SlideShare a Scribd company logo
Windows Server 2008 –  Network Access Protection (NAP) Presented by Vu Nguyen Cao Son EPG Technical Specialist [email_address] www.CaoSonBlog.com
Why Security Introducing Network Access Protection Using NAP with DHCP Using NAP with  VPN/Ipsec/802.1x Q&A Agenda
Media  Personal Favor I think “it is important and essential to my system” My company have “fund” for security Why Security !!!??? – Wrong Way
Business Continuty Why Security !!!??? – Right Way Risk-based model  Defense in Depth Security Control with ISO 27001 Risk Level ROI
Risk-based Decision Making Business and IT Teams “ Best Control Solution” Information Security “ Prioritize Risks” Business Owners “ What’s Important” Assess Risks Define Security Requirements Determine Acceptable Risk Design & Build Security Solutions Operate & Support Security Solutions Measure Security Solutions
Demo Examining Connection Trace Logs  Examine Event Logs Examine Connection Logs demonstration Defense in Depth with Microsoft Product
Network Access Protection Benefits Enhanced Security All communications are authenticated, authorized & healthy Defense-in-depth on your terms with DHCP, VPN, IPsec, 802.1X Policy-based access that IT Pros can set and control Increased Business Value Preserves user productivity  Extends existing investments in Microsoft and 3rd party infrastructure  Broad industry partnership Risk Level ROI Health and Policy Validation Defense at Multiple Layers Healthy Endpoints Connect Leverage Existing Investments
Why Security Introducing Network Access Protection Using NAP with DHCP Using NAP with  VPN/Ipsec/802.1x Q&A Agenda
Network Access Protection Solution Policy Validation Network Restriction Remediation Ongoing Compliance Polices, Procedures,  and Awareness Data Application Host Internal Network Perimeter
NAP Architecture Overview Network  Policy Server Quarantine Server (QS) Client Quarantine Agent (QA) Health policy Updates Health Statements Network Access Requests System Health  Servers  Remediation  Servers  Health Certificate Network Access Devices  and Servers System Health Agent (SHA ) MS and 3rd Parties System Health Validator Enforcement Client (EC) (DHCP, IPSec, 802.1X, VPN)
How NAP Works  Network Access Requests Corporate Network Restricted Network Windows Client Network  Enforment Endpoint NPS Active Directory Health Statements QA SHA EC QS SHV Not Compliant Policy Compliant Remediation Servers
Why Microsoft NAP Soft-based solution, free with Windows Server 2008. Integrated into the client operating system (XP SP3, Vista) Intergrated with Core System (SCCM,FCS,WSUS) Integration with 3 rd  party security products(Cisco,Juniper,Symantec, Mcafee) NAP + Domain & Server Isolation = Enforment Sec Multiple types of enforcement
Why Security Introducing Network Access Protection Using NAP with DHCP Using NAP with  VPN/Ipsec/802.1x Q&A Agenda
NAP with DHCP Requesting access.  Here’s my new health status. The client requests and receives updates I need to lease  an IP address You are not within the Health Policy requirements Access granted. Here is your new IP address NPS Server Client DHCP Server VPN Server IEEE 802.1X Devices Remediation  Servers
Demonstration Environment
Configuring NAP for DHCP  demonstration
Why Security Introducing Network Access Protection Using NAP with DHCP Using NAP with VPN/Ipsec/802.1x Q&A Agenda
NAP with VPN and RRAS RADIUS Messages PEAP Messages NPS Server Client VPN Server Remediation  Servers
IPsec-based Communication Secure network Boundary network Restricted network IPsec Authenticated Unauthenticated
Using NAP with 802.1x Device Most Wireless Security for Enterprise with NAP Interoperation with many 802.1x Switch Network Policy Server Authentication Server 802.1x Access Points 802.1x Switch Wireless Clients Active Directory Health Requirement Server Certificate Authority (Optional)
Q&A and Thanks You www.CaoSonBlog.com

More Related Content

PPTX
Network access protection ppt
PPT
Network Access Protection
PPT
Requirements for an internet connectivity solution 1
PPTX
5 ways you can strengthen and secure your network infrastructure with Firewal...
PPTX
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
PDF
Enterprise network management
PPTX
NuvoSys Solutions, LLC
PPTX
5 reasons to use OpManager Plus
Network access protection ppt
Network Access Protection
Requirements for an internet connectivity solution 1
5 ways you can strengthen and secure your network infrastructure with Firewal...
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
Enterprise network management
NuvoSys Solutions, LLC
5 reasons to use OpManager Plus

What's hot (20)

