SlideShare a Scribd company logo
Security EnhancementNarendaWicaksonoIT Pro Advisor, Microsoft Indonesia
AgendaSecurity FundamentalsThreat and Vulnerability MitigationIdentity and Access ControlCompliance EnhancementsTechnology CoverageRead Only Domain Controller, Bit Locker, Service Hardening, Server Core, Device Installation, Next Gen firewall, NAP and Terminal Services/RDP changes, Rights management, … and more
SECURITY: FUNDAMENTALSTHREAT & VULNERABILITY MITIGATIONNetwork Access ProtectionRead-Only Domain ControllerEnhanced AuditingServer and Domain IsolationSecurity Development LifecycleWindows Service HardeningNext Generation CryptoPKI EnhancementsIDENTITY &ACCESS CONTROLCOMPLIANCE ENHANCEMENTSBitLocker™ Drive EncryptionEFS SmartcardsRights Management ServerRemovable Device ControlActive Directory Federation ServicesPlug and Play SmartcardsGranular AuditingGranular Password Control Security and Compliance
Security Fundamentals
Security Development LifecycleMandated development process for Windows Server and Windows Vista Periodic mandatory security trainingAssignment of security advisors for all components Threat modeling as part of design phaseSecurity reviews and testing built into the scheduleSecurity metrics for product teamsCommon Criteria (CC) Certification
Windows Service HardeningDefense-in-Depth / FactoringDDDDDDDDReduce size ofhigh risk layersSegment theservicesIncrease # of layersService 1Service …Service 2Service…Service AService 3Service BKernel DriversUser-mode Drivers
Server CoreMinimal installation optionLow surface areaCommand line interfaceLimited set of server rolesSERVER, SERVER ROLES (for example only)TSIASWebServerSharePointEtc…SERVERWith WinFx, Shell, Tools, etc.SERVER CORE SERVER ROLESDNSDHCPFileADWVIISSERVER CORESecurity, TCP/IP, File Systems, RPC,plus other Core Server Sub-SystemsGUI, CLR, Shell, IE, Media, OE, etc.
Windows Server 2008 Services
Cryptography Next Generation (CNG) Cryptography Next GenerationIncludes algorithms for encryption, digital signatures, key exchange, and hashingSupports cryptography in kernel modeSupports the current set of CryptoAPI 1.0 algorithmsSupport for elliptic curve cryptography (ECC) algorithmsPerform basic cryptographic operations, such as creating hashes and encrypting and decrypting data
PKI EnhancementsOnline Certificate Status Protocol (OSCP)Enterprise PKI (PKIView)Network Device Enrollment Service and Simple Certificate Enrollment ProtocolWeb Enrollment
Windows Server FirewallMore ControlCombined firewall and IPsec management
Windows Server FirewallMore ControlFirewall rules become more intelligent
Windows Server FirewallMore ControlFirewall rules become more intelligent
Windows Server FirewallMore ControlFirewall rules become more intelligent
Windows Server FirewallMore ControlPolicy-based networking
Enhancing and Simplifying IPsec
Threat and Vulnerability  Mitigation
Servers with Sensitive DataServer IsolationHR WorkstationManaged ComputerDomain IsolationDomain IsolationManaged ComputerActive Directory Domain ControllerCorporate NetworkTrusted Resource ServerXUnmanaged/Rogue ComputerXUntrustedServer and Domain Isolation
POLICY SERVERSe.g. MSFT Security Center, SMS, Antigenor 3rd party Fix UpServerse.g. MSFT WSUS, SMS & 3rd partyRestrictedNetworkCORPORATE NETWORKNetwork Access ProtectionWindows Server 20083Not policy compliant124MSFTNetworkPolicy Server WindowsVista ClientPolicy compliantDHCP, VPNSwitch/Router5Enhanced SecurityAll communications are authenticated, authorized & healthyDefense-in-depth on your terms with DHCP, VPN, IPsec, 802.1XPolicy-based access that IT Pros can set and controlBENEFITSIncreased Business ValuePreserves user productivity  Extends existing investments in Microsoft and 3rd party infrastructure Broad industry partnership
