Leveraging your Active Directory (AD) for Perimeter Defense – Inside and Out (SEC205) Richard Warren Internet and Security Training Specialist SEC205.

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

Microsoft Internet Security and Acceleration (ISA) Server 2004 Technical Overview
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
Defining Network Infrastructure and Security
Module 5: Configuring Access to Internal Resources.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Module 5: Configuring Access for Remote Clients and Networks.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
Chapter 7 HARDENING SERVERS.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
ISA Server Microsoft’s Goals Security is a top priority for Microsoft, and we are committed to helping our customers protect their intellectual.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
1 Integrating ISA Server and Exchange Server. 2 How works.
1 Enabling Secure Internet Access with ISA Server.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Course 201 – Administration, Content Inspection and SSL VPN
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Intranet, Extranet, Firewall. Intranet and Extranet.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
Securing Microsoft® Exchange Server 2010
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Chapter 13 – Network Security
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
SEC303 Assessing and Managing Privacy in the Enterprise JC Cannon Privacy Strategist.
Philadelphia Area SharePoint User Group Building Customer/Partner Extranets Designing a Secure Extranet with Sharepoint 2007 Russ Basiura RJB Technical.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
OFC290 Information Rights Management in Microsoft Office 2003 Lauren Antonoff Group Program Manager.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Edge Protection: A Technical Deep-Dive into Internet Security & Acceleration Server
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
Module 6: Managing Client Access. Overview Implementing Client Access Servers Implementing Client Access Features Implementing Outlook Web Access Introduction.
Selling Strategies Microsoft Internet Security and Acceleration (ISA) Server 2004 Powerful Protection for Microsoft Applications.
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
1 Securing Network Services. 2 How TCP Works Set up connection between port on source host to port on destination host Each connection consists of sequence.
Internet Security and Firewall Design Chapter 32.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Security fundamentals Topic 10 Securing the network perimeter.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Module 10: Windows Firewall and Caching Fundamentals.
Web Services Security Patterns Alex Mackman CM Group Ltd
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
SEC304 Enhancing Exchange, OWA and IIS Security with ISA Server Feature Pack 1 Steve Riley Microsoft Corporation
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Securing the Network Perimeter with ISA Server 2004 Ravi Sankar IT Professional Evangelist Microsoft.
Microsoft ® Internet Security and Acceleration Server 2006 Beta Technical Overview Steve Lamb Information Security Evangelist
Securing Access to Data Using IPsec Josh Jones Cosc352.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Defining Network Infrastructure and Network Security Lesson 8.
Security fundamentals
Module 3: Enabling Access to Internet Resources
Enabling Secure Internet Access with TMG
Securing the Network Perimeter with ISA 2004
Firewalls.
Operationalizing MITS: How do we make this happen?
Designing IIS Security (IIS – Internet Information Service)
Security Insights: Secure Messaging
Presentation transcript:

Leveraging your Active Directory (AD) for Perimeter Defense – Inside and Out (SEC205) Richard Warren Internet and Security Training Specialist SEC205

Agenda Security Issues Today The “Inside” – Good or Bad? Why Active Directory? Internal Access with Integrity The Who and How of External Access When a Web Proxy is not Enough

At Risk 14B devices on the Internet by M remote users by % increase in dynamic Web sites From 2000 to 2003 reported incidents rose from 21,756 to 137,529 Nearly 80 percent of 445 respondents surveyed said the Internet has been a frequent point of attack, up from 57 percent just four years ago 90% detected security breaches 85% detected computer viruses 95% of all breaches avoidable with an alternative configuration Approximately 70 percent of all Web attacks occur at the application layer The Soft Underbelly Security Issues Today 1 Source: Forrester Research 2 Source: Information Week, 26 November Source: Netcraft summary 4 Source: CERT, Source: CSI/FBI Computer Crime and Security Survey 6 Source: Computer Security Institute (CSI) Computer Crime and Security Survey Source: CERT, Source: Gartner Group

Application Layer Attacks Identity Theft Web Site Defacement Unauthorized Access Modification of Data, Logs and Records Theft of Proprietary Information Service Disruption Implications Compliance Basel 2 (EU) Data Protection Act (EU) Gramm Leach Bliley HIPAA (US) The Privacy Act (CA) Sarbanes Oxley (U.S.) U.S. Patriot Litigation File Sharing Piracy HR Issues Shareholder Suits Customer Impact from Security Issues

The “Inside” – Good or Bad?

