ACTIVE DIRECTORY RULES OF ENGAGEMENT
|
|
|
- Homer Burns
- 9 years ago
- Views:
Transcription
1 ACTIVE DIRECTORY RULES OF ENGAGEMENT Version: 1.14 Date: 03/21/2016 SECURITY WARNING The information contained herein is proprietary to the Commonwealth of Pennsylvania and must not be disclosed to un-authorized personnel. The recipient of this document, by its retention and use, agrees to protect the information contained herein. Readers are advised that this document may be subject to the terms of a non-disclosure agreement. DO NOT DISCLOSE ANY OF THIS INFORMATION WITHOUT OBTAINING PERMISSION FROM THE MANAGEMENT RESPONSIBLE FOR THIS DOCUMENT. Enterprise Data Center Application Management Team EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 1 OF 32
2 Version History Date Version Modified By / Approved By Section(s) Comment 4/03/ K. Will All Initial draft 5/24/2007 S. Sharma Incorporated S. Sharma comments: Replace Windows 2000 references with Windows 2003; move Total Cost of Ownership reference, add Maintenance and Backup sections 10/19/ C. Reber All Updated format to new template design. Updated URLs. 02/25/ S. White C. Reber 1.2 Updates to flow in 1.2 per S. White. 11/14/ C Reber Cover Page Insert new OA logo on cover page 03/17/ / C Reber All Update URLs 07/15/ C Reber 1.1 Update ECSA to reflect new CA2 designation. Update URLs for the deployment process. 03/04/ C Reber 3.6 Remove references to MOM and Getting Started link 03/18/ Matt Wentling / C. Reber 3.2 Change verbiage: managed by ESF to fully managed by ESF Remove examples from SRV=Service account / upd urls 05/25/ Dave Melville / C. Reber 3.3 Add new Appendix B Managing MUSER Passwords/Accounts Added new cover page and edits per OA web team standards. 11/16/ C. Reber All Change ESF to EDC. Change SC to ESR. 11/23/ Shobha Sharma / C. Reber Update USER/MUSER domain information 06/14/ Earl Gable All Update document to reflect Windows Server 2008 domain structure. 04/11/ C. Reber All Remove references to Remedy, replace with general term incident 09/15/ B. Muller All Update to reflect Windows Server 2012 R2 03/21/ Nayan Mitra Section Update to reflect new screen for password change EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 2 OF 32
3 Table of Contents 1 EDC OVERVIEW & EDC INFRASTRUCTURE EDC OVERVIEW EDC Engagement Process EDC Deployment Process Commonwealth Application Certification and Accreditation (CA 2 ) EDC INFRASTRUCTURE External DMZ Security Zone Internal Services Security Zone Internal DMZ Security Zone ACTIVE DIRECTORY IMPLEMENTATION PURPOSE / OVERVIEW Benefits ASSUMPTIONS SCHEMATIC DIAGRAM / DIAGRAM DESCRIPTION DETAILS EDC LAN (Extranet) Internet Access Business Logic Layer (BLL) PREREQUISITES IMPLEMENTATION DETAILS EDC Active Directory Implementation Details & Schematic Diagrams Location and Role of Domain Controllers EDC Active Directory Organization Units (OUs) APPS Domain USER Domain and MUSER Domain ACTIVE DIRECTORY RULES OF ENGAGEMENT RULES OF ENGAGEMENT OVERVIEW NAMING CONVENTIONS Server Names Service Accounts User Accounts SERVICES Applications Residing in Managed Services Applications Residing in EDC Co-Location Applications Residing in Agency Location EDC GROUP POLICY OBJECTS (GPOS) ROLES AND RESPONSIBILITIES MONITORING SECURITY Windows 2008 R2 Authentication Architecture Windows Methods of Authentication Certificate Authentication Forms Authentication Recommended Authentication Methods Application Security BACKUP AND RECOVERY CHANGE MANAGEMENT MAINTENANCE ACTIVE DIRECTORY AND APPLICATION DEVELOPMENT RESOURCES ACTIVE DIRECTORY RESOURCES APPLICATION DEVELOPMENT RESOURCES EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 3 OF 32
4 5 APPENDI A SCHEMA MANAGEMENT PROCESS APPENDI B MANAGING MUSER PASSWORDS/ACCOUNTS CREATING A NEW MUSER ACCOUNT RESETTING A MUSER ACCOUNT PASSWORD MUSER Password Reset Rules MUSER Password Reset Instructions EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 4 OF 32
5 1 EDC Overview & EDC Infrastructure This section contains standard information that is included in all ROE documents. 1.1 EDC OVERVIEW The Commonwealth of Pennsylvania s Enterprise Data Center (EDC) provides hosting services for agency web-based and agency specific applications. Its mission is to maintain a high level of security, availability, reliability, and management of the Commonwealth of Pennsylvania's mission critical web applications. Refer to the Enterprise Data Center website, for a full description of the EDC and all hosting and service offerings EDC Engagement Process If your agency is considering deploying applications in the EDC, first examine the EDC website to understand the EDC Services Portfolio, and then contact your Enterprise Services Representative who acts as a liaison between agencies and the EDC. They answer preliminary questions and coordinate meetings with EDC personnel to ensure consistent communication on simple or complex projects EDC Deployment Process The EDC follows a well-defined deployment process for all application deployments. Application development is performed at the agency or contractor location