Read-Only Domain ControllerRead-Only Copy of AD DatabaseCan Hold all Directory Objects & AttributesMaintains Read-Only Copy of DNS  ZonesHUB Writeable DC Secure LocationUnidirectional ReplicationNo Local Changes – Pull from Upstream OnlyControlled Replication - Limits Bandwidth UseCredential HandlingCan Cache User Passwords (Explicitly Set)Admin Knowledge of Accounts if CompromisedRODC May Only Issue Local Auth TicketsBranchAdministrative Role SeparationManagement Delegated to Local UserNo Enterprise or Domain DC Membership Read-Only DC Read-Only DNS One-way Replication Credential Cache Local Admin Role
How RODC WorksAS_Req sent to RODC (request for TGT)12RODC: Looks in DB: "I don't have the users secrets"3HubBranchForwards Request to Windows Server "Longhorn" DC37Windows Server "Longhorn" DCRead Only DCWindows Server "Longhorn" DC authenticates request4425Returns authentication response and TGT back to the RODC51RODC gives TGT to User and RODC will cache credentials66At this point the user will have a hub signed TGT7
Read-only DC Mitigates Stolen DCAttacker Perspective
Read-only DC Mitigates Stolen DCHub Admin Perspective
Improved AuditingMore GranularitySupport for many auditing subcategories:  Logon, logoff, file system access, registry access, use of administrative privilege, Active DirectoryCaptures the Who, the What, & the WhenFrom and To Values for Objects or AttributesLogs All – Creates, Modifies, Moves, DeletesNew Logging InfrastructureEasier to filter out “noise” in logsTasks tied to events:  When an event occurs tasks such as sending an Email to an auditor can run automatically
Identity and Access Control
Active Directory Federation ServicesFull implementation of a ‘claims-based’ architecture based on WS-FederationFully integrated with Active DirectorySupports group, role and rules-based modelsPartner Value AddBMC, Centrify & Quest: Multi-platform supportBusiness BenefitsEnables new models for cross-company single sign-on systems Facilitates single-sign across Windows and non-Windows environmentsReduces the risk of unauthorized access by eliminating the need for cross-company synchronization of user and rights information
Authentication ImprovementsPlug and Play Smart CardsDrivers and Certificate Service Provider (CSP) includedLogin and credential prompts for User Account Control all support Smart CardsNew logon architectureGINA (the old Windows logon model) is gone  Third parties can add biometrics, one-time password tokens, and other authentication methods with much less coding
Granular Policy ControlAllows to set Password Policies on Users and/or Groups (different from the domain‘s Password Policies)Big Win for Customers:Requirements for different Password Policies do not result in deploying multiple domains anymoreNew Object-Type in Active Directory, the Password Settings ObjectPassword Settings are configured using those Objects in the Password Settings Container
ComplianceEnhancements
AD Rights Management ServicesAD RMS protects access to an organization’s digital filesAD RMS in Windows Server "Longhorn" includes several new featuresImproved installation and administration experienceSelf-enrollment of the AD RMS clusterIntegration with AD FSNew AD RMS administrative rolesSQL ServerActive DirectoryRMS Server132Information AuthorThe Recipient
BitLocker™ Drive Encryption Full Volume Encryption Key (FVEK)Encryption Policy Group  Policy allows central encryption policy and provides Branch Office protectionProvides data protection, even when the system is in unauthorized hands or is running a different or exploiting Operating SystemUses a v1.2 TPM or USB flash drive for key storage
Information ProtectionWho are you protecting against?Other users or administrators on the machine? EFSUnauthorized users with physical access? BitLocker™Some cases can result in overlap. (e.g. Multi-user roaming laptops with untrusted network admins)
Removable Device Installation ControlBenefits:Reduced Support CostsReduced Risk of Data TheftScenarios:Prevent installation of all devicesAllow installation of only allowed devicesPrevent installation of  only prohibited devices
Learning curriculumHands on labSample codesVideosSlidesE-CertificationOnline Assessment
eBooks in Bahasa
Indonesia Developer Portalhttp://geeks.netindonesia.net
IT Professional Portalhttp://wss-id.org

