Windows NT ® Security Management: Extending Windows NT 5.0 Security Management Tools, Part 2 Praerit Garg Program Manager Windows NT Security Microsoft.

Slides:



Advertisements
Similar presentations
Establishing an OU Hierarchy for Managing and Securing Clients Base design on business and IT needs Split hierarchy Separate user and computer OUs Simplifies.
Advertisements

Guide to MCSE , Enhanced 1 Activity 14-1: Browsing Security Templates Objective: To become familiar with built-in security templates Start  Run.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 7: Troubleshoot Security Settings and Local Security.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Understanding Group Policy on Windows Server 2003.
Module 5: Creating and Configuring Group Policy
Khan Rashid Lesson 11-The Best Policy: Managing Computers and Users Through Group Policy.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 14: Windows Server 2003 Security Features.
Hands-On Microsoft Windows Server 2003 Administration Chapter 4 Managing Group Policy.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
12.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
MIS Chapter 91 Ch. 9 – Implement and Use Group Policy MIS 431 – created Spring 2006.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
Chapter 4 Introduction to Active Directory and Account Management
7.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 7: Introducing Group Accounts.
Network+ Guide to Networks, Fourth Edition Chapter 8 Network Operating Systems and Windows Server 2003-Based Networking.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Module 2: Planning to Install SQL Server. Overview Hardware Installation Considerations SQL Server 2000 Editions Software Installation Considerations.
Module 8: Implementing Administrative Templates and Audit Policy.
11 SYSTEMS ADMINISTRATION AND TERMINAL SERVICES Chapter 12.
70-270: MCSE Guide to Microsoft Windows XP Professional Chapter 5: Users, Groups, Profiles, and Policies.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
September 18, 2002 Introduction to Windows 2000 Server Components Ryan Larson David Greer.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
Hands-On Microsoft Windows Server 2008
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Chapter 6: Windows Servers
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
Integrating LDAP into Check Point Secure Virtual Network Yasushi Kono (ComputerLinks Germany)
Module 14: Configuring Server Security Compliance
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Two Installing and Configuring Exchange Server 2003.
Lesson 17-Windows 2000/Windows 2003 Server Security Issues.
Understanding Group Policy James Michael Stewart CISSP, TICSA, CIW SA, CCNA, MCSE NT & W2K, iNet+
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Introduction to Microsoft Management Console (MMC) MMC is a common console framework for management applications. MMC provides a common environment for.
Active Directory Harikrishnan V G 18 March Presentation titlePage 2 Agenda ► Introduction – Active Directory ► Directory Service ► Benefits of Active.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Planning a Group Policy Management and Implementation Strategy Lesson 10.
ADM320 Managing Group Policy BJ Whalen Program Manager Windows Server Microsoft Corporation.
GPO - WINDOWS SERVER AGENDA: Introduction Group Policy Overview Types of Group Policies/Objects Associated Technologies How to implement.
4. Managing the Desktop Thomas Lee Chief Technologist – QA plc.
NT4 SP4 Security Jack Schmidt - Fermilab
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Chapter 10 Chapter 10: Managing the Distributed File System, Disk Quotas, and Software Installation.
Active Directory Group Policy. Group Policy Overview  Successor to NT policies Much more flexible  Only applies to 2000 workstations Use old style policies.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 11: Group Policy for Corporate Policy.
Module 5: Creating and Configuring Group Policies.
Module 7: Implementing Security Using Group Policy.
Administering Microsoft Windows Server 2003 Chapter 2.
Week 4 Objectives Overview of Group Policy Group Policy Processing Implementing a Central Store for Administrative Templates.
Module 10: Implementing Administrative Templates and Audit Policy.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Module 6 Creating and Configuring Group Policy. Module Overview Overview of Group Policy Configuring the Scope of Group Policy Objects Evaluating the.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Windows 2003 Architecture, Active Directory & DNS Lecture # 3 Hassan Shuja 02/14/2006.
GROUP POLICY. Group Policy is a hierarchical infrastructure which allows systems administrators to configure computer and user settings from a central.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Managing Servers Lesson 10. Skills Matrix Technology SkillObjective DomainObjective # Using Remote DesktopPlan server management strategies 2.1 Delegating.
Unit 9 ITT TECHNICAL INSTITUTE NT1330 Client-Server Networking II Date: 2/17/2016 Instructor: Williams Obinkyereh.
1.1 Microsoft® Windows® 2003 Server Group Policy Management Prof. Abdul Hameed.
Administering Windows Server 2012 Question Answer.
Security Templates Lecture 7.
Presentation transcript:

Windows NT ® Security Management: Extending Windows NT 5.0 Security Management Tools, Part 2 Praerit Garg Program Manager Windows NT Security Microsoft Corporation

Today’s Agenda  What is Security Configuration Tool Set ?  What problems does it solve?  As a developer, how can you leverage this framework?  Finally, some guidelines

Customer Questions How do we easily…  Implement security recommendations?  Duplicate settings to every new system added?  Track security measures on a regular basis?  Enforce similar security measures across large number of systems in the enterprise?

Security Configuration Tool Set  Security Configuration Editor Define the security configurations Define the security configurations Predefined configurations included Predefined configurations included  Security Configuration Manager Apply configurations and analyze Apply configurations and analyze  Group Policy Editor Security Extension Propagate configurations to multiple systems Propagate configurations to multiple systems  SecEdit.exe - command line tool

Security Configuration Editor  Define Security Configurations Edit and Save to configurations files Edit and Save to configurations files

A Security Configuration  Covers various security areas Account policies - password, account lockout and kerberos Account policies - password, account lockout and kerberos Local policies - auditing, user rights… Local policies - auditing, user rights… Restricted groups - Administrators, Power Users… Restricted groups - Administrators, Power Users… Registry and File System - object security descriptors Registry and File System - object security descriptors Services - startup mode and security descriptors Services - startup mode and security descriptors

Security Configuration Manager  Analyze current configuration Compare to stored configuration Compare to stored configuration Reconfigure to fix problems Reconfigure to fix problems  Single machine only  Database driven  Import configurations Multiple configurations Multiple configurations Apply/Edit stored configurations Apply/Edit stored configurations

Group Policy Editor  Hierarchical set of group policy objects Domain Policy Objects (GPO's) Domain Policy Objects (GPO's) Organizational unit Policy Objects (GPO's) Organizational unit Policy Objects (GPO's)  Computers in the same OU have the same security policy settings DCs, desktops, application servers DCs, desktops, application servers

Group Policy Editor Security extension  Computer settings, security settings Define or import a security configuration as part of Group Policy object Define or import a security configuration as part of Group Policy object  Applied as part of Group Policy enforcement in the enterprise Policy from multiple scopes accumulated Policy from multiple scopes accumulated

Demonstration  Editing configurations with Security Configuration Editor  Applying configurations and performing analysis with Security Configuration Manager  Configuring security policies using Group Policy Security Settings Extension

Answer To Problem #1  How do we easily implement security recommendations? Use the provided secure configurations Use the provided secure configurations Customize them for your environment Customize them for your environment E.g., new name for admin account E.g., new name for admin account Import configuration to system database and select “Configure” Import configuration to system database and select “Configure”

Answer To Problem #2  How do we easily duplicate security configuration? “Export” configuration from the system of choice and save it “Export” configuration from the system of choice and save it Copy the configuration to a share Copy the configuration to a share Apply the configuration to large number of machines Apply the configuration to large number of machines Manually Manually Using Systems Management Server Using Systems Management Server Group Policy… Group Policy…

Answer To Problem #3  How do I track security on regular basis? Analyze using the Security Configuration Manager Analyze using the Security Configuration Manager Reconfigure to fix deviations Reconfigure to fix deviations Edit to implement new settings Edit to implement new settings Systems Management Server + Security Configuration Manager Systems Management Server + Security Configuration Manager secedit.exe to collect analysis via Systems Management Server secedit.exe to collect analysis via Systems Management Server Manager to locate/fix problems Manager to locate/fix problems

Answer To Problem #4  How do I enforce similar security measures across large number of systems in the enterprise Use Group Policy to define a configuration at a scope Use Group Policy to define a configuration at a scope Propagated to all systems in that scope Propagated to all systems in that scope Use Systems Management Server to apply configurations using “secedit.exe” command line Use Systems Management Server to apply configurations using “secedit.exe” command line

How Does This All Work?