while the EDC houses both a staging and a production environment, which are mirror images of each other. This structured deployment and testing process ensures a stable application in production. Refer to Deploying in Managed Services to review MS deployment process documents Refer to Deploying in Managed Services Lite to review MSL deployment process documents Commonwealth Application Certification and Accreditation (CA 2 ) Prior to entering the EDC every new application is required to undergo a security assessment. It is the responsibility of each agency to ensure that the security assessment is completed for their application. Refer to Commonwealth Policy ITB-SEC005 regarding "Commonwealth Application Certification and Accreditation" Click to initiate the Commonwealth Application Certification and Accreditation (CA 2 ) Process. EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 5 OF 32
6 1.2 EDC INFRASTRUCTURE The EDC architecture is segmented into security zones that are isolated from each other via firewalls. The EDC network contains the External DMZ security zone, the Internal Services security zone, and the Internal DMZ security zone. These three primary networks are either, physically or logically, connected to one another. MAN Internet Agency MAN site Agency Firewall EDC Intranet Firewall Perimeter Firewall Internal DMZ / Services Managed Services Lite Internal DMZ Managed Services Internal Services Managed Services Internal DMZ Co-location Internal Services Co-location External DMZ Managed Services External DMZ Co-location External DMZ Managed Services Lite EDC InterZone Firewall External DMZ Security Zone The External DMZ security zone contains Internet-facing servers that are connected to the Enterprise DMZ. EDC-managed web servers (such as Managed Services) and agency-managed servers (such as Co- Location servers) both exist in the External DMZ Security zone. Managed Services and Co-Location servers are on separate subnets secured by either firewalls or Access Control Lists (ACLs) Internal Services Security Zone The Internal Services security zone contains Managed Services database servers and other application servers from which dynamic content is obtained by web servers Internal DMZ Security Zone The Internal DMZ security zone contains the Managed Web and application servers that need to be accessible only from the Commonwealth Metropolitan Area Network (MAN). This Security Zone also contains internal Co-Location databases and web and application servers that are isolated from the Managed Services servers. When EDC Domain Controllers intercommunicate in a security zone, all communications use standard RPC and do not require IPSEC encryption or authentication. Domain Controller-to-Domain Controller communications between security zones only use IPSEC with Authentication Headers (AH). Other host-to-ad Component communication in the Managed Services portion of the Enterprise Data Center does not require IPSEC. However, IPSEC is required for all communications between entities outside the Managed Services and EDC AD components. EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 6 OF 32
7 2 Active Directory Implementation 2.1 PURPOSE / OVERVIEW The Commonwealth of Pennsylvania s EDC uses the Windows Server 2012 R2 Active Directory (AD) and server infrastructure to separate the commonwealth s enterprise AD forest applications from those applications that can be accessed internally and externally. The Applications Management Team (AMT) manages the EDC Active Directory environment Benefits Based on a study conducted by Gartner, the Total Cost of Ownership for the EDC AD is a fraction of an in-agency Active Directory solution that includes hardware, software, operations, and facilities. Your agency gains these benefits when you use EDC AD: OA provides a secure location to host the Active Directory and dependent functions (such as DNS). The application can use existing authentication and authorization data from either the APPS domain (EDC) or the internal PA.LCL domain (CWOPA), which provides the agency s internal users with single sign-on to its application. Windows 2012 R2 Active Directory schema changes to accommodate applications can be made in the EDC AD forest, the PA.LCL forest, or both at the discretion of the Architectural Standards Committee and Schema Management Board. See Appendix A Schema Management Process for details. Internal IT staff is freed up to work on agency strategic initiatives. AMT will provide 24x7 monitoring, management, and support to provide increased reliability, availability, scalability, and security as well as improve application authentication through EDC Active Directory. EDC Active Directory is highly available with built-in redundancy, disaster recovery, and multiple locations for access. EDC has the knowledge and expertise to maintain and manage Active Directory and is fully engaged with Unisys and Microsoft to diagnose, troubleshoot, and resolve any issues or problems 2.2 ASSUMPTIONS This document assumes that the reader has a basic understanding of AD concepts including: Forests Domains Organization Units (OUs) Objects Schema DNS AD Management Principles Note: Appendix B Active Directory and Application Development Resources contains references that discuss each of these assumptions in depth. EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 7 OF 32