More Related Content

PPTX
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
PPTX
Secure Email Communications from Symantec
PPT
Symantec AntiSpam Complete Overview (PowerPoint)
PPTX
IT Pros and The Cloud
PPTX
Technology Overview - Symantec IT Management Suite (ITMS)
PPT
Technet System Center Mobile Device Manager Presentation
PPT
SkypeShield - Securing Skype for Business
PDF
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Secure Email Communications from Symantec
Symantec AntiSpam Complete Overview (PowerPoint)
IT Pros and The Cloud
Technology Overview - Symantec IT Management Suite (ITMS)
Technet System Center Mobile Device Manager Presentation
SkypeShield - Securing Skype for Business
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys

What's hot (20)

PDF
8-step Guide to Administering Windows without Domain Admin Privileges
PDF
Altiris IT Management Suite 7
PDF
Enterprise firewalls feature and benefits
PPTX
Sweden dst tpam 2014
PDF
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
PPTX
Technology Overview - Validation & ID Protection (VIP)
PDF
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
PDF
Cisco Trustsec & Security Group Tagging
PDF
Privileged Access Manager Product Q&A
PPTX
Windows 7 And Windows Server 2008 R2 Combined Value
PPT
040711 webcast securing vmachine
PPTX
Sem cis ise
PPTX
ObserveIT Remote Access Monitoring Software - Corporate Presentation
PDF
A Single Strong Authentication Platform for Cloud and On-Premise Applications
PPSX
Business Mobility - otevřete svou mysl k tomu, co je možné
PDF
Security 101: Multi-Factor Authentication for IBM i
PDF
Windows 7 security enhancements
PPTX
Dell Quest TPAM Privileged Access Control
PPTX
Build 2016 - P493 - Managing Windows in an Enterprise: Empower Your Users & P...
PPTX
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
8-step Guide to Administering Windows without Domain Admin Privileges
Altiris IT Management Suite 7
Enterprise firewalls feature and benefits
Sweden dst tpam 2014
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Technology Overview - Validation & ID Protection (VIP)
Increase IBM i Security & Accelerate Compliance with New Syncsort Security Re...
Cisco Trustsec & Security Group Tagging
Privileged Access Manager Product Q&A
Windows 7 And Windows Server 2008 R2 Combined Value
040711 webcast securing vmachine
Sem cis ise
ObserveIT Remote Access Monitoring Software - Corporate Presentation
A Single Strong Authentication Platform for Cloud and On-Premise Applications
Business Mobility - otevřete svou mysl k tomu, co je možné
Security 101: Multi-Factor Authentication for IBM i
Windows 7 security enhancements
Dell Quest TPAM Privileged Access Control
Build 2016 - P493 - Managing Windows in an Enterprise: Empower Your Users & P...
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
Ad

Similar to Windows Server 2008 Security Enhancements (20)

PPTX
Windows 7 Security Enhancements
PPTX
Microsoft Windows 7 Enhanced Security And Control
PPT
Share Point Server Security with Joel Oleson
PPTX
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
PPT
A Critical Analysis of Microsoft Data Protection Solutions
PPTX
Microsoft Platform Security Briefing
PPTX
Primend praktiline konverents - Office 365 turvalisus
PPTX
Overview of Microsoft Exchange Online
PPT
0828 Windows Server 2008 新安全功能探討
PDF
Multi-Factor Authentication Evaluation Guide.pdf
PDF
Multi-Factor Authentication Evaluation Guide.pdf
PPT
HMSC_AD Event V3
PPT
ISS SA le presenta los escenarios para IdentityGuard de Entrust
PPT
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
PPS
Microsoft (Data Protection Solutions)
PPT
How to deploy Windows Mobile to 40,000 users
PPT
Windowsserver2003twpppt
PPT
W7 for IT Professionals
PPT
W7 Enterprise
PPT
Microsoft.Virtualization.Technologies Son Vu
Windows 7 Security Enhancements
Microsoft Windows 7 Enhanced Security And Control
Share Point Server Security with Joel Oleson
Praktiline pilvekonverents - IT haldust hõlbustavad uuendused
A Critical Analysis of Microsoft Data Protection Solutions
Microsoft Platform Security Briefing
Primend praktiline konverents - Office 365 turvalisus
Overview of Microsoft Exchange Online
0828 Windows Server 2008 新安全功能探討
Multi-Factor Authentication Evaluation Guide.pdf
Multi-Factor Authentication Evaluation Guide.pdf
HMSC_AD Event V3
ISS SA le presenta los escenarios para IdentityGuard de Entrust
ISS SA le presenta los Escenarios para IdentityGuard de Entrust
Microsoft (Data Protection Solutions)
How to deploy Windows Mobile to 40,000 users
Windowsserver2003twpppt
W7 for IT Professionals
W7 Enterprise
Microsoft.Virtualization.Technologies Son Vu
Ad

Recently uploaded (20)

PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Empathic Computing: Creating Shared Understanding
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Electronic commerce courselecture one. Pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPT
Teaching material agriculture food technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Spectroscopy.pptx food analysis technology
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Empathic Computing: Creating Shared Understanding
Dropbox Q2 2025 Financial Results & Investor Presentation
Reach Out and Touch Someone: Haptics and Empathic Computing
Mobile App Security Testing_ A Comprehensive Guide.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Electronic commerce courselecture one. Pdf
20250228 LYD VKU AI Blended-Learning.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Per capita expenditure prediction using model stacking based on satellite ima...
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Teaching material agriculture food technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Programs and apps: productivity, graphics, security and other tools
Spectroscopy.pptx food analysis technology
The Rise and Fall of 3GPP – Time for a Sabbatical?

