADAudit Plus A detailed walkthrough.
Chapter 7 WORKING WITH GROUPS.
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
FNAL Configuration Management Jack Schmidt Cyber Security Workshop May th 2006.
Working with Workgroups and Domains
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
Implementing Secure Shared File Access
Corso referenti S.I.R.A. – Modulo 2 07 – Group Policy 20/11 – 27/11 – 05/12 11/12 – 13/12 (gruppo 1) 12/12 – 15/12 (gruppo 2) Cristiano Gentili, Massimiliano.
September 18, 2002 Introduction to Windows 2000 Server Components Ryan Larson David Greer.
Beams Division Local Administrators Meeting 9/17/02 Brian Drendel.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
8.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 8: Introducing Computer Accounts.
Managing Active Directory Domain Services Objects
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Designing Active Directory for Security
Section 7: Implementing Security Using Group Policy Exploring the Windows Security Architecture Securing User Accounts Exploring Security Policies Hardening.
Windows Server 2003 Overview 1 Windows 2003 Server Overview Ayaz
Section 3: Designing a Group Policy Infrastructure Overview of Active Directory Introducing the Design Stages for Implementing Group Policy Planning Your.
Securing AD DS Module A 3: Securing AD DS
CSU - DCE Internet Security... Privacy Overview - Fort Collins, CO Copyright © XTR Systems, LLC Setting Up & Using a Site Security Policy Instructor:
11 WORKING WITH USER ACCOUNTS Chapter 6. Chapter 6: WORKING WITH USER ACCOUNTS2 UNDERSTANDING USER ACCOUNTS  Local user accounts  stored in the Security.
SMS 2003 Deployment and Managing Windows Security Rafal Otto Internet Services Group Department of Information Technology CERN 26 May 2016.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
September 18, 2002 Windows 2000 Server Active Directory By Jerry Haggard.
Configuring Active Directory Objects and Trusts
Module 3: Configuring Active Directory Objects and Trusts.
Lesson 17-Windows 2000/Windows 2003 Server Security Issues.
Understanding Group Policy James Michael Stewart CISSP, TICSA, CIW SA, CCNA, MCSE NT & W2K, iNet+
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Introduction to Microsoft Management Console (MMC) MMC is a common console framework for management applications. MMC provides a common environment for.
W2K and Kerberos at FNAL Jack Mark
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
NT4 SP4 Security Jack Schmidt - Fermilab
Module 3: Managing a Microsoft ® Windows ® Small Business Server Environment.
W2K and Kerberos at FNAL Jack Schmidt Mark Kaletka.
Working with Workgroups and Domains Lesson 9. Objectives Understand users and groups Create and manage local users and groups Understand the difference.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
W2K Migration Status Report W2k Migration Working Group February 21, 2001.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
Module 3: Planning Administrative Access. Overview Determining the Appropriate Administrative Model Designing Administrative Group Strategies Planning.
CD W2K Desktop Migration Jack Schmidt 12/5/2001. W2K Migration Plan 1. Migrate users/desktops to provide kerberos authentication. Resources still in NT4.
Week 4 Objectives Overview of Group Policy Group Policy Processing Implementing a Central Store for Administrative Templates.
Module 10: Implementing Administrative Templates and Audit Policy.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
MIS Chapter 41 Chapter 4 – Implementing and Managing Group and Computer Accounts MIS 431 – Created Spring 2006.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
11 SECURITY PLANNING AND ADMINISTRATIVE DELEGATION Chapter 6.
LM/NTLMv1 Retirement Hosted by LSP Services.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
Fermilab supports several authentication mechanisms for user and computer authentication. This talk will cover our authentication systems, design considerations,
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
W2K Migration Experiences Jack Schmidt Windows Policy Committee.
Assignment # 8.
Windows Server 2003 使用者群組管理
Active Directory Organizational Units
Presentation transcript:

W2k Security At FNAL Jack Schmidt FNAL W2K Migration Working Group Chair April 16

Background W2K Migration working group –Existing NT4 Domain Admins and Division/Section representatives –Initially chartered to propose domain design only - but presently implementing design –Pressure to migrate but also to do things right!

Background win.fnal.gov –Top level domain. Apply site wide security policies –Limited number of Administrators –Contains no users or resources. fermi.win.fnal.gov –Child domain. Contains all users and most resources. –Limited number of Domain Administrators. ‘resource’.win.fnal.gov –Child domain(s). Controls systems, members of other critical systems. –No user accounts allowed.

