SlideShare a Scribd company logo
Microsoft®
Official Course
Module 12
Securing Windows Servers by
Using Group Policy Objects
Module Overview
Security Overview for Windows Operating Systems
Configuring Security Settings
Restricting Software
• Configuring Windows Firewall with Advanced
Security
Lesson 1: Security Overview for Windows
Operating Systems
Discussion: Identifying Security Risks and Costs
Applying Defense-In-Depth to Increase Security
• Best Practices for Increasing Security
Discussion: Identifying Security Risks and Costs
• What are some of security risks in Windows-based
networks?
10 minutes
Applying Defense-In-Depth to Increase Security
Defense-in-depth uses a layered approach to security
• Reduces an attacker’s chance of success
• Increases an attacker’s risk of detection
Policies, procedures,
and awareness
Security documents, user education
Physical security Guards, locks, tracking devices
Perimeter Firewalls, network access quarantine control
Networks Network segments, IPsec, Reverse proxy
servers
Host Hardening, authentication, update
management
Application Application hardening, antivirus
Data ACLs, EFS, BitLocker,
backup/restore procedures
Best Practices for Increasing Security
Some best practices for increasing security are:
• Apply all available security updates quickly
• Follow the principle of least privilege
• Use separate administrative accounts
• Restrict administrator console sign-in
• Restrict physical access
Lesson 2: Configuring Security Settings
Configuring Security Templates
Configuring User Rights
Configuring Security Options
Configuring User Account Control
Configuring Security Auditing
Configuring Restricted Groups
Configuring Account Policy Settings
• What Is Security Compliance Manager?
Configuring Security Templates
Security Templates categories:
• Account policies
• Local policies
• Event log
• Restricted groups
• System services
• Registry
• File system
Security templates are distributed by using:
• The secedit command-line tool
• The Security Templates snap-in
• The Security Configuration and Analysis Wizard
• Group Policy
• The Security Compliance Manager
Configuring User Rights
User Rights Types:
• Privileges
• Logon rights
Examples of common user rights:
• Add workstations to domain
• Allow log on locally
• Allow log on through Remote Desktop Services
• Back up files and directories
• Change the system time
• Force shutdown from a remote computer
• Shut down the system
Configuring Security Options
Security options settings:
• Administrator and Guest account names
• Access to CD/DVD drives
• Digital data signatures
• Driver installation behavior
• Logon prompts
• UAC
Examples:
• Prompt user to change password before expiration
• Do not display last user name
• Specify a message to be displayed when users are
logging on
• Rename administrator account
Configuring Restricted Groups
Group Policy can control group membership:
• For any group on a domain-joined computer, by applying a
GPO to the OU that contains the computer account
• For any group in AD DS, by applying a GPO to the
domain controller’s OU
Be aware of problems that might arise from using policies
for domain-based groups, and refer to the student
handbook for more information
Configuring Account Policy Settings
Account policies reduce the threat of brute force
guessing of account passwords
Policies Default settings
Password • Controls complexity and lifetime of passwords
• Max password age: 42 days
• Min password age: 1 day
• Min password length: 7 characters
• Complex password: enabled
• Store password using reversible encryption: disabled
Account
lockout
• Controls how many incorrect attempts can be made
• Lockout duration: not defined
• Lockout threshold: 0 invalid logon attempts
• Reset account lockout after: not defined
Kerberos • Subset of the attributes of domain security policy
• Can only be applied at the domain level
What Is Security Compliance Manager?
SCM is a free tool from Microsoft that helps you secure
local, remote, or virtualized computers. It features:
• Baselines
• Security guides
• Support for standalone computers
• Support for import GPO backups
You can use SCM to:
• Validate that computers are configured for compliance
• Reduce the work involved in configuring computers for
compliance
• Move, compare and merge settings across two independent
environments
• Formulate and update your security policies
Lab A: Increasing Security for Server Resources
Exercise 1: Using Group Policy to Secure Member
Servers
Exercise 2: Auditing File System Access
• Exercise 3: Auditing Domain Logons
Logon Information
Virtual machines 20410D LON DC1
‑ ‑
20410D LON SVR1
‑ ‑
20410D LON SVR2
‑ ‑
20410D LON CL1
‑ ‑
User name AdatumAdministrator
Password Pa$$w0rd
Estimated Time: 50 minutes
Lab Review
What happens if you configure the Computer
Administrators group, but not the Domain Admins
group, to be a member of the Local Administrators
group on all of a domain’s computers?
Why do you need to restrict local logon to some
computers?
What happens when an unauthorized user tries to
access a folder that has auditing enabled for both
successful and unsuccessful access attempts?
• What happens when you configure auditing for
domain logons for both successful and unsuccessful
logon attempts?
Lesson 3: Restricting Software
What Are Software Restriction Policies?
What Is AppLocker?
AppLocker Rules
• Demonstration: Creating AppLocker Rules
What Are Software Restriction Policies?
• SRPs allow administrators to identify which apps are
allowed to run on client computers
• SRPs can be based on the following:
• Hash
• Certificate
• Path
• Zone
• SRPs are applied through Group Policy
What Is AppLocker?
AppLocker applies Application Control Policies in
Windows Server 2012 and Windows 8
AppLocker contains capabilities and extensions that:
• Reduce administrative overhead
• Help administrators control how users access and use files:
Benefits of AppLocker:
• Controls how users can access and run all types of apps
• Allows the definition of rules based on a wide variety of variables
• Provides for importing and exporting entire AppLocker policies
• .exe files
• scripts
• DLLs
• Windows Installer files
• Packaged apps
AppLocker Rules
AppLocker defines rules based on file attributes such as:
• Publisher name
• Product name
• File name
• File version
Rule actions
• Allow or Deny conditions
• Enforce or Audit Only policies
Demonstration: Creating AppLocker Rules
In this demonstration, you will see how to:
• Create a GPO to enforce the default AppLocker
Executable rules
• Apply the GPO to the domain
• Test the AppLocker rule
Lesson 4: Configuring Windows Firewall with
Advanced Security
What Is Windows Firewall with Advanced Security?