8 2.3 SCHEMATIC DIAGRAM / DIAGRAM DESCRIPTION DETAILS The network architecture is the key component of the functionality and security of the EDC LAN (extranet). This diagram shows how EDC network deployment relates to Active Directory. Three primary networks within the deployment are either - logically or physically - connected to one another to make up the EDC network: EDC LAN (Extranet) Internet Access Business Logic Layer (BLL) EDC LAN (Extranet) The extranet resides in the CTC Internet Zone (Demilitarized Zone or DMZ) and contains Internet Information Services (IIS), domain controllers, and other AD infrastructure such as DNS and WINS. Through router security permissions or the Access Control Lists (ACLs) on the router/firewall between CWOPA and the extranet, all traffic that originates from CWOPA is allowed into the extranet. If a resource on CWOPA is pushing data to a server on the extranet, all communication is allowed. In reverse, all traffic originating from the extranet is blocked going back to CWOPA. If a batch job attempts to run a process from an extranet machine that initiates communication back into CWOPA, the traffic is blocked by the ACLs on the router between CWOPA and the extranet. Data on CWOPA servers is either pushed to the extranet from the CWOPA resource or the CWOPA resource must reside in the extranet. Within the extranet, all servers are homed to the same network and are allowed to communicate with one another assuming appropriate rights between resources. EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 8 OF 32
9 The servers located in the extranet communicate back to CWOPA through Internet Protocol Security (IPSec). This table shows the approved ports and associated functions for Active Directory communication that is allowed to traverse from the extranet to internal Active Directory servers: Ports and Protocols Accessible from DMZ to CWOPA Internal Network Protocol Description 50 Encapsulating Security Protocol (ESP) for IPSEC 51 Authentication Header (AH) for IPSEC Port Type Description 20 and 21 TCP and UDP FTP 25 TCP and UDP SMTP (outbound only) 80 TCP and UDP http 443 UDP SSL Internet Access The external firewall (Internet-facing) manages traffic between the internet and the extranet. Clients accessing web sites in the Extranet are allowed to connect via the Internet once the proper credentials are supplied to the Active Directory. Ports Accessible from Internet to Extranet (DMZ) Network Port Type Description 53 TCP and UDP DNS name resolution and zone transfers 88 TCP and UDP Kerberos 389 TCP and UDP LDAP 500 UDP ISAKMP for IPSEC Business Logic Layer (BLL) The current design of the EDC DMZ allows only Internet services such as http, https, and other basic services like FTP and SMTP through the internet-facing side of the DMZ. All management and database access to co-located servers is via an intranet-only routable back-end address through the Business Logic Layer (BLL). BLL ensures that agency traffic including management traffic such as FTP, web administration, backups, terminal services, or other remote management software and back-end data traffic such as database traffic between the co-located server and the agency have a secure, higher-speed path that is not available from the Internet. To facilitate this design, a network card is added to every co-located server and configured with an intranet routable address. The default gateway is left blank for this interface, and persistent routes are added for each agency server or management station that needs BLL access. BLL security advantages are: Only http, https, FTP, and SMTP access are allowed from the Internet Separate paths exist for public and agency data BLL cannot be reached directly from the Internet EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 9 OF 32
10 BLL performance advantages are: Separate NICs and ingress/egress paths for front and back end access provide more aggregate bandwidth via less congested facilities Fewer hops and higher speed links between the data center Co-Location area and the agencies Because persistent routes need to be added to allow proper routing to agency systems across the BLL, front-end access from these same systems can be problematic. Traffic that is sent to the front-end from such a host may be routed back across the BLL, and the return traffic is sourced from the BLL address rather than the co-located server s front-end address. When this traffic reaches the agency host originating the traffic, it is dropped as invalid. To improve security, EDC operating policy states that front-end access to a co-located server is not supported for any system that accesses that same server via the BLL. However, we understand that in some cases agencies may not be able to discontinue such front-end access from management stations or servers. 