Lab Policy Kerberos authentication Domain Controllers are ‘critical systems’ Centralized accounts/ou administration No shared accounts

Authentication Kerberos and NTLMv2 –95/98/NT and non-domain w2k systems use NTLM –No ‘kerberos-only’ setting 2 central kerberos servers –MIT Can’t change password Long incorrect password timeout –Active Directory –2 way trust

Critical System Definition “Computer security incidents involving certain systems could seriously impact the laboratory’s science programmatic operations. Such systems may be designated “critical systems” and may be subject to additional computer security policies and procedures” Plan Identify systems Identify possible weaknesses and solutions

Critical System Plan 4 Domain Admins for win and fermi domains appointed by Computing Division and CSExec DCs in locked cabinets Remote administration using IPSEC and terminal server Services monitored for state change and additions Backup policy and domain disaster recovery One password policy Identification of OU Admin Rights Define W2K Policy Committee

Centralized Accounts Single user account –One per realm. Same username. create/disable –Security able to flip a ‘switch’ –Admins not allowed to create accounts User accounts only in 1 domain win.fnal.gov fermi.win.fnal.gov controls.win.fnal.gov NT4 Domain Admins -> OU Admins

OU Administration Requirements: –Reset passwords –Define print/disk shares in AD –Change allowed user account information –Add/Delete/Move machine accounts –Add/Delete/Modify global groups –Enable/Disable user accounts –Move user accounts to ‘terminated’ OU –Retrieve user accounts from New- User OU

OU Administration Requirements (cont) –Set and Define policy for the OU –Create sub-OUs –Delegate control of sub-OUs

OU Administration Implementation Issues Admins can: –Reset passwords –Define printers/shares –Change allowed user account settings –Add/Delete/Move machine accounts –Add/Delete/Modify global groups –Enable/Disable User accounts

OU Administration Implementation Issues Admins CAN’T: –Create/Delete OUs below their top OU –Move users within their OU structure –Delegate control of sub-OUs Why? AD does not provide a ‘move’ permission - only create/delete! AD does not provide a basic security setting to prevent Admins for changing subOU permissions

OU Administration Possible Solutions Domain Admins perform function –Not acceptable to group Explore commercial products –None that fit our security requirements Write a service program –Time consuming Combination GPO and Audit Policy –Implementable now

OU Administration GPO Implementation: OU Creator Group –Domain Admins control membership username-Creator-OU –Full Control over OU –Only found in top-level OU –Limited membership (3 per OU) OU Admin Group –Domain Admins or OU creators control membership username-Admin-OU –Limited control over OU/sub-OU

OU Administration OU Creator Rights: This object and all child objects- –Full control This object only- –Deny Delete –Deny Modify Permissions –Deny Modify Owner The Creator group provides all requested admin rights – but also can create/delete users

OU Administration OU Admin Rights: This object and all child objects- –Full Control –Deny Modify Permissions –Deny Modify Owner –Deny Create OU Objects –Deny Create User Objects –Deny Delete User Objects This object only- –Deny Delete

OU Administration OU Admin Rights: (cont) User Objects- –Deny Write Division, Last Name, Logon Name, etc.. 18 total The OU Admins group have basic rights but cannot create sub-OUs or move users

OU Administration Audit Policy Monitor DC event logs for violations in security policy –Create/delete users Notify appropriate personnel Auditing done on external computer(s) –Harder for hackers to cover tracks

OU Administration Audit Policy Implementation: Configure DCs to log proper events Install software on DCs to forward events to unix syslog server –Event Reporter ($49) –ELM (price varies) –Ntsyslog (free) Central syslog unix server –Uses syslog-ng and swatch Violation notification –Sends to archived list

OU Administration Present status –Testing design –Needs Computer Security Review

No Shared Accounts Existing NT4 Shared accounts: –Administrative accounts –Test accounts –Console/Demo accounts –Data logging accounts –Monitoring Accounts –Service Accounts

No Shared Accounts Progress so far: –No shared admin or test accounts. –Service Accounts: Examples: tape backup, anti-virus management, web server anonymous account Waiver request form –Approval by Policy committee and computer security Requires annual review

Future Shared accounts Terminal servers Home Users