Attacks from Insiders! Who can you trust? Large % of threats occur from the inside Users surfing inappropriate/malicious web sites Users not logging into the AD Domain (Security Policy) Users searching for web servers with confidential information Disgruntled Employees – Contractors – Office Visitors

Internet Access for your Users Enable users to communicate across the Internet Use of instant messaging over the Internet may reveal confidential informationUse of instant messaging over the Internet may reveal confidential information Users’ access to personal may bypass corproate e- mail protectionUsers’ access to personal may bypass corproate e- mail protection Enable users to access legitimate information on the Internet Users may inadvertently access insecure contentsUsers may inadvertently access insecure contents Difficult configuration may lead to mistakes that threaten securityDifficult configuration may lead to mistakes that threaten security Users may access inappropriate Web sites and contentUsers may access inappropriate Web sites and content Peer-to-peer applications and illegal downloads may expose company to lawsuitsPeer-to-peer applications and illegal downloads may expose company to lawsuits Business Need:Risk to Organization:

Internet Access for your Users Control and monitor users’ Internet access Limited application layer filtering prevents meaningful access controlLimited application layer filtering prevents meaningful access control Logs that are difficult to view may prevent administrators from discovering problemsLogs that are difficult to view may prevent administrators from discovering problems Lacking reporting capabilities prevent management from evaluating use of Internet by employeesLacking reporting capabilities prevent management from evaluating use of Internet by employees Business Need:Risk to Organization:

Why Active Directory

Why Active Directory? Plays a key role in Distributed Security Required for domain logon (authentication) Grants access to resources (authorization) Plays a key role in Identity Management Stores and protects identities

Why Active Directory Plays a key role in Windows manageability Facilitates management of network resources Facilitates delegation of administrative authority Enables centralized policy control Plays a key role in enabling other technologies RRAS, Microsoft Certificate Services, Microsoft Exchange, etc. Tremendously powerful resource – Use and Enforce It!!!

Web Access with Integrity Internal and External

Web Access with Integrity Application Layer Firewalls Inspect Intranet and Incoming External Traffic Monitor & Log Intranet Access by Username!

Web Access with Integrity Application Layer Firewalls (ISA Server 2004) Most firewalls are external! What about the inside threat? Protect Intranet Servers with Intelligent Firewalls Protect Web Servers in DMZ with application protection Not only who but what is being sent to my servers Use Application layer inspection for malicious traffic

Application Layer Content ?????????????????????? A Traditional Firewall’s View Of A Packet Only packet headers are inspected Application layer content appears as “black box” IP Header Source Address, Dest. Address, TTL, Checksum TCP Header Sequence Number Source Port, Destination Port, Checksum Forwarding decisions based on port numbers Legitimate traffic and application layer attacks use identical ports Internet Expected HTTP Traffic Unexpected HTTP Traffic Attacks Non-HTTP Traffic Corporate Network

ISA Server’s View Of A Packet Packet headers and application content are inspected Application Layer Content MSNBC - MSNBC Front Page <link rel="stylesheet" IP Header Source Address, Dest. Address, TTL, Checksum TCP Header Sequence Number Source Port, Destination Port, Checksum Forwarding decisions based on content Only legitimate and allowed traffic is processed Internet Expected HTTP Traffic Unexpected HTTP Traffic Attacks Non-HTTP Traffic Corporate Network

Integrity = Application Layer Security Most of today’s attacks are directed against applications Examples: Mail clients (worms, Trojan horse attacks), Web browsers (malicious Java applets) Applications encapsulate traffic in HTTP traffic Examples: Peer-to-peer, instant messaging Traditional firewalls cannot determine what traffic is sent or received Dynamic port assignments require too many incoming ports to be opened Examples: FTP, RPC

Web Access with Integrity Stop unauthenticated access to your Intranet Portals Web Publishing Intranet Portal with ISA Server 2004 Force Authentication via Active Directory Keep out anonymous connections without load on Web Server Enforce users logon to Domain Ensure group policy and other security measures are enforced