2.4 PREREQUISITES Applications must meet these requirements to use EDC AD in the EDC: The application must be integrated to run on the Windows Server family of operating systems and must be able to use integrated security (Active Directory Authentication). AMT has full administrative access over the Active Directory Forest. The EDC forest trusts the CWOPA (PA.LCL) domain. This trust facilitates the single sign-on security model whereby user accounts in CWOPA can be used to grant access to the applications in the EDC. If you have non-windows based applications or another situation not identified in this document that requires Active Directory or any directory service, engage the Architectural Standards Committee at [email protected] to discuss business requirements, architecture, and possible solutions. See Appendix A Schema Management Process for details. EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 10 OF 32
11 2.5 IMPLEMENTATION DETAILS EDC Active Directory Implementation Details & Schematic Diagrams EDC implemented a single forest/multiple domain model for Active Directory. An empty root called ROOT.STATE.PA.US resides within the forest. This domain houses the Enterprise Admins role, Schema Admins role, and forest-wide FSMO roles. Applications reside in APPS.STATE.PA.US and user accounts are divided between two domains: USER.APPS.STATE.PA (USER) and MUSER.APPS.STATE.PA.US (MUSER). USER houses non-managed users or self-registered users similar to a typical portal user with customized content like PA PowerPort. USER domain security is commensurate with requirements for Internet applications. MUSER houses managed users, constituents, and vendors that must access line-of-business applications or other applications where authorization and security are critical. The sponsoring agency performs user, group, and authorization management similar to the way CWOPA is managed. This diagram shows a high-level view of the CWOPA and EDC Active Directory namespace as defined in the functional specification Location and Role of Domain Controllers Go to DIRECTORY-DNS/Domain Controller/Domain Controllers.xls to view the most up-to-date information about the domain controllers within this environment EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 11 OF 32
12 2.5.3 EDC Active Directory Organization Units (OUs) This diagram shows the Organization Units (OUs) for the EDC Active Directory namespace as defined in the functional specification. Applications reside in APPS.STATE.PA.US (APPS) and user accounts reside in USER.APPS.STATE.PA (USER) and MUSER.APPS.STATE.PA.US (MUSER) APPS Domain AMT controls and manages the APPS domain and defines and maintains all levels of OU structure. AMT recommendations for OUs in the APPS domain are: OU depth should not exceed four levels The top level OU is the agency OU and consists of the agency s 2-digit code The second level consists of the servers OU and service accounts OU Lower level OU recommendations are: 6 characters maximum length; optional if it applies to the agency s IT administration model Groups may be placed in all OUs starting from the agency OU OUs are locked down by default with changes initiated through the initial deployment process or a service request (incident ticket). Currently, delegated permissions over OUs within the APPS domain are not supported. Machine accounts are ONLY created by AMT through the initial deployment process or a service request. Delegated permission to the APPS domain is restricted to maintain stability and security for all agencies and applications. EDC personnel handle all change requests including, but not limited to, server creation/deletion, service account setup, and group policy placement. (GPO creation and management are discussed in depth in a later section.) USER Domain and MUSER Domain All self-registered users are housed in the PALogin OU for the USER domain. AMT defines and maintains the top three levels of the MUSER OU structure. AMT recommendations for OUs in the MUSER domain are: OU depth should not exceed four levels The top level OU is the agency OU and consists of the agency s 2-digit code The second level consists of the application name and user container AMT gives agencies delegated permissions over their OUs. An agency can administer only that portion of the directory that pertains to them (their own OU). Since the MUSER.APPS.STATE.PA.US domain enforces tighter security policies, EDC Tools is the only supported means of maintaining user accounts in the MUSER domain. Submit a request for EDC personnel to configure EDC Tools access for the agency application. EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 12 OF 32
13 Authorized MUSER OUAdmins can use the EDC Tools website: to create, modify, and delete users within the agency s OUs; create commonwealth employee accounts and vendor accounts; reset passwords; and unlock accounts. However, EDC Tools cannot change employee IDs that are entered incorrectly. Please reference Appendix B Managing MUSER Passwords/Accounts for instructions of how to create a new MUSER account and how to reset MUSER passwords using the EDC Password Manager. EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 13 OF 32