Windows Server 2008 Security Enhancements

  • 1. Security EnhancementNarendaWicaksonoIT Pro Advisor, Microsoft Indonesia
  • 2. AgendaSecurity FundamentalsThreat and Vulnerability MitigationIdentity and Access ControlCompliance EnhancementsTechnology CoverageRead Only Domain Controller, Bit Locker, Service Hardening, Server Core, Device Installation, Next Gen firewall, NAP and Terminal Services/RDP changes, Rights management, … and more
  • 3. SECURITY: FUNDAMENTALSTHREAT & VULNERABILITY MITIGATIONNetwork Access ProtectionRead-Only Domain ControllerEnhanced AuditingServer and Domain IsolationSecurity Development LifecycleWindows Service HardeningNext Generation CryptoPKI EnhancementsIDENTITY &ACCESS CONTROLCOMPLIANCE ENHANCEMENTSBitLocker™ Drive EncryptionEFS SmartcardsRights Management ServerRemovable Device ControlActive Directory Federation ServicesPlug and Play SmartcardsGranular AuditingGranular Password Control Security and Compliance
  • 5. Security Development LifecycleMandated development process for Windows Server and Windows Vista Periodic mandatory security trainingAssignment of security advisors for all components Threat modeling as part of design phaseSecurity reviews and testing built into the scheduleSecurity metrics for product teamsCommon Criteria (CC) Certification
  • 6. Windows Service HardeningDefense-in-Depth / FactoringDDDDDDDDReduce size ofhigh risk layersSegment theservicesIncrease # of layersService 1Service …Service 2Service…Service AService 3Service BKernel DriversUser-mode Drivers
  • 7. Server CoreMinimal installation optionLow surface areaCommand line interfaceLimited set of server rolesSERVER, SERVER ROLES (for example only)TSIASWebServerSharePointEtc…SERVERWith WinFx, Shell, Tools, etc.SERVER CORE SERVER ROLESDNSDHCPFileADWVIISSERVER CORESecurity, TCP/IP, File Systems, RPC,plus other Core Server Sub-SystemsGUI, CLR, Shell, IE, Media, OE, etc.
  • 9. Cryptography Next Generation (CNG) Cryptography Next GenerationIncludes algorithms for encryption, digital signatures, key exchange, and hashingSupports cryptography in kernel modeSupports the current set of CryptoAPI 1.0 algorithmsSupport for elliptic curve cryptography (ECC) algorithmsPerform basic cryptographic operations, such as creating hashes and encrypting and decrypting data
  • 10. PKI EnhancementsOnline Certificate Status Protocol (OSCP)Enterprise PKI (PKIView)Network Device Enrollment Service and Simple Certificate Enrollment ProtocolWeb Enrollment
  • 11. Windows Server FirewallMore ControlCombined firewall and IPsec management
  • 12. Windows Server FirewallMore ControlFirewall rules become more intelligent
  • 13. Windows Server FirewallMore ControlFirewall rules become more intelligent
  • 14. Windows Server FirewallMore ControlFirewall rules become more intelligent
  • 15. Windows Server FirewallMore ControlPolicy-based networking
  • 18. Servers with Sensitive DataServer IsolationHR WorkstationManaged ComputerDomain IsolationDomain IsolationManaged ComputerActive Directory Domain ControllerCorporate NetworkTrusted Resource ServerXUnmanaged/Rogue ComputerXUntrustedServer and Domain Isolation
  • 19. POLICY SERVERSe.g. MSFT Security Center, SMS, Antigenor 3rd party Fix UpServerse.g. MSFT WSUS, SMS & 3rd partyRestrictedNetworkCORPORATE NETWORKNetwork Access ProtectionWindows Server 20083Not policy compliant124MSFTNetworkPolicy Server WindowsVista ClientPolicy compliantDHCP, VPNSwitch/Router5Enhanced SecurityAll communications are authenticated, authorized & healthyDefense-in-depth on your terms with DHCP, VPN, IPsec, 802.1XPolicy-based access that IT Pros can set and controlBENEFITSIncreased Business ValuePreserves user productivity Extends existing investments in Microsoft and 3rd party infrastructure Broad industry partnership