Web Access with Integrity Incoming Access – Connect to Secure Point of Access Protect Web Servers in DMZ or Internal Network ISA Server Web Publish (Reverse Proxy) Inspect Incoming Traffic via Web Filters HTTP Inspection Monitor for malicious web traffic

Web Access with Integrity Protect Exchange (Messaging) Servers Outlook Web Access Outlook SSL Connections – Outlook 2003/Exchange 2003 Outlook Mobile Access/ Active Sync Full RPC Filtering for Exchange Only traffic to Exchange Servers

Web Server Attacks Password Guessing Web Access with Integrity Authentication Unauthorized requests are blocked before they reach the Exchange server Enforces all OWA authentication methods at the firewall Provide forms-based authentication at the firewall before reaching OWA Inspection Invalid HTTP requests or requests for non-OWA content are blocked Inspection of SSL traffic before it reaches Exchange server* Confidentiality Ensures encryption of traffic over the Internet at the firewall Can prevent the downloading of attachments to client computers separate from intranet users OWA Traffic SSL Tunnel Inspection Authentication Internet Exchange Server OWA Front End *Note: Full ISA inspection is not available if GZip compression is used by OWA.

Authentication Framework Multi-source authentication Firewall client authentication (Web Proxy) Transparent user authentication Application transparent, Protocol independent Kerberos/NTLM Web proxy authentication Proxy auth, Reverse proxy auth, Pass through auth, SSL bridging Basic, digest, NTLM, Kerberos, Certificates RADIUS authentication, SecurID authentication CRL support Extensible authentication/authorization framework

Web Publishing with ISA Server Using Active Directory Integrated Web Access Demo

The Who and How of External Access

Who? – External Access Who? Who is getting out of your network? Vendors – Visitors – Consultants And what are they doing? Peer to Peer File Sharing – Instant Messaging File Transfer

How? – External Access Leverage Active Directory: Integrated Web Proxy with ISA Server 2004 Ensure only authorized users have external access Base external access via AD groups Log access based on USER NAME and not IP Address Know your exit points to external networks How many DMZ’s? Departmental external access? Force all access through secure Web Proxies

How? – External Access Provides superior application-layer protection for corporate clients Enforces corporate policies Limits access to allowed sites Limits access to allowed protocols Provides for user and group based rules Lets rules apply based on schedule Partners provide easy extensibility Virus checking Web access blocking based on database of problematic sites

How? – External Access HTTP Filtering Flexible control over allowed content

Web Proxy Access with ISA Server Using Active Directory Integrated Web Proxy Demo

When a Web Proxy is Not Enough?

Web Proxy – Intelligent? Port 80 Outbound – and away we go! Peer to Peer Applications search for this Instant Messaging uses Port 80 Http How do you stop it? Web & Application Filters Search for Signatures of these applications ISA Server has built-in web/application filters Block the apps even in HTTP traffic Prevent tunneling of other protocols in http

When a Web Proxy is Not Enough Inspect HTTP Traffic with ISA 2004 Don’t just cache Inspect inbound web traffic Secure what leaves your network Know what leaves and who sent it!! Force all Users to logon to the Domain for External Access Log users by name

Leveraging Active Directory for Perimeter Defense Data and Resources Application Defenses Host Defenses Network Defenses Perimeter Defenses Perimeter Defense Protect Intranet Servers Lock Down Web Access Active Directory Integration Application Layer firewalls are becoming increasingly more important HTTP Tunneling SSL encryption Anonymous connections

Community Resources Most Valuable Professional (MVP) Newsgroups Converse online with Microsoft Newsgroups, including Worldwide /newsgroups/en-us/default.aspx /newsgroups/en-us/default.aspx User Groups - Meet and learn with your peers /default.mspx /default.mspx

Microsoft Learning Resources Come and talk to Microsoft Learning to find out more about developing your skills, you can kind us in the ‘Ask the Experts’ area Special offers on Microsoft Certification from Microsoft Learning Click here to access free Microsoft Learning Assessments and FREE elearning for Microsoft Visual Studio 2005 and Microsoft SQL Server 2005 with free Assessments and E-Learning

© 2006 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.