14 3 Active Directory Rules of Engagement 3.1 RULES OF ENGAGEMENT OVERVIEW This section discusses EDC Standards and aspects of services provided for the Active Directory. 3.2 NAMING CONVENTIONS Naming conventions provide a standard approach to naming different objects and help to troubleshoot and locate objects. All objects also need a detailed description of use. Naming conventions are as follows: Naming conventions provide a standard approach to naming different objects within Active Directory and help to troubleshoot and locate objects. All objects also need a detailed description of use. A description field is available for all User, InetOrgPerson, Computer, Group, OU and Container objects within Active Directory Server Names When a server name is based on location, browsing or searching by the first part of the server name returns all servers from all agencies (for example, searching on HBG returns all HBG servers from all agencies). Since multiple agencies exist in the same location, use the two-digit agency code at the front of the server name to locate an agency s servers, rather than the location name. As all new servers are built, the recommended naming standard is AALLLFFE, where: AA = Agency code LLL = Location code; for example: CTC = Commonwealth Technology Center, WLO = Willow Oaks, CAM = Cameron Street FF = Function code; for example: BT = BizTalk, E = Exchange Server, IS = Web Server, SQ = SQL Server, AP = Application E = Environment; for example: T = Test lab, S = Staging, D = Development, P = Production, R=Disaster Recovery = Unique number that increments based on use The recommended cluster naming standard is Server name\sc(e)(), where: SC = Server Cluster E = Environment; for example: T = Test lab, S = Staging, D = Development, P = Production, R=Disaster Recovery = Unique number; for example: 001 (should be the same as the server s name) If the application is hosted and fully managed by EDC, the predefined two-digit code is EN for Enterprise Service Accounts As an agency has more applications hosted in the Applications AD, more service accounts must be used for applications. The recommended naming standard is AASRVFFE, where: AA = Agency code SRV = Service account FF = Function code; for example: BT = BizTalk, E = Exchange Server, IS = Web Server, SQ = SQL Server, AP = Application E = Environment; for example: T = Test lab, S = Staging, D = Development, P = Production = Unique number that increments based on use If the application is hosted and fully managed by EDC, the predefined two-digit code is EN for Enterprise. EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 14 OF 32
15 3.2.3 User Accounts The server operations team performs an initial bulk creation of user accounts based on an Excel spreadsheet that the agency provides. Follow this naming standard for these accounts: A user name has three parts: a first name, a last name, and middle initial. Use these parts to construct a user account name where the variables are FirstName, LastName, and MiddleName and %n represents an integer number of characters of the variable from the left. For example, %5Godzilla is equal to Godzi. If a particular user account name already exists, follow this list until a unique user name is found: 1 - %1FirstName%9LastName 2 - %2FirstName%8LastName 10 -%1FirstName%1MiddleName%8LastName 11 -%2FirstName%1MiddleName%7LastName 18 -%1LastName%9FirstName 19 -%2LastName%8FirstName 27 -%1MiddleName%1FirstName%8LastName 28 -%1MiddleName%2FirstName%7LastName 35 -%1FirstName%8LastName%1MiddleName 36 -%2FirstName%7LastName%1MiddleName 43 -%1MiddleName%8LastName%1FirstName 44 -%1MiddleName%7LastName%2FirstName If you exhaust all these options, use numbers from 01 to 99 as suffixes to these options in order based on availability. User names should not exceed 12 characters (10 characters without numerals). 3.3 SERVICES The EDC AD is a critical part of the Enterprise architecture for single sign-on, security, and identity management. Applications can leverage the EDC Active Directory in three scenarios: as part of Managed Services, as a Co-Location customer, or for Active Directory benefits only. Within this section, front-end represents all servers and services such as the web servers, portal services, and applications, and back-end represents servers and services whose resources the front-end servers use for information or data. The EDC AD forest is optimized for use in an internet data center or hosting environment rather than a distributed corporate-like or CWOPA environment. The EDC AD is optimized to rapidly replicate directory data, handle a high volume of authentication requests per second, and facilitate tightly managed services for high reliability, availability, and security. The directory is deployed in a centralized model to accommodate these requirements optimally Applications Residing in Managed Services Managed Services is where EDC provides complete management