PPTX
Webinar: SecurePlanHealth Updates
PDF
Monitoring active-directory
PPTX
Completing fedramp-security-authorization-process
PPTX
Why Configuration Management Matters
PDF
Application-aware Network Performance Management with OpManager
PPTX
5 Ways NCM Can Save You From A Disaster
PPTX
Network Configuration Management - Mumbai Seminar
PPTX
5 reasons why you need a network monitoring tool
PPTX
5 benefits of OpManager
PPTX
Free Netflow analyzer training - diagnosing_and_troubleshooting
PPTX
Leading American Entertainment Company implements OpManager
PPT
Why Use Wes Tech Solutions
PPT
Why Use Westech Solutions
PPTX
6 reasons to switch to fluidic ui - Network Configuration Manager
PPTX
New OpManager v12
PDF
TrustedAgent FedRAMP Security Authorization
PPTX
Managed Desktop Services
PPTX
Best Network Performance Monitoring Tool
PPTX
Top 5 problems a NETWORK ANALYSIS TOOL will help you solve
PPT
The 3 aspects of network performance management
Webinar: SecurePlanHealth Updates
Monitoring active-directory
Completing fedramp-security-authorization-process
Why Configuration Management Matters
Application-aware Network Performance Management with OpManager
5 Ways NCM Can Save You From A Disaster
Network Configuration Management - Mumbai Seminar
5 reasons why you need a network monitoring tool
5 benefits of OpManager
Free Netflow analyzer training - diagnosing_and_troubleshooting
Leading American Entertainment Company implements OpManager
Why Use Wes Tech Solutions
Why Use Westech Solutions
6 reasons to switch to fluidic ui - Network Configuration Manager
New OpManager v12
TrustedAgent FedRAMP Security Authorization
Managed Desktop Services
Best Network Performance Monitoring Tool
Top 5 problems a NETWORK ANALYSIS TOOL will help you solve
The 3 aspects of network performance management
Ad

Similar to MS NAP - Security Day (20)

PPTX
6421 b Module-07
DOC
Nap vpn stepby_step
PPT
What is NAC
PPT
Network Access COntrol asdfcxzqwe asd asdd .ppt
PPT
Uac sales pres_20_apr09-2
PDF
BOSNOG NAC stack 2018
PPT
Windows server2008
PPTX
Connect Remotely Using Windows® 7 Direct Access
PPTX
NAC_p3.pptx
PPTX
"Secure network access & threat protection"
PPT
Cisco Managed Security
PPT
0505 Windows Server 2008 一日精華營 Part II
PDF
Windows Server 2008 Security Overview Short
PDF
Windows Server 2008 Security Overview Short
PPTX
Microsoft Platform Security Briefing
DOCX
clear pass solution doc.docx clear pass solution doc.docx
PPTX
Microsoft Windows 7 Enhanced Security And Control
PDF
Network access control (nac)
PPT
Info Sec2007 End Point Final
PDF
802.1x Implementation Plan for Seacoast
6421 b Module-07
Nap vpn stepby_step
What is NAC
Network Access COntrol asdfcxzqwe asd asdd .ppt
Uac sales pres_20_apr09-2
BOSNOG NAC stack 2018
Windows server2008
Connect Remotely Using Windows® 7 Direct Access
NAC_p3.pptx
"Secure network access & threat protection"
Cisco Managed Security
0505 Windows Server 2008 一日精華營 Part II
Windows Server 2008 Security Overview Short
Windows Server 2008 Security Overview Short
Microsoft Platform Security Briefing
clear pass solution doc.docx clear pass solution doc.docx
Microsoft Windows 7 Enhanced Security And Control
Network access control (nac)
Info Sec2007 End Point Final
802.1x Implementation Plan for Seacoast
Ad

More from vncson (16)

PPTX
Protecting exchange servers with dpm 2010 son vu
PPTX
Microsoft Private Cloud Computing
PPTX
Hyper V In Windows Server 2008 R2.Son Vu
PPTX
Scvmm Technical Overview.Son Vu
PPT
Dpm4 Data Center
PPT
Dpm Disaster Recovery Sonvu
PPT
Branch Office Solution Son Vu
PPT
Dpm.2007.For.Sql Sonvu
PPT
Data Protection Manager 2007 Technical Overview Son Vu
PPT
Data Center Optimization With Microsoft System Center Son Vu
PPT
IO ROI Example
PPT
Why Upgrade To Exchange 2007 Sp1 Son Vu
PPT
Microsoft IO 101 Training
PPT
Exchange 2007 Overview Son Vu
PPT
Microsoft.Virtualization.Technologies Son Vu
PPT
Microsoft Hyper V Server 2008
Protecting exchange servers with dpm 2010 son vu
Microsoft Private Cloud Computing
Hyper V In Windows Server 2008 R2.Son Vu
Scvmm Technical Overview.Son Vu
Dpm4 Data Center
Dpm Disaster Recovery Sonvu
Branch Office Solution Son Vu
Dpm.2007.For.Sql Sonvu
Data Protection Manager 2007 Technical Overview Son Vu
Data Center Optimization With Microsoft System Center Son Vu
IO ROI Example
Why Upgrade To Exchange 2007 Sp1 Son Vu
Microsoft IO 101 Training
Exchange 2007 Overview Son Vu
Microsoft.Virtualization.Technologies Son Vu
Microsoft Hyper V Server 2008