Discussion: Why Is a Host-Based Firewall
Important?
Firewall Profiles
Connection Security Rules
Deploying Firewall Rules
• Demonstration: Implementing Secured Network
Traffic with Windows Firewall
What Is Windows Firewall with Advanced Security?
Windows Firewall is a stateful, host-based firewall that
allows or blocks network traffic according to its configuration
What Is Windows Firewall with Advanced Security?
The benefits of Windows Firewall include that it:
• Supports filtering for both incoming and outgoing traffic
• Integrates firewall filtering and IPsec protection settings
• Enables you to configure rules to control network traffic
• Provides network location-aware profiles
• Enables you to import or export policies
Discussion: Why Is a Host-Based Firewall Important?
• Why is it important to use a host-based firewall
such as Windows Firewall with Advanced Security?
10 minutes
Firewall Profiles
• Firewall profiles are a set of configuration settings
that apply to a particular network type
• The firewall profiles are:
• Domain
• Public
• Private
• Windows Server 2012 includes the ability to have
multiple active firewall profiles
Connection Security Rules
Connection security rules:
• Authenticate two computers before they begin
communications
• Secure information being sent between two computers
• Use key exchange, authentication, data integrity, and data
encryption (optionally)
How firewall rules and connection rules are related:
• Firewall rules allow traffic through, but do not secure that
traffic
• Connection security rules can secure the traffic, but only if a
firewall rule was previously configured
Deploying Firewall Rules
You can deploy Windows Firewall rules:
• Manually. Used during testing, troubleshooting, or for
individual computers.
• By using Group Policy. The preferred way. Create and test
the rules, and then deploy them to a large number of
computers.
• By exporting and importing. Uses Windows Firewall with
Advanced Security.
When you import rules, they replace all current rules.
Always test firewall rules in an
isolated, nonproduction
environment before you deploy
them in production.
Demonstration: Implementing Secured Network
Traffic with Windows Firewall
In this demonstration, you will see how to:
• Check to see if ICMP v4 is blocked
• Enable ICMP v4 from LON-CL2 to LON-SVR2
• Create a connection security rule so that traffic is
authenticated to the destination host
• Validate ICMP v4 after the connection security rule
is in place
Lab B: Configuring AppLocker and Windows Firewall
Exercise 1: Configuring AppLocker Policies
• Exercise 2: Configuring Windows Firewall
Logon Information
Virtual machines
20410D LON DC1
‑ ‑
20410D LON SVR1
‑ ‑
20410D LON CL1
‑ ‑
User name Adatum
Administrator
Estimated Time: 60 minutes
Lab Review
You configured an AppLocker rule that prevents
users from running software in a specified file path.
How can you prevent users from moving the folder
containing the software so that they can circumvent
the rule and still run it?
• You want to introduce a new application that
needs to use specific ports. What information do
you need to configure Windows Firewall with
Advanced Security, and from what source can you
get it?
Module Review and Takeaways
Review Questions
Best Practices
• Common Issues and Troubleshooting Tips
• Tools

More Related Content

PPTX
Microsoft Offical Course 20410C_12
PPTX
Securing Windows with Group Policy
PPTX
Microsoft Windows 7 Enhanced Security And Control
PDF
3 windowssecurity
PPT
Understanding Group Policy Object Windows Server
PPTX
Useful Group Policy Concepts
PDF
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
PPTX
Security Management | System Administration
Microsoft Offical Course 20410C_12
Securing Windows with Group Policy
Microsoft Windows 7 Enhanced Security And Control
3 windowssecurity
Understanding Group Policy Object Windows Server
Useful Group Policy Concepts
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
Security Management | System Administration

Similar to 12 Securing Windows Servers by Using Group Policy Objects.pptx (20)

PDF
CSF18 - Moving from Reactive to Proactive Security - Sami Laiho
DOCX
report on network security fundamentals
PPT
Configuring Windows Using Group Policy.ppt
PDF
System Hardening Recommendations_FINAL
PPTX
Unit4 NMA working with user accounts WINDOWS SERVER 2008
PDF
CNIT 123 Ch 8: OS Vulnerabilities
PPTX
A.Group Policy and group policy obj.pptx
PDF
Presentation gggffggggg.pdf
PPT
Windows server2008
PPTX
Domain wide organisation policy
PPT
70 640 Lesson08 Ppt 041009
PDF
CNIT 123: 8: Desktop and Server OS Vulnerabilites
PDF
CNIT 123 8: Desktop and Server OS Vulnerabilities
PPT
0828 Windows Server 2008 新安全功能探討
PPT
Windows network
PPTX
Group policy Best Practices
PPT
Windows Security in Operating System
PDF
Tips to Remediate your Vulnerability Management Program
PPT
Securing Windows web servers
PPT
0505 Windows Server 2008 一日精華營 Part II
CSF18 - Moving from Reactive to Proactive Security - Sami Laiho
report on network security fundamentals
Configuring Windows Using Group Policy.ppt
System Hardening Recommendations_FINAL
Unit4 NMA working with user accounts WINDOWS SERVER 2008
CNIT 123 Ch 8: OS Vulnerabilities
A.Group Policy and group policy obj.pptx
Presentation gggffggggg.pdf
Windows server2008
Domain wide organisation policy
70 640 Lesson08 Ppt 041009
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123 8: Desktop and Server OS Vulnerabilities
0828 Windows Server 2008 新安全功能探討
Windows network
Group policy Best Practices
Windows Security in Operating System
Tips to Remediate your Vulnerability Management Program
Securing Windows web servers
0505 Windows Server 2008 一日精華營 Part II
Ad

More from HassanAhmadAbubakar1 (20)

PPTX
Deploying and managing windows server 2012.pptx
PPTX
Installing and configuring windows server 2012.pptx
PPTX
Module 2- introduction to Active Directory Domain Servics.pptx
PPTX
Module 3- Managing Active Directory Domain Service Objects .pptx
PPTX
07 Implementing DNS Cyber security Baze University .pptx
PPTX
10 Implementing File and Print Services.pptx
PPTX
Introduction to Data Science unit 5 pptx
PPTX
PROJECT REPORT FORMAT BCA final semester pptx
PPTX
Mohammed Said Project Defence PowerPoint presentation
PPTX
Serological evidence of IBD in Pigeon.pptx
PPTX
Serological evidence of Newcastle disease.pptx
PPTX
Isolation and characterization of fung and IdentificationApplications of funu...