for either or both front-end and backend servers and services located in the EDC. Managed Services uses the EDC Active Directory and is the ideal way for an agency to leverage the full enterprise infrastructure of single sign-on, identity management, security, and directory services. All servers, users, groups, and policies are maintained in Active Directory similar to the way that commonwealth employee user accounts and mailboxes are maintained in CWOPA Applications Residing in EDC Co-Location Co-Location hosting is for agencies that want to retain full management responsibility for day-to-day hosting within a secure and conditioned environment. The CTC EDC provides a highly secure and conditioned environment with access to high bandwidth and security-enhanced internet connectivity. Co-Location services also provide the benefits of Active Directory for its customers. Co-Location customers can add their servers into Active Directory to leverage single sign-on, integrated security, added server management through group policy, and complete integration with the enterprise infrastructure. Directory-enabled applications should reside in Co-Location or Managed Services for optimal directory accessibility and performance. EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 15 OF 32
16 Certain server or service configurations such as IPSEC are required for all communication with the domain. Contact your AAM for details. Applications Residing in EDC Co-Location Applications Residing in Agency Location Some agencies choose to house all of their servers in a location outside the physical and logical locale of the EDC. Agencies that need to leverage the enterprise architecture and have identified requirements to use the EDC Active Directory can leverage the EDC AD services across the network. This configuration requires careful planning and analysis to avoid unexpected problems. Agencies in this situation should contact their AAM immediately for further assistance. Another Active Directory option for remote use of directory services is to distribute a domain controller to a remote site (decentralized domain controllers). The EDC AD is deployed and optimized for a high volume hosting environment and therefore requires architectural changes to accommodate a distributed architecture. Accommodating this requirement involves multiple design and facility considerations that an agency may or may not be able to fulfill. Some factors that affect the decision for decentralized domain controllers are: EDC AD design considerations for remote placement of domain controllers such as site topology/gc placement, replication latency, and secure network transmissions EDC or agency access to physical remote domain controllers add cost and risk to managing and securing the Forest Post-deployment management and monitoring of EDC changes to domain controllers involves added complexity and cost EDC must actively manage the real available bandwidth or bandwidth guarantees from agency to EDC for Active Directory operations This list demonstrates why decentralized domain controllers are the least preferred method and not a currently supported solution. However, the EDC is committed to addressing the emerging business needs of the commonwealth. EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 16 OF 32
17 If your agency requires a distributed domain controller or remote use of the EDC Active Directory, contact your AAM to request a consultation. Please include the nature of your request and all relevant information. Applications Residing in Agency Location EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 17 OF 32
18 3.4 EDC GROUP POLICY OBJECTS (GPOS) EDC implements domain policies that include password, machine account, and user account policies. The agency maintains and applies group policy at the OU level in Co-Location. The current EDC domain policy for MUSER.APPS.STATE.PA.US is: Policy Default Setting Setting Configuration Password Policy Enforce password history is the maximum value Maximum password age Mimimum password age 0 2 Mimimum password length 0 7 Passwords must meet complexity requirements Disabled Enabled Store passwords using reverse encryption Disabled Disabled Account Lockout Policy Account lockout duration Disabled Account is locked out until Administrator unlocks it Not applied to APPS domain Account lockout threshold Disabled 5 Accounts locked out after 5 failed attempts Reset account lockout counter after Disabled 720 Failed attempt reset after 12 hours Audit Policy Audit account logon events No auditing Success, Failure Audit account management No auditing Success, Failure Audit directory service access No auditing No auditing Audit logon events No auditing Success, Failure Audit object access No auditing Failure Audit policy change No auditing Success, Failure Audit privilege use No auditing Failure Audit process tracking No auditing No auditing Audit system events No auditing Failure Security Options Allow system to be shut down without having to log on Disabled Restrict CD-ROM access to locally logged-on user only Enable File servers may need to share CD-ROMs Restrict floppy access to locally logged-on user only Enable Smart card removal behavior No action Force logoff Event Log Policy Maximum application log size 512 kilobytes 5056 kilobytes Maximum security log size 512 kilobytes kilobytes Maximum system log size 512 kilobytes 5056 kilobytes EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 18 OF 32