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPT
Teaching material agriculture food technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Electronic commerce courselecture one. Pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Modernizing your data center with Dell and AMD
PPTX
Big Data Technologies - Introduction.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
Approach and Philosophy of On baking technology
NewMind AI Monthly Chronicles - July 2025
Review of recent advances in non-invasive hemoglobin estimation
Teaching material agriculture food technology
Encapsulation_ Review paper, used for researhc scholars
20250228 LYD VKU AI Blended-Learning.pptx
Empathic Computing: Creating Shared Understanding
Electronic commerce courselecture one. Pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Building Integrated photovoltaic BIPV_UPV.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Chapter 3 Spatial Domain Image Processing.pdf
cuic standard and advanced reporting.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Modernizing your data center with Dell and AMD
Big Data Technologies - Introduction.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”

MS NAP - Security Day

  • 1. Windows Server 2008 – Network Access Protection (NAP) Presented by Vu Nguyen Cao Son EPG Technical Specialist [email_address] www.CaoSonBlog.com
  • 2. Why Security Introducing Network Access Protection Using NAP with DHCP Using NAP with VPN/Ipsec/802.1x Q&A Agenda
  • 3. Media Personal Favor I think “it is important and essential to my system” My company have “fund” for security Why Security !!!??? – Wrong Way
  • 4. Business Continuty Why Security !!!??? – Right Way Risk-based model Defense in Depth Security Control with ISO 27001 Risk Level ROI
  • 5. Risk-based Decision Making Business and IT Teams “ Best Control Solution” Information Security “ Prioritize Risks” Business Owners “ What’s Important” Assess Risks Define Security Requirements Determine Acceptable Risk Design & Build Security Solutions Operate & Support Security Solutions Measure Security Solutions
  • 6. Demo Examining Connection Trace Logs Examine Event Logs Examine Connection Logs demonstration Defense in Depth with Microsoft Product
  • 7. Network Access Protection Benefits Enhanced Security All communications are authenticated, authorized & healthy Defense-in-depth on your terms with DHCP, VPN, IPsec, 802.1X Policy-based access that IT Pros can set and control Increased Business Value Preserves user productivity Extends existing investments in Microsoft and 3rd party infrastructure Broad industry partnership Risk Level ROI Health and Policy Validation Defense at Multiple Layers Healthy Endpoints Connect Leverage Existing Investments
  • 8. Why Security Introducing Network Access Protection Using NAP with DHCP Using NAP with VPN/Ipsec/802.1x Q&A Agenda
  • 9. Network Access Protection Solution Policy Validation Network Restriction Remediation Ongoing Compliance Polices, Procedures, and Awareness Data Application Host Internal Network Perimeter
  • 10. NAP Architecture Overview Network Policy Server Quarantine Server (QS) Client Quarantine Agent (QA) Health policy Updates Health Statements Network Access Requests System Health Servers Remediation Servers Health Certificate Network Access Devices and Servers System Health Agent (SHA ) MS and 3rd Parties System Health Validator Enforcement Client (EC) (DHCP, IPSec, 802.1X, VPN)
  • 11. How NAP Works Network Access Requests Corporate Network Restricted Network Windows Client Network Enforment Endpoint NPS Active Directory Health Statements QA SHA EC QS SHV Not Compliant Policy Compliant Remediation Servers
  • 12. Why Microsoft NAP Soft-based solution, free with Windows Server 2008. Integrated into the client operating system (XP SP3, Vista) Intergrated with Core System (SCCM,FCS,WSUS) Integration with 3 rd party security products(Cisco,Juniper,Symantec, Mcafee) NAP + Domain & Server Isolation = Enforment Sec Multiple types of enforcement
  • 13. Why Security Introducing Network Access Protection Using NAP with DHCP Using NAP with VPN/Ipsec/802.1x Q&A Agenda
  • 14. NAP with DHCP Requesting access. Here’s my new health status. The client requests and receives updates I need to lease an IP address You are not within the Health Policy requirements Access granted. Here is your new IP address NPS Server Client DHCP Server VPN Server IEEE 802.1X Devices Remediation Servers
  • 16. Configuring NAP for DHCP demonstration
  • 17. Why Security Introducing Network Access Protection Using NAP with DHCP Using NAP with VPN/Ipsec/802.1x Q&A Agenda
  • 18. NAP with VPN and RRAS RADIUS Messages PEAP Messages NPS Server Client VPN Server Remediation Servers
  • 19. IPsec-based Communication Secure network Boundary network Restricted network IPsec Authenticated Unauthenticated
  • 20. Using NAP with 802.1x Device Most Wireless Security for Enterprise with NAP Interoperation with many 802.1x Switch Network Policy Server Authentication Server 802.1x Access Points 802.1x Switch Wireless Clients Active Directory Health Requirement Server Certificate Authority (Optional)
  • 21. Q&A and Thanks You www.CaoSonBlog.com