PPT
Hepatitis and pregnancy Hepatitis B and c in pregnant women .ppt
PPT
PREVALENCE OF ANTIMICROBIAL SUSCEPTIBILITY OF GRAM NEGATIVE BACTERIA IN URINE
PPT
Evaluation of Bioactive Compounds and Antibacterial Properties of Bitter Kola...
PPT
Antimicrobial resistance in STREPTOCOCCUS SPP
PPT
Isolation and identification of lactic acid bacteria from kunun aya (A fermen...
PPTX
AInternship_Project Presentation for website
PPTX
Internship_Project Presentation Format-1.pptx
PPTX
Assessment of Female Genital Mutilation in Nigeria.pptx
Deploying and managing windows server 2012.pptx
Installing and configuring windows server 2012.pptx
Module 2- introduction to Active Directory Domain Servics.pptx
Module 3- Managing Active Directory Domain Service Objects .pptx
07 Implementing DNS Cyber security Baze University .pptx
10 Implementing File and Print Services.pptx
Introduction to Data Science unit 5 pptx
PROJECT REPORT FORMAT BCA final semester pptx
Mohammed Said Project Defence PowerPoint presentation
Serological evidence of IBD in Pigeon.pptx
Serological evidence of Newcastle disease.pptx
Isolation and characterization of fung and IdentificationApplications of funu...
Hepatitis and pregnancy Hepatitis B and c in pregnant women .ppt
PREVALENCE OF ANTIMICROBIAL SUSCEPTIBILITY OF GRAM NEGATIVE BACTERIA IN URINE
Evaluation of Bioactive Compounds and Antibacterial Properties of Bitter Kola...
Antimicrobial resistance in STREPTOCOCCUS SPP
Isolation and identification of lactic acid bacteria from kunun aya (A fermen...
AInternship_Project Presentation for website
Internship_Project Presentation Format-1.pptx
Assessment of Female Genital Mutilation in Nigeria.pptx
Ad

Recently uploaded (20)

PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
Tartificialntelligence_presentation.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
August Patch Tuesday
PPTX
The various Industrial Revolutions .pptx
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
project resource management chapter-09.pdf
PDF
Hybrid model detection and classification of lung cancer
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Architecture types and enterprise applications.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
TLE Review Electricity (Electricity).pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Tartificialntelligence_presentation.pptx
NewMind AI Weekly Chronicles - August'25-Week II
Enhancing emotion recognition model for a student engagement use case through...
August Patch Tuesday
The various Industrial Revolutions .pptx
OMC Textile Division Presentation 2021.pptx
Developing a website for English-speaking practice to English as a foreign la...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
cloud_computing_Infrastucture_as_cloud_p
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
project resource management chapter-09.pdf
Hybrid model detection and classification of lung cancer
WOOl fibre morphology and structure.pdf for textiles
Architecture types and enterprise applications.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
NewMind AI Weekly Chronicles – August ’25 Week III
TLE Review Electricity (Electricity).pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf

12 Securing Windows Servers by Using Group Policy Objects.pptx

  • 1. Microsoft® Official Course Module 12 Securing Windows Servers by Using Group Policy Objects
  • 2. Module Overview Security Overview for Windows Operating Systems Configuring Security Settings Restricting Software • Configuring Windows Firewall with Advanced Security
  • 3. Lesson 1: Security Overview for Windows Operating Systems Discussion: Identifying Security Risks and Costs Applying Defense-In-Depth to Increase Security • Best Practices for Increasing Security
  • 4. Discussion: Identifying Security Risks and Costs • What are some of security risks in Windows-based networks? 10 minutes
  • 5. Applying Defense-In-Depth to Increase Security Defense-in-depth uses a layered approach to security • Reduces an attacker’s chance of success • Increases an attacker’s risk of detection Policies, procedures, and awareness Security documents, user education Physical security Guards, locks, tracking devices Perimeter Firewalls, network access quarantine control Networks Network segments, IPsec, Reverse proxy servers Host Hardening, authentication, update management Application Application hardening, antivirus Data ACLs, EFS, BitLocker, backup/restore procedures
  • 6. Best Practices for Increasing Security Some best practices for increasing security are: • Apply all available security updates quickly • Follow the principle of least privilege • Use separate administrative accounts • Restrict administrator console sign-in • Restrict physical access
  • 7. Lesson 2: Configuring Security Settings Configuring Security Templates Configuring User Rights Configuring Security Options Configuring User Account Control Configuring Security Auditing Configuring Restricted Groups Configuring Account Policy Settings • What Is Security Compliance Manager?