19 Policy Default Setting Setting Configuration Prevent Local Guest group from accessing application log Disabled Enabled Prevent Local Guest group from accessing security log Disabled Enabled Prevent Local Guest group from accessing system log Disabled Enabled Retain application log Retain security log Retain system log Retention method for application log Retention method for security log Retention method for system log Not defined Not defined Not defined As needed As needed As needed Event Log ACL Not configured Enabled Configure the Registry so that only domain administrators can clear event logs System Services Alerter Computer Browser DHCP Client Distributed File System Distributed Link Tracking Client Distributed Transaction Coordinator DNS Client Event Log IPSEC Services License Logging Local Disk Manager Messenger Net Logon Plug and Play Print Spooler Protected Storage Remote Procedure Call (RPC) Remote Registry Removable Storage Secondary Logon Security Accounts Manager Server Smptsvc EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 19 OF 32
20 Policy Default Setting Setting Configuration System Event Notification Task Scheduler TCP/IP NetBIOS Helper Windows Time Workstation Application Management Manual ClipBook Manual Network DDE Manual Network DDE DSDM Manual Remote Access Connection Manager Manual Rsvp Manual \Winnt and all subfolders File System Policy Administators SYSTEM CREATOR/OWNER Domain Users Full Control Full Control Full Control Read \Winnt\Repair Administators Full Control \Winnt\System32\config \Winnt\System32\spool <log partition> Control Panel Administators SYSTEM CREATOR/OWNER Domain Users Administators SYSTEM CREATOR/OWNER Power Users (w/s only) Domain Users Administators SYSTEM CREATOR/OWNER Everyone Full Control Full Control Full Control List Full Control Full Control Full Control Full Control Read Full Control Full Control Full Control None Hide Screen Saver tab Not configured Not configured Users should not be able to change the screen saver Screen saver executable name Not configured Not configured 32-bit logon screen saver Password protect the screen saver Not configured Not configured Password protection needed Screen saver timeout Not configured Not configured Terminal Services Set time limit for disconnected sessions Not configured Enabled End a disconnected session: 1 day EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 20 OF 32
21 Policy Default Setting Setting Configuration Set time limit for active but idle Terminal Services sessions Not configured Enabled Idle session limit: 1 day Terminate session when time limits are reached Not configured Enabled 3.5 ROLES AND RESPONSIBILITIES This table outlines the administrative and management task responsibilities for EDC, Customer, and combined AMT and Customer. AMT has completed most of its responsibilities in setting up Active Directory. Role/Responsibility EDC Reponsibility Customer Responsibility Domain Management FSMO Replication Domain Policy Password Policy Schema Management Group Policy (Common) Domain Controller Maintain operating system Apply service packs/security rollup packages/patches Apply security templates Disaster recovery Deploy/Install DC OU Management Create top level (Agency OU) Permissions on top level Create Secondary/Tertiary Permissions on second and third level OU Create group policies (OU only for agency in Co-Location) User Management Create users Create groups Modify users Modify groups Delete users Delete groups Create machine accounts EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 21 OF 32
22 Delete machine accounts EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 22 OF 32
23 3.6 MONITORING Since Active Directory is such a critical component of the EDC infrastructure and the applications running in this environment, monitoring and managing Active Directory is essential to ensure the availability and performance of agency business applications. EDC operations deliver an enterprise-class solution for operations management and monitoring of Windows servers, Windows infrastructure including Active Directory, and.net Enterprise servers such as SQL server. EDC manages critical functions to ensure that Active Directory services are operational and performing at a high degree of reliability. The Active Directory health indicators that EDC considers critical are: Ability for users to log on quickly to access to network resources Quick responses to LDAP queries Consistent data on all domain controllers Replication occurs within expected timeframes Quick response to correcting outages All role masters up and running Stable CPU usage on Domain Controllers Reduced WAN traffic To monitor these AD critical