Full Transcript

PC4112/L INFORMATION ASSURANCE AND SECURITY 2 WINDOWS SERVER 2008 Understand the Core Functions of Windows Server 2008 Security Configuration Wizard (SCW) Understand the importance of Security Policies What is Windows Server? Windows Server i...

PC4112/L INFORMATION ASSURANCE AND SECURITY 2 WINDOWS SERVER 2008 Understand the Core Functions of Windows Server 2008 Security Configuration Wizard (SCW) Understand the importance of Security Policies What is Windows Server? Windows Server is a powerful operating system designed by Microsoft to manage, store, and deliver data, applications, and services in a networked environment. It is widely used in businesses, data centers, and cloud environments due to its robust features and scalability. Key core functions of Windows Server 2008 ❖ Server Roles and Services ❖ Security and Compliance ❖ Management and Automation ❖ High Availability and Disaster Recovery ❖ Networking and Remote Access ❖ Server Roles and Services ▪ Active Directory Domain Services (AD DS) ▪ Hyper-V ▪ DNS Server ▪ DHCP Server ▪ File and Print Services ▪ Web Server (IIS) ❖ Security and Compliance ▪ Network Access Protection (NAP) ▪ Read-Only Domain Controller (RODC) ▪ Windows Firewall with Advanced Security ❖ Management and Automation ▪ Server Manager ▪ Windows PowerShell ▪ Group Policy Management ❖ High Availability and Disaster Recovery ▪ Failover Clustering ▪ Windows Server Backup ❖ Networking and Remote Access ▪ Remote Desktop Services (RDS) ▪ Network Policy and Access Services (NPAS) ▪ Active Directory Domain Services (AD DS) AD DS is the backbone of Windows Server environments. It manages the identities and relationships that make up network domains. This includes user accounts, computers, and security policies. Centralizes the management of network resources and provides authentication and authorization services, ensuring that users and devices can securely access resources within the network. Server Roles and Services ▪ Hyper-V is the built-in virtualization platform in Windows Server 2008, allowing administrators to create and manage virtual machines (VMs). Facilitates server consolidation, reduces hardware costs, and improves resource utilization by running multiple virtualized environments on a single physical server. Server Roles and Services ▪ DNS Server DNS (Domain Name System) Server translates human-readable domain names into IP addresses that computers use to locate and communicate with each other. Ensures that users can access network resources and services by typing familiar names rather than numerical IP addresses. Server Roles and Services ▪ DHCP Server The DHCP (Dynamic Host Configuration Protocol) Server automatically assigns IP addresses and other network configuration parameters to devices on the network. Simplifies the management of IP address assignment, reduces configuration errors, and ensures that devices can join and communicate on the network without manual IP configuration. Server Roles and Services ▪ File and Print Services Provides centralized file storage and sharing, as well as network printing services. This role allows administrators to manage file permissions, quotas, and shared printers. Facilitates collaboration by making files and printers easily accessible to authorized users across the network while maintaining control over access and usage. Server Roles and Services ▪ Web Server (IIS) IIS (Internet Information Services) is a flexible and secure web server platform that hosts websites, web applications, and services. Enables organizations to host internal and external websites and applications, supporting a wide range of web technologies, including ASP.NET, PHP, and others. Server Roles and Services ▪ Network Access Protection (NAP) NAP enforces compliance with security policies by ensuring that computers connecting to the network meet specific health requirements (such as having up-to-date antivirus software). Protects the network from potentially vulnerable or compromised devices, ensuring that only compliant devices can access sensitive resources. Security and Compliance ▪ Read-Only Domain Controller (RODC) is a domain controller that hosts a read-only copy of Active Directory. It is designed for deployment in environments where physical security is a concern, such as branch offices. Enhances security by reducing the risk of unauthorized changes to Active Directory data in locations where physical security cannot be guaranteed. Security and Compliance ▪ Windows Firewall with Advanced Security Provides a host-based firewall that helps protect the server from unauthorized network traffic. It supports inbound and outbound rules and integrates with IPsec for network-level encryption. Enhances the security of the server by controlling the traffic that is allowed to enter or exit the server, protecting it from potential threats. Security and Compliance ▪ Server Manager A centralized management console that allows administrators to install, configure, and manage server roles and features. Simplifies server administration by providing a unified interface to manage the server, reducing the time and complexity involved