  • 8. Configuring Security Templates Security Templates categories: • Account policies • Local policies • Event log • Restricted groups • System services • Registry • File system Security templates are distributed by using: • The secedit command-line tool • The Security Templates snap-in • The Security Configuration and Analysis Wizard • Group Policy • The Security Compliance Manager
  • 9. Configuring User Rights User Rights Types: • Privileges • Logon rights Examples of common user rights: • Add workstations to domain • Allow log on locally • Allow log on through Remote Desktop Services • Back up files and directories • Change the system time • Force shutdown from a remote computer • Shut down the system
  • 10. Configuring Security Options Security options settings: • Administrator and Guest account names • Access to CD/DVD drives • Digital data signatures • Driver installation behavior • Logon prompts • UAC Examples: • Prompt user to change password before expiration • Do not display last user name • Specify a message to be displayed when users are logging on • Rename administrator account
  • 11. Configuring Restricted Groups Group Policy can control group membership: • For any group on a domain-joined computer, by applying a GPO to the OU that contains the computer account • For any group in AD DS, by applying a GPO to the domain controller’s OU Be aware of problems that might arise from using policies for domain-based groups, and refer to the student handbook for more information
  • 12. Configuring Account Policy Settings Account policies reduce the threat of brute force guessing of account passwords Policies Default settings Password • Controls complexity and lifetime of passwords • Max password age: 42 days • Min password age: 1 day • Min password length: 7 characters • Complex password: enabled • Store password using reversible encryption: disabled Account lockout • Controls how many incorrect attempts can be made • Lockout duration: not defined • Lockout threshold: 0 invalid logon attempts • Reset account lockout after: not defined Kerberos • Subset of the attributes of domain security policy • Can only be applied at the domain level
  • 13. What Is Security Compliance Manager? SCM is a free tool from Microsoft that helps you secure local, remote, or virtualized computers. It features: • Baselines • Security guides • Support for standalone computers • Support for import GPO backups You can use SCM to: • Validate that computers are configured for compliance • Reduce the work involved in configuring computers for compliance • Move, compare and merge settings across two independent environments • Formulate and update your security policies
  • 14. Lab A: Increasing Security for Server Resources Exercise 1: Using Group Policy to Secure Member Servers Exercise 2: Auditing File System Access • Exercise 3: Auditing Domain Logons Logon Information Virtual machines 20410D LON DC1 ‑ ‑ 20410D LON SVR1 ‑ ‑ 20410D LON SVR2 ‑ ‑ 20410D LON CL1 ‑ ‑ User name AdatumAdministrator Password Pa$$w0rd Estimated Time: 50 minutes
  • 15. Lab Review What happens if you configure the Computer Administrators group, but not the Domain Admins group, to be a member of the Local Administrators group on all of a domain’s computers? Why do you need to restrict local logon to some computers? What happens when an unauthorized user tries to access a folder that has auditing enabled for both successful and unsuccessful access attempts? • What happens when you configure auditing for domain logons for both successful and unsuccessful logon attempts?
  • 16. Lesson 3: Restricting Software What Are Software Restriction Policies? What Is AppLocker? AppLocker Rules • Demonstration: Creating AppLocker Rules
  • 17. What Are Software Restriction Policies? • SRPs allow administrators to identify which apps are allowed to run on client computers • SRPs can be based on the following: • Hash • Certificate • Path • Zone • SRPs are applied through Group Policy
  • 18. What Is AppLocker? AppLocker applies Application Control Policies in Windows Server 2012 and Windows 8 AppLocker contains capabilities and extensions that: • Reduce administrative overhead • Help administrators control how users access and use files: Benefits of AppLocker: • Controls how users can access and run all types of apps • Allows the definition of rules based on a wide variety of variables • Provides for importing and exporting entire AppLocker policies • .exe files • scripts • DLLs • Windows Installer files • Packaged apps
  • 19. AppLocker Rules AppLocker defines rules based on file attributes such as: • Publisher name • Product name • File name • File version Rule actions • Allow or Deny conditions • Enforce or Audit Only policies
  • 20. Demonstration: Creating AppLocker Rules In this demonstration, you will see how to: • Create a GPO to enforce the default AppLocker Executable rules • Apply the GPO to the domain • Test the AppLocker rule
  • 21. Lesson 4: Configuring Windows Firewall with Advanced Security What Is Windows Firewall with Advanced Security? Discussion: Why Is a Host-Based Firewall Important? Firewall Profiles Connection Security Rules Deploying Firewall Rules • Demonstration: Implementing Secured Network Traffic with Windows Firewall
  • 22. What Is Windows Firewall with Advanced Security? Windows Firewall is a stateful, host-based firewall that allows or blocks network traffic according to its configuration
  • 23. What Is Windows Firewall with Advanced Security? The benefits of Windows Firewall include that it: • Supports filtering for both incoming and outgoing traffic • Integrates firewall filtering and IPsec protection settings • Enables you to configure rules to control network traffic • Provides network location-aware profiles • Enables you to import or export policies
  • 24. Discussion: Why Is a Host-Based Firewall Important? • Why is it important to use a host-based firewall such as Windows Firewall with Advanced Security? 10 minutes
  • 25. Firewall Profiles • Firewall profiles are a set of configuration settings that apply to a particular network type • The firewall profiles are: • Domain • Public • Private • Windows Server 2012 includes the ability to have multiple active firewall profiles
  • 26. Connection Security Rules Connection security rules: • Authenticate two computers before they begin communications • Secure information being sent between two computers • Use key exchange, authentication, data integrity, and data encryption (optionally) How firewall rules and connection rules are related: • Firewall rules allow traffic through, but do not secure that traffic • Connection security rules can secure the traffic, but only if a firewall rule was previously configured
  • 27. Deploying Firewall Rules You can deploy Windows Firewall rules: • Manually. Used during testing, troubleshooting, or for individual computers. • By using Group Policy. The preferred way. Create and test the rules, and then deploy them to a large number of computers. • By exporting and importing. Uses Windows Firewall with Advanced Security. When you import rules, they replace all current rules. Always test firewall rules in an isolated, nonproduction environment before you deploy them in production.