Tool Set Architecture  Client/server based Server - scesrv.exe Server - scesrv.exe Client Interface - scecli.dll Client Interface - scecli.dll  Clients Security Configuration Editor Security Configuration Editor Security Configuration Manager Security Configuration Manager Security Extension to GPE Security Extension to GPE Winlogon Security Policy GP Extension Winlogon Security Policy GP Extension NT SETUP, Setup APIs and DC Promotion NT SETUP, Setup APIs and DC Promotion LSA Downlevel Policies Filter LSA Downlevel Policies Filter

Engine Server (scesrv.exe)  Configure System  Analyze System  Persist state in database Inspectiondatabase Engine Client (scecli.dll)  Communicate with Server  Edit Configuration Files Configurationfiles Core Infrastructure

Configurationfiles Engine Client (scecli.dll)  Communicate with Server  Edit Configuration Files Security Configuration Editor Security Settings Extension to Group Policy Editor Working With Configuration Files

Engine Server (scesrv.exe) Inspectiondatabase Engine Client (scecli.dll)  NT Setup  DC Promotion  Setup APIs Defaultconfiguration Winlogon Security GP Ext. Group Policies Working With OS

Engine Client (scecli.dll) LSA DC? YES Backward Compatibility Engine Server (scesrv.exe) InspectiondatabaseNO

Enterprise Policy Enforcement  Group Policy enforced via ZAW framework Client pulls policies and applies them Client pulls policies and applies them Security policies included Security policies included Integrity protected, low network traffic Integrity protected, low network traffic

How Can This Be Extended To Support Application Or Service Specific Security?

An Infrastructure To Build On…  Problems Security is very broad Security is very broad Customer configurations and concerns vary Customer configurations and concerns vary The system is ever improving and growing The system is ever improving and growing  Solution - service attachment model Provide an extensibility framework Provide an extensibility framework Fit security of your services Fit security of your services You can build custom solutions You can build custom solutions

Engine Server (scesrv.exe)  Configure System  Analyze System  Persist state in database Engine Client (scecli.dll)  Communicate with Server  Edit Configuration Files Attachmentengines Extension snap-ins for attachments Extension Framework

Attachment Model  Two pieces to implement Attachment engine DLL Attachment engine DLL MMC extension snap-in DLL MMC extension snap-in DLL  Attachment engine A DLL which implements well defined interfaces A DLL which implements well defined interfaces Registers at install time Registers at install time Interfaces invoked by SCTS during configuration and inspection Interfaces invoked by SCTS during configuration and inspection

Core engine Snap-inExtensionsnap-insAttachmentengines Attachment Model  MMC extension snap-in Populated under individual templates Populated under individual templates Populated under inspection for analysis Populated under inspection for analysis  Well defined interfaces provided No direct communication with templates or database No direct communication with templates or database

Win32 ® Helper APIs - sddl.h  ConvertSecurityDescriptorTo StringSecurityDescriptor Converts a self relative security descriptor into a string representation Converts a self relative security descriptor into a string representation  ConvertStringSecurityDescriptorTo SecurityDescriptor Converts a string security descriptor to a self relative binary form Converts a string security descriptor to a self relative binary form

Data Structures And Functions  Callback structure Context handle Context handle PFSCE_QUERY_INFO callback PFSCE_QUERY_INFO callback PFSCE_SET_INFO callback PFSCE_SET_INFO callback PFSCE_FREE_INFO callback PFSCE_FREE_INFO callback PFSCE_LOG_INFO callback PFSCE_LOG_INFO callback  Configuration structure Modified configuration information Modified configuration information