  • 20. Read-Only Domain ControllerRead-Only Copy of AD DatabaseCan Hold all Directory Objects & AttributesMaintains Read-Only Copy of DNS ZonesHUB Writeable DC Secure LocationUnidirectional ReplicationNo Local Changes – Pull from Upstream OnlyControlled Replication - Limits Bandwidth UseCredential HandlingCan Cache User Passwords (Explicitly Set)Admin Knowledge of Accounts if CompromisedRODC May Only Issue Local Auth TicketsBranchAdministrative Role SeparationManagement Delegated to Local UserNo Enterprise or Domain DC Membership Read-Only DC Read-Only DNS One-way Replication Credential Cache Local Admin Role
  • 21. How RODC WorksAS_Req sent to RODC (request for TGT)12RODC: Looks in DB: "I don't have the users secrets"3HubBranchForwards Request to Windows Server "Longhorn" DC37Windows Server "Longhorn" DCRead Only DCWindows Server "Longhorn" DC authenticates request4425Returns authentication response and TGT back to the RODC51RODC gives TGT to User and RODC will cache credentials66At this point the user will have a hub signed TGT7
  • 22. Read-only DC Mitigates Stolen DCAttacker Perspective
  • 23. Read-only DC Mitigates Stolen DCHub Admin Perspective
  • 24. Improved AuditingMore GranularitySupport for many auditing subcategories: Logon, logoff, file system access, registry access, use of administrative privilege, Active DirectoryCaptures the Who, the What, & the WhenFrom and To Values for Objects or AttributesLogs All – Creates, Modifies, Moves, DeletesNew Logging InfrastructureEasier to filter out “noise” in logsTasks tied to events: When an event occurs tasks such as sending an Email to an auditor can run automatically
  • 26. Active Directory Federation ServicesFull implementation of a ‘claims-based’ architecture based on WS-FederationFully integrated with Active DirectorySupports group, role and rules-based modelsPartner Value AddBMC, Centrify & Quest: Multi-platform supportBusiness BenefitsEnables new models for cross-company single sign-on systems Facilitates single-sign across Windows and non-Windows environmentsReduces the risk of unauthorized access by eliminating the need for cross-company synchronization of user and rights information
  • 27. Authentication ImprovementsPlug and Play Smart CardsDrivers and Certificate Service Provider (CSP) includedLogin and credential prompts for User Account Control all support Smart CardsNew logon architectureGINA (the old Windows logon model) is gone Third parties can add biometrics, one-time password tokens, and other authentication methods with much less coding
  • 28. Granular Policy ControlAllows to set Password Policies on Users and/or Groups (different from the domain‘s Password Policies)Big Win for Customers:Requirements for different Password Policies do not result in deploying multiple domains anymoreNew Object-Type in Active Directory, the Password Settings ObjectPassword Settings are configured using those Objects in the Password Settings Container
  • 30. AD Rights Management ServicesAD RMS protects access to an organization’s digital filesAD RMS in Windows Server "Longhorn" includes several new featuresImproved installation and administration experienceSelf-enrollment of the AD RMS clusterIntegration with AD FSNew AD RMS administrative rolesSQL ServerActive DirectoryRMS Server132Information AuthorThe Recipient
  • 31. BitLocker™ Drive Encryption Full Volume Encryption Key (FVEK)Encryption Policy Group Policy allows central encryption policy and provides Branch Office protectionProvides data protection, even when the system is in unauthorized hands or is running a different or exploiting Operating SystemUses a v1.2 TPM or USB flash drive for key storage
  • 32. Information ProtectionWho are you protecting against?Other users or administrators on the machine? EFSUnauthorized users with physical access? BitLocker™Some cases can result in overlap. (e.g. Multi-user roaming laptops with untrusted network admins)
  • 33. Removable Device Installation ControlBenefits:Reduced Support CostsReduced Risk of Data TheftScenarios:Prevent installation of all devicesAllow installation of only allowed devicesPrevent installation of only prohibited devices
  • 34. Learning curriculumHands on labSample codesVideosSlidesE-CertificationOnline Assessment
  • 38. © 2009 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.