  • 28. Demonstration: Implementing Secured Network Traffic with Windows Firewall In this demonstration, you will see how to: • Check to see if ICMP v4 is blocked • Enable ICMP v4 from LON-CL2 to LON-SVR2 • Create a connection security rule so that traffic is authenticated to the destination host • Validate ICMP v4 after the connection security rule is in place
  • 29. Lab B: Configuring AppLocker and Windows Firewall Exercise 1: Configuring AppLocker Policies • Exercise 2: Configuring Windows Firewall Logon Information Virtual machines 20410D LON DC1 ‑ ‑ 20410D LON SVR1 ‑ ‑ 20410D LON CL1 ‑ ‑ User name Adatum Administrator Estimated Time: 60 minutes
  • 30. Lab Review You configured an AppLocker rule that prevents users from running software in a specified file path. How can you prevent users from moving the folder containing the software so that they can circumvent the rule and still run it? • You want to introduce a new application that needs to use specific ports. What information do you need to configure Windows Firewall with Advanced Security, and from what source can you get it?
  • 31. Module Review and Takeaways Review Questions Best Practices • Common Issues and Troubleshooting Tips • Tools

Editor's Notes

  • #1: Presentation: 1:45 Lab A: 50 minutes Lab B: 60 minutes After completing this module, students should be able to: Describe Windows® Server operating-system security. Configure security settings by using Group Policy. Increase security for server resources. Restrict unauthorized software from running on servers and clients. Configure Windows Firewall with Advanced Security. Required Materials To teach this module, you need the Microsoft® Office PowerPoint® file 20410D_12.ppt. Important: We recommend that you use Office PowerPoint 2007 or a newer version to display the slides for this course. If you use PowerPoint Viewer or an earlier version of Office PowerPoint, all the features of the slides might not display correctly. Preparation Tasks To prepare for this module: Read all of the materials for this module. Practice performing the demonstrations and the lab exercises. Work through the Module Review and Takeaways section, and determine how you will use this section to reinforce student learning and promote knowledge transfer to on-the-job performance.
  • #2: Introduce this module to students by giving a high-level overview of how security is important to information technology (IT). Present a high-level overview of this module’s lessons.
  • #3: Mention that before students learn how to configure security settings, they first must learn to identify security risks and threats. Explain that risk-security assessment can be different for every organization and for different departments within the same organization.
  • #4: Discussion Question: What are some of the security risks in Windows-based networks? Answer: Some of the security risks in Windows-based networks are: Malware (malicious software). Malware is one of the biggest risks to Windows-based networks. As a popular operating system, the Windows operating system is the frequent target of malware writers. Hackers can use malware to steal passwords and other useful information, or to take over an enterprise's computers to send out spam. The most sophisticated malware can specifically target organizations. Stolen data. Stolen data is a risk for students' organizations because competitors can use it or unauthorized individuals can use it to embarrass an organization. Legal issues. Legal issues are a concern if confidential or private data is stolen or made public. This is particularly true for customer data. Deleted data. Whether malware intentionally deletes data, or a user accidentally does, lost data can be expensive and time consuming to recover.
  • #5: Briefly describe each layer of the defense‑in‑depth model. The key point is that creating multiple layers of security is inherently more secure than focusing on a single layer. Do not go into too much detail, because you will discuss increasing security for each of these layers further in the “Configuring Security Settings” lesson later in this module. Question How many layers of the defense‑in‑depth model should you implement in your organization? Answer You should implement all layers of the defense‑in‑depth model, to some extent. You should base the actual measures that you implement on your organization’s needs and budget.
  • #6: You can use these best practices as a starting point for a discussion regarding other best practices for increasing security. For example, inform students that when applying updates, they should apply different strategies to client operating systems than they do for server operating systems. Stress that organizations and IT departments need to evaluate and update security best practices regularly. As technology evolves, security strategies change. Therefore, security best practices should evolve, too. For a more detailed list on Microsoft security best practices, refer students to the Additional Reading link in their Student Handbook.
  • #7: Tell students that in this module, they will configure different security settings to protect their Windows operating-system environment. Additionally, they will use Group Policy to deploy security settings for multiple users and computers. Stress to students that they should assess security settings in a test environment before they deploy them throughout their organization. This is because some security settings might restrict users or cause applications to stop functioning.
  • #8: Open a Microsoft Management Console (MMC), and then add the Security Templates snap‑in to the console. Display examples of the settings and configuration to students. Display each of the template-distribution tools that the slide lists, and briefly describe them to students.
  • #9: Give a high-level overview of the user rights settings, and describe each of them briefly to students by demonstrating the settings in the Group Policy Management Console (GPMC). Stress to students that they should test settings before applying them in production. If you do not configure user rights properly, your network environment might be more vulnerable or might not work properly. For example, granting user rights to force a shut down from a remote system might cause critical business servers to shut down during busy working hours.
  • #10: Give a high-level overview of the Security Options settings, and describe each of them briefly by demonstrating the settings in the GPMC. Explain some of the settings in this topic. For example: Interactive logon: Do not display last user name. When you enable this setting, the username of the person who last signed in to the computer does not appear. Therefore, the potential attacker has to guess or try to find out both the username and the password to obtain access to computer or network resources. If you disable this setting, the attacker would know the username, and would need only the password. Accounts: Rename administrator account. When enabled, this setting renames the local administrator account. The potential attacker would have to find out both the username and the password to obtain access to computer resources. If you disable this setting, the attacker would know the username, which is Administrator, and would need only the password.
  • #11: Describe how Group Policy can control the membership of local or domain groups. Explain that using Group Policy is the most efficient way to control local built-in group memberships on clients and member servers, and that you can use restricted groups when configuring membership of local or domain groups. There are two options for restricted groups, including: Members of this group. Use this option to restrict the entire group membership to only what you configure for the restricted group. This enables you to remove existing group members if you did not include them in the group membership. This group is a member of. Use this option to add additional members to whatever groups already exist. Mention that students also can use Group Policy preferences to add local users or local groups to domain member computers.