Attachment Interfaces SCESTATUSSceSvcAttachmentConfig( IN PSCESVC_CALLBACK_INFO pSceCbInfo); SCESTATUS SceSvcAttachmentAnalyze( IN PSCESVC_CALLBACK_INFO pSceCbInfo ); SCESTATUS SceSvcAttachmentUpdate( IN PSCESVC_CALLBACK_INFO pSceCbInfo, IN PSCESVC_CONFIGURATION_INFO ServiceInfo );

Attachment Interface 1  SceSvcAttachmentConfig Called during Called during SCM “Configure” SCM “Configure” GP “Refresh Policy” GP “Refresh Policy”  Configure attachment specific security information  Use callback functions  Code sample

Attachment Interface 2  SceSvcAttachmentAnalyze Called during SCM “Analyze” Called during SCM “Analyze”  Inspect attachment specific security settings  Use callback functions  Code sample

Attachment Interface 3  SceSvcAttachmentUpdate Called during Called during SCE Save SCE Save SCM Save SCM Save  To support in place editing of Configurations Configurations Database configuration Database configuration  Code sample

Securityconfigurationeditorsnap-inAttachmentextensionsnap-in IDataObjectClipboardFormat Extension Snap-In  Implement required MMC Interfaces for an extension snap-in Register as extension to security configuration editor Register as extension to security configuration editor  Additionally, implement another interface Use SeCEdit provided interface as required Use SeCEdit provided interface as required

Supplied COM Interface  ISceSvcAttachmentData Provided by SCTS Snap-ins Provided by SCTS Snap-ins Call Initialize() to setup context Call Initialize() to setup context Call GetData() to get Attachment specific data Call GetData() to get Attachment specific data Call FreeBuffer() to release memory Call FreeBuffer() to release memory Call FreeHandle() to release context Call FreeHandle() to release context  Code sample

COM Interface To Implement  ISceSvcAttachment PersistInfo Implemented by Extension snapin Implemented by Extension snapin SCTS snapins call SCTS snapins call IsDirty() to check user edits in the extension IsDirty() to check user edits in the extension Save() to get the data that needs to be saved Save() to get the data that needs to be saved FreeBuffer() to let extension memory it allocated FreeBuffer() to let extension memory it allocated  Code sample

And Finally…

If You Are A Developer…  Think SECURE!!  Evaluate your registry keys, files Do you secure them? Do you secure them? Are they security sensitive? Are they security sensitive?  Plug in security attachments for your applications and services Build an engine attachment Build an engine attachment Build a MMC extension snap-in Build a MMC extension snap-in  Use Setup APIs to setup securely

If You Are A Tester…  Think SECURE!!  Stop running your tests under administrator account Use a normal user account Use a normal user account  Test your components on secure systems Use predefined configurations Use predefined configurations Use the Editor to build custom configurations if needed Use the Editor to build custom configurations if needed

Availability  Windows NT ® 4.0 Service Pack 4 Security Configuration Editor Security Configuration Editor With built-in analysis tool With built-in analysis tool No Group Policy support No Group Policy support Use secedit.exe with Systems Management Server Use secedit.exe with Systems Management Server  Windows NT 5.0 Complete tool set Complete tool set  Use Service Pack release today! Provide us feedback to make it more useful… Provide us feedback to make it more useful…

Call To Action  Use Security Configuration Editor Define your own or customize existing configurations Define your own or customize existing configurations  Use Group Policy Security Extension Enforce security on large number of systems Enforce security on large number of systems  Use Security Configuration Manager Track, analyze and reconfigure system security Track, analyze and reconfigure system security

For More Information…  White papers Windows NT Security Configuration Tool Set Windows NT Security Configuration Tool Set Guide to Securing Windows NT Installations Guide to Securing Windows NT Installations Group Policy Group Policy  Windows NT 5.0 Beta2 walkthroughs  Microsoft Security Advisor