Title: Overview
1Module 3
Windows Server 2008 Branch Office Scenario
2Clinic Outline
- Branch Office Server Deployment and
Administration - Branch Office Security
3Branch Office Server Deployment and Administration
4Domain Name System (DNS) Server Role
- Background zone loading
- Read-only domain controller support
- Global Names zone
- DNS client changes
- Link-Local multicast name resolution (LLMNR)
- Domain controller location
5AD Domain Services
- New AD MMC Snap-In Features
- Find Command
- New Options for Unattended Installs
6Restartable AD Domain Services (AD DS)
- 3 Possible States
- AD DS Started
- AD DS Stopped
- Active Directory Restore Mode
7Demonstration Branch Office Server Deployment
and Administration
- AD DS Installation Wizard
- Stopping and restarting AD DS
8AD Domain Services Auditing
- What changes have been made to AD DS auditing?
Auditpol /set /subcategory??????
/Successenable
9AD Domain Services Backup and Recovery
10Improved Server Deployment (Windows Server
Virtualization)
- 64-bit Next Generation technology
- Addresses the following challenges
- Server Consolidation
- Development and Testing
- Business Continuity/Disaster Recovery
- Server Core as a host system
11File Services
- Server Message Block (SMB) 2.0
- DFS
- Names Spaces
- Replication
- SYSVOL
12Next Generation TCP/IP Stack
- Receive Windows Auto-Tuning
- Compound TCP
- Throughput Optimization in High-Loss Environments
- Neighbor Unreachability Detection
- Changes in Dead Gateway Detection
- Changes in PTMU Black Hole Router Detection
- Routing Compartments
- ESTATS Support
- Network Diagnostics Framework Support
- New Packet Filtering Model with Windows Filtering
Platform
13Read-Only Domain Controller (RODC)
- New Functionality
- AD Database
- Unidirectional Replication
- Credential Caching
- Password Replication Policy
- Administrator Role Separation
- Read-Only DNS
RODC
- Requirements/Special Considerations
14Active Directory ????
Read-only DC, RODC
????????
????????
15Implementation/Usage Scenarios
- Maintain physical security of servers at the
branch office
- Maintain physical security of data at the branch
office
- Provide secure IP-based communications with the
branch office
- Control which computers can communicate on the
branch office network
16Recommendations
- Deploy a Read-Only Domain Controller at the
branch office
- Implement a Password Replication Policy
- Implement administrator role separation
- Implement BitLocker Drive Encryption do not
require a PIN or USB device if no local admin
- Implement Network Access Protection
- Use IPSec for network communications
17Module 4
Security and Policy Enforcement in Windows Server
2008
18Overview
- Methods of Security and Policy Enforcement
- Network Location Awareness
- Network Access Protection
- Windows Firewall with Advanced Security (WFAS)
- Internet Protocol Security (IPSec)
- Windows Server Hardening
- Server and Domain Isolation
- Active Directory Domain Services Auditing
- Read-Only Domain Controller (RODC)
- BitLocker Drive Encryption
- Removable Device Installation Control
- Enterprise PKI
19Technical Background
- Windows Firewall with Advanced Security
- Internet Security Protocol (IPSec)
- Active Directory Domain Services Auditing
- Read-Only Domain Controller (RODC)
- BitLocker Drive Encryption
20Windows Firewall with Advanced Security
21Demonstration Windows Firewall with Advanced
Security
- Creating Inbound and Outbound Rules
- Creating a Firewall Rule Limiting a Service
22IPSec
- Integrated with WFAS
- IPSec Improvements
- Simplified IPSec Policy Configuration
- Client-to-DC IPSec Protection
- Improved Load Balancing and Clustering Server
Support - Improved IPSec Authentication
- Integration with NAP
- Multiple Authentication Methods
- New Cryptographic Support
- Integrated IPv4 and IPv6 Support
- Extended Events and Performance Monitor Counters
- Network Diagnostics Framework Support
23BitLocker Drive Encryption (BDE)
- Data Protection
- Drive Encryption
- Integrity Checking
- BDE Hardware and Software Requirements
24Implementation/Usage Scenarios
- Improve Network Communications Security
25Recommendations
- Carefully test and plan all security policies
- Implement Network Access Protection
- Use Windows Firewall and Advanced Security to
implement IPSec
- Deploy Read-Only Domain Controllers, where
appropriate
- Implement BitLocker Drive Encryption
- Take advantage of PKI improvements
26Network Access Protection in Windows Server 2008
27Overview
- Network Access Protection
28NAP Infrastructure
29NAP Enforcement Client
30Demonstration Network Access Protection
- Create a NAP Policy
- Using the MMC to Create NAP Configuration
settings - Create a new RADIUS Client
- Create a new System Health Validator for Windows
Vista and Windows XP SP2
31Implementation/Usage Scenarios
- Checking the Health and Status of Roaming Laptops
- Ensuring the Health of Corporate Desktops
- Determining the Health of Visiting Laptops
- Verify the Compliance of Home Computers
32Recommendations
- When using IPSec employ ESP with encryption
- Carefully test and verify all IPSec Policies
- Consider Using Domain Isolation
- Use Quality of Service to improve bandwidth
- Plan to Prioritize traffic on the network
- Apply Network Access Protection to secure client
computers