  • #12: Explain that account policies refer to the collection of settings that include password settings, account lockout settings, and Kerberos version 5 protocol-authentication policy settings. Explain that these settings apply to all domain users, unless you implement fine-grained passwords. Discuss the impact of complexity requirements that demand that users have three of these four types of characters in a password: uppercase, lowercase, numeric, and symbol. Mention that if you configure password history, you should configure minimum and maximum password ages. Mention that you should base the number of days in the Maximum Password Age setting upon the strength of the passwords. Therefore, you give lower-strength passwords a shorter maximum age, while you give higher-strength passwords a longer maximum age. Explain the purpose of the account lockout threshold, but do not spend a significant amount of time on this, and then briefly discuss Kerberos authentication settings.
  • #13: Discuss some real-world uses of Security Compliance Manager, such as: Creating secure GPOs for enterprise-wide distribution. Locking down specialized computers, such as kiosks or terminal servers. Using it as a reference point for compliance and analysis needs.
  • #14: Before students begin the lab, read the lab scenario and display the next slide. Before each exercise, read the scenario associated with the exercise to the class. The scenarios give context to the lab and exercises, and help to facilitate the discussion at the end of the lab. Remind students to complete the discussion questions after the last lab exercise. Exercise 1: Using Group Policy to Secure Member Servers A. Datum Corporation uses the Computer Administrators group to provide administrators with permissions to administer member servers. As part of the installation process for a new server, the Computer Administrators group from the domain is added to the local Administrators group on the new server. Recently, this important step was missed when configuring several new member servers. To ensure that the Computer Administrators group is always given permission to manage member servers, your manager has asked you to create a GPO that sets the membership of the local Administrators group on member servers to include Computer Server Administrators. This GPO also needs to enable Admin Approval Mode for UAC. Exercise 2: Auditing File System Access The manager of the Marketing department has concerns that there is no way to track who is accessing files that are on the departmental file share. Your manager has explained that only users with permissions are allowed to access the files. However, the manager of the Marketing department wants to try recording who is accessing specific files. Your manager has asked you to enable auditing for the file system that is on the Marketing department file share, and to review the results with the manager of the Marketing department. Exercise 3: Auditing Domain Logons After a security review, the IT policy committee has decided to begin tracking all user logons to the domain. Your manager has asked you to enable auditing of domain logons and verify that they are working.
  • #15: Lab Review Questions Question What happens if you configure the Computer Administrators group, but not the Domain Admins group, to be a member of the Local Administrators group on all of a domain’s computers? Answer If you do not include the Domain Admins group in the Local Administrators group, Domain Admins will not be a member of the Local Administrators group on all of a domain’s computers. Question Why do you need to restrict local logon to some computers? Answer It is not a good security practice for every domain user to be able to log on to every domain computer. Typically, all servers, and some clients with sensitive local information or applications, should not allow all users to log on locally.. Question What happens when an unauthorized user tries to access a folder that has auditing enabled for both successful and unsuccessful access attempts? Answer An event is generated in the Event Viewer security log, with information about who has tried to access the folder and whether the attempt was successful. Question What happens when you configure auditing for domain logons for both successful and unsuccessful logon attempts? Answer Events are generated in the Event Viewer security log, with information about who has tried to log on to the domain and whether the attempt was successful.
  • #16: Introduce this lesson by discussing with students their experiences in protecting computers from unwanted software installations. Discuss how to restrict users from installing or using unwanted software. Tell students that this lesson covers software restriction policies (SRPs) and using AppLocker®, a feature of Windows 7 and newer versions of Windows. Focus more on AppLocker technology than on SRPs, because AppLocker is a more efficient way to restrict software.
  • #17: Introduce Software Restriction Policies (SRPs) as the legacy solution for managing application execution. Introduce their basic functionality and key components. This slide is intended only to define and explain SRPs. Do not go into much detail yet about the differences between SRPs and AppLocker®. Ensure that students understand the concept of applying security levels both at the default security level and to individual SRP rules. Explain how these two areas combine to provide to different environments: No applications can run unless allowed by SRP. All applications can run unless restricted by SRP.
  • #18: Introduce AppLocker as the replacement for SRP in Windows Server 2008 R2 and Windows 7. Mention that AppLocker also is available in Windows Server 2012 and Windows 8. Introduce the benefits that AppLocker provides, and discuss, in a general way, how it is applied in a Windows Server 2012 and Windows 8 environment. Highlight AppLocker’s capability to define specific sets of rules based on user account or security group membership. Also, explain that students can create a definition of application variables when they create rules.
  • #19: Explain how AppLocker rules work, and then demonstrate AppLocker rules. Discuss an example of using AppLocker; for example, students can use AppLocker to configure software that is no longer used in their company with a deny action so that users can no longer run the software. Explain that the next step is to remove the software. Discuss an example of auditing policies. For example, administrators can use auditing policies to retrieve information about software that employees are using. Discuss with students several scenarios in which it is beneficial to implement AppLocker, such as for: Licensing audits, software true-up, software license purchases, and enterprise agreements that can benefit from AppLocker to maintain compliance and to ensure that the organization is licensed properly. Software that is not allowed for use in the company. Mention an example of software that can disrupt employees’ business productivity, such as social networks, or software that streams video files or pictures or videos that can use a large amount of network bandwidth. Software that is no longer used. This is software that the enterprise no longer needs, so it is not maintained or licensed. Software that is no longer supported. This software is not updated with security updates, so it might pose a security risk.