in configuring and maintaining server roles. Management and Automation ▪ Windows PowerShell A powerful scripting language and command-line shell that allows administrators to automate tasks, manage configurations, and perform complex administrative functions. ▪ Group Policy Management Allows administrators to define and enforce security and configuration settings across all computers and users within the network. Management and Automation ▪ Failover Clustering Provides high availability for critical applications and services by grouping multiple servers into a cluster. If one server fails, another takes over without service disruption. ▪ Windows Server Backup A built-in backup solution that allows administrators to perform full, incremental, or differential backups of the server's data. High Availability and Disaster Recovery ▪ Remote Desktop Services (RDS) Allows users to remotely access applications and desktops hosted on Windows Server. RDS supports virtual desktop infrastructure (VDI) and session-based desktops. ▪ Network Policy and Access Services (NPAS) Manages and enforces network access policies for both wired and wireless clients, including VPNs, and provides RADIUS authentication. Networking and Remote Access Security Configuration Wizard (SCW) A tool to reduce the attack surface of a server by creating security policies based on the server’s role. SCW Auditing SCW helps in configuring audit policies that track user activities and system changes. This is critical for identifying unauthorized access or potential security breaches. SCW Firewall SCW allows you to configure Windows Firewall with advanced security settings. It can create firewall rules tailored to the server's role, limiting network access to only necessary ports and services. Security Configuration SCW configures security settings such as user rights, registry permissions, and service startup modes based on predefined security templates, which can be customized according to the server’s specific needs. Security Policies - Security policies control what users and systems can do on the network. * They protect the network from unauthorized access and actions. Security Compliance Manager (SCM) - Is a tool to manage and ensure that security settings meet required standards. * It helps keep servers compliant with security regulations. Groups System Services and Registry - Grouping services and registry settings ensures consistent security configurations. * Consistency helps to prevent vulnerabilities across servers. Windows Security Settings - These settings control various security aspects like firewalls and user access. * They are crucial for protecting the server from threats. Functionality Level - Determines the features available in Active Directory based on the server version. * Higher levels enable more advanced features. Increasing Functional Level - Raising the functional level unlocks newer features in Active Directory. * It allows the use of advanced tools and security options. Using System Mechanisms to Protect Data Utilizing built-in tools and features of Windows Server to safeguard data like BitLocker, provide essential protection against data breaches. Security Applications with AppLocker Executable Rules AppLocker - allows administrators to control which applications and scripts users can run. * This helps to prevent the execution of unauthorized or harmful software. Windows Server Update Services (WSUS) - A system that manages and distributes updates for Windows Server and connected devices. * Keeping the system up-to-date with the latest patches reduces vulnerabilities. Report Viewer - A tool for viewing and managing security reports generated by the system. * Reviewing these reports helps administrators stay informed about the security status of the server. Active Directory - A directory service that manages user accounts, permissions, and security policies across the network. * Centralized management of users and devices enhances security and simplifies administration. Group Policies - allows administrators to define security settings and configurations for users and computers. * enforce consistent security standards across the network. Linking the GPO (Group Policy Objects) - Associating specific Group Policies with different organizational units within Active Directory. * Adjusting security settings to different parts of the organization to ensures that policies are relevant and effective. Local Administrators - group of users who have administrative rights on a local machine or server. * Controlling who has local admin rights prevents unauthorized changes and enhances security. Certificates & Certificate Authority (CA) Certificates Digital certificates are used to verify the identity of users, devices, or services based on a public and private key pair. Certificate Authority (CA) Is a trusted entity responsible for issuing, renewing, and revoking digital certificates. Windows Server 2008 allows to install the Active Directory Certificate Services (AD CS) role to set up a CA, which can issue certificates to users and computers within an organization.

Use Quizgecko on...
Browser
Browser