  • #20: Preparation Steps For this demonstration you need the virtual machines 20410D‑LON‑DC1 and 20410D‑LON‑CL1. They should be running after the previous lab. Demonstration Steps Create a GPO to enforce the default AppLocker Executable rules On LON‑DC1, in Server Manager, click Tools, and then click Group Policy Management. In GPMC, go to Forest: Adatum.com\Domains\Adatum.com. Click Group Policy Objects, right-click Group Policy Objects, and then click New. In the New GPO window, in Name, type WordPad Restriction Policy, and then click OK. Right-click WordPad Restriction Policy, and then click Edit. In the Group Policy Management Editor window, go to Computer Configuration\Policies\Windows Settings\Security Settings\Application Control Policies\AppLocker. Click Executable Rules, right-click Executable Rules, and then select Create New Rule. On the Before You Begin page, click Next. On the Permissions page, click Deny, and then click Next. On the Conditions page, click Publisher, and then click Next. On the Publisher page, click Browse, and then click Computer. On the Open page, double-click Local Disk (C:). On the Open page, double-click Program Files, double-click Windows NT, double-click Accessories, click wordpad.exe, and then click Open. Move the slider up to the File name position, and then click Next. Click Next again, and then click Create.
  • #21: If prompted to create default rules, click Yes. In the Group Policy Management Editor window, go to Computer Configuration\Policies\Windows Settings\Security Settings. Expand Application Control Policies, right-click AppLocker, and then select Properties. On the Enforcement tab, under Executable rules, select the Configured check box, click Enforce rules, and then click OK. In the Group Policy Management Editor window, go to Computer Configuration\Policies\Windows Settings\Security Settings. Click System Services, and then double-click Application Identity. In the Application Identity Properties dialog box, above Select service startup mode, click Define this policy setting, then click Automatic, and then click OK. Close the Group Policy Management Editor window. Apply the GPO to the domain In the Group Policy Management Console, expand Forest: Adatum.com, expand Domains, expand Adatum.com, and then expand Group Policy Objects. In the Group Policy Management Console, right-click Adatum.com, and then click Link an Existing GPO. In the Select GPO window, in the Group Policy Objects window, click WordPad Restriction Policy, and then click OK. Close the Group Policy Management Console. Switch to the Start screen, type cmd, and then press Enter. In the Command Prompt window, type gpupdate /force, and then press Enter. Wait for the policy to update.
  • #22: Test the AppLocker rule Sign in to LON‑CL1 as Adatum\Alan with the password Pa$$w0rd. Point to the lower-right corner of the screen, and then click the Search charm when it appears. In the Search box type cmd, and then press Enter. In the Command Prompt window, type gpupdate /force, and then press Enter. Wait for the policy to update. In the lower-left corner of the screen, click the Start button. In the Search box type WordPad, and then press Enter. Notice that WordPad does not start. Leave the virtual machines running after you complete the demonstration.
  • #23: Briefly review the topics that this lesson includes.
  • #24: This is the first of two slides in this topic. Mention that the default Windows Firewall status is to block all incoming traffic unless it is solicited or it matches a configured rule, and to allow all outgoing traffic, unless it matches a configured rule. Mention the following rules: Password policies TCP port 20 blocks outbound Remote Desktop allows inbound Custom application TCP port 6543 allows inbound Mention that you can use the netsh command-line tool for configuring Windows Firewall with Advanced Security.
  • #25: This is the second of two slides in this topic.
  • #26: Discussion Question: Why is it important to use a host-based firewall, such as Windows Firewall with Advanced Security? Answer: Windows Firewall with Advanced Security is important because: Computers are protected from attacks on the internal network. This can prevent malware from moving through the internal network by blocking unsolicited inbound traffic. Inbound rules prevent network scanning to identify hosts on the network. The simplest network scanners ping hosts on a network in an attempt to identify them. Windows Firewall with Advanced Security prevents member servers from responding to ping requests. Domain controllers do respond to ping requests. When you enable outbound rules, it can prevent malware from spreading by preventing the malware from communicating on the network. In the case of a virus outbreak, you could configure computers with a specific outbound rule that prevents the virus from communicating over the network. Connection security rules allow you to create sophisticated firewall rules that use computer and user-authentication information to limit communication with high-security computers.
  • #27: One of the key points that students need to understand is that domain members use the domain profile. Only objects that are not a domain member, such as hosts in a perimeter network, use other profiles.
  • #28: Ensure that students understand the following points: To allow traffic, they must first create the firewall rules. Firewall rules define which ports, IP addresses, applications, or programs are allowed through the firewall, each defined separately for both directions: in and out. Connection security rules provide additional protection by requiring authenticating on the computers that initiate the traffic. They also secure that traffic by encrypting the data that is transmitted between computers. Connection security rules are applied between the computers that are the two endpoints. Emphasize that you can configure firewall rules to allow traffic, allow only authenticated traffic, or block all traffic. This means that you can use connection security rules to authenticate traffic, and you can configure the firewall to allow only authenticated traffic.
  • #29: Explain to students that they should choose the deployment method for Windows Firewall rules based on how many computers will be affected. If they need to create a firewall rule on hundreds of computers, they should use Group Policy. For a single computer, they can configure it manually. Stress to students that they should be very careful when they use Group Policy to configure Windows Firewall. Some employees might use applications that need additional ports to be open on their computers, and improperly configured firewall rules might block those applications. We strongly recommend that you test firewall rules in an isolated, nonproduction environment before you deploy them in production.
  • #30: Mention the different options that are available when you are securing connections, including: Securing connections for all communication Securing connections for a single protocol Using certificates for authentication Using Kerberos for authentication Securing traffic to or from specific hosts only, or securing traffic for an entire domain Also, mention the real-world situations where securing network traffic is valuable. These scenarios include an organization that has a security policy that prohibits communication between development computers and production computers, or a highly secure environment where compliance requires specific secure communications. Preparation Steps Start 20410D‑LON‑CL2, 20410D‑LON‑SVR2, and 20410D‑LON‑RTR. Demonstration Steps Check to see if ICMP v4 is blocked Sign in to LON‑CL2 as Adatum\Administrator with the password Pa$$w0rd. On LON‑CL2, click the Desktop tile, right-click the Windows Start menu, and then click Command Prompt. At the command prompt, type ping 10.10.0.11, and then press Enter. Notice that the ping times out.
  • #31: Enable ICMP v4 from LON‑CL2 to LON‑SVR2 Sign in to LON‑SVR2 as Adatum\Administrator with the password Pa$$w0rd. On LON‑SVR2, right-click the Windows Start menu, and then click Control Panel. In Control Panel, click the View by drop-down menu, and then click Small icons. Click Windows Firewall. Click Advanced settings. In the left-hand pane, click Inbound Rules. In the right-hand pane, click New Rule. On the New Inbound Rule Wizard, on the Rule Type page, click Custom, and then click Next. On the Program page, click Next. On the Protocol and Ports page, click the Protocol type drop-down menu, click ICMPv4, and then click Next. In the Which remote IP addresses does this rule apply to section, click These IP addresses, and then click Add. In the IP Address window, type 10.10.0.50 in the This IP address or subnet box, click OK, and then click Next. On the Action page, click Next to accept the Allow the connection default action. On the Profile page, click Next to accept the application of the rule for all profiles. On the Name page, type ICMPv4-Allow-From-10.10.0.50, and then click Finish. Switch to LON‑CL2. At the command prompt, type ping 10.10.0.11, and then press Enter. Notice that the ping goes through successfully.
  • #32: Create a connection security rule Switch to LON‑SVR2. In the Windows Firewall with Advanced Security window, in the left-hand pane, right-click Connection Security Rules, and then click New Rule. On the Rule Type page, click Next to accept the default of Isolation. On the Requirements page, click Require authentication for inbound connections and request authentication for outbound connections, and then click Next. On the Authentication Method page, click Advanced, and then click Customize. In the Customize Advanced Authentication Method dialog box, in the First authentication section, click Add. In the Add First Authentication Method dialog box, click Preshared key (not recommended), type Pa$$w0rd for the preshared key, and then click OK. Click OK again to close the dialog box. On the Authentication Method page, click Next. On the Profile page, click Next. On the Name page, in Name, type Require Inbound Authentication, and then click Finish. Repeat steps 2 through 10 on LON-CL2 before moving to the next demonstration section. Validate ICMP v4 Switch to LON‑CL2. At the command prompt, type ping 10.10.0.11, and then press Enter. Notice that the ping goes through successfully. After you complete the demonstration, revert the virtual machines.
  • #33: Before students begin the lab, read the lab scenario and display the next slide. Before each exercise, read the scenario associated with the exercise to the class. The scenarios give context to the lab and exercises, and help to facilitate the discussion at the end of the lab. Remind students to complete the discussion questions after the last lab exercise. Exercise 1: Configuring AppLocker Policies Your manager has asked you to configure new AppLocker policies to control the use of applications on user desktops. The new configuration should allow applications to be run only from approved locations. All users must be able to run applications from C:\Windows and C:\Program Files. You also need to add an exception to run a custom-developed application that resides in a nonstandard location. The first stage of the implementation records from which locations applications are being run now. The second stage of implementation prevents unauthorized applications from running. Exercise 2: Configuring Windows Firewall Your manager has asked you to configure Windows Firewall rules for a set of new application servers. These application servers have a web-based program that is listening on a nonstandard port. You need to configure Windows Firewall to allow network communication through this port. You will use security filtering to ensure that the new Windows Firewall rules apply only to the application servers.
  • #34: Lab Review Questions Question You configured an AppLocker rule that prevents users from running software in a specified file path. How can you prevent users from moving the folder containing the software so that they can circumvent the rule and still run it? Answer You can configure an AppLocker rule that is based on a file hash rather than a rule based on a file path. Question You want to introduce a new application that needs to use specific ports. What information do you need to configure Windows Firewall with Advanced Security, and from what source can you get it? Answer You need to know which ports and IP addresses you need so that the application can run while still being protected from security threats. You can get this information from the application vendor.
  • #35: Module Review Questions Point students to the appropriate section in the course so that they are able to answer the questions that this section presents. Question Does the defense‑in‑depth model prescribe specific technologies that you should use to protect Windows Server operating system servers? Answer No, you use the defense‑in‑depth model to organize your plans for defense. It does not prescribe specific technologies. Question What setting must you configure to ensure that users are allowed only three invalid sign-in attempts? Answer The account lockout threshold setting ensures that users are allowed only three invalid sign-in attempts. Question You are creating a GPO with standardized firewall rules for the servers in your organization. You tested the rules on a stand-alone server in your test lab. The rules appear on the servers after the GPO is applied, but they are not taking effect. What is the most likely cause of this problem? Answer The firewall rules are most likely not being applied to the correct firewall profile. It is possible that you did not apply them to the domain profile as is required for member servers. To test rules on a stand-alone server, you have to apply the rules to either the public or private firewall profiles. Question Last year, your organization developed a security strategy that included all aspects of a defense‑in‑depth model. Based on that strategy, your organization implemented security settings and policies on the entire IT infrastructure environment. Yesterday, you read in an article that new security threats were detected on the Internet, but now you realize that your company strategy does not include a risk analysis and mitigation plan for those new threats. What should you do?
  • #36: Answer You should immediately initiate a new risk assessment in your organization to help you develop a plan outlining how to address the new threats. Additionally, ensure that your organization’s security risk assessments and strategies are being evaluated and updated regularly. As technology evolves, security strategies change, so security best practices must also evolve. Organizations must be ready to protect their IT infrastructure from any new potential security threats. Best Practices The following are best practices: Always make a detailed security risk assessment before planning which security features your organization should deploy. Create a separate GPO for security settings that apply to different type of users in your organization, because each department might have different security needs. Ensure that the security settings that you configure are reasonably easy to use so that employees accept them. Frequently, very strong security policies are too complex or difficult for employees to adopt. Always test security configurations that you plan to implement with a GPO in an isolated, nonproduction environment. Only deploy policies in your production environment after you complete this testing successfully.
  • #37: Common Issues and Troubleshooting Tips Ensure that you cover the common issues and the corresponding troubleshooting tips listed in this section. Encourage students to share tips from their own work environments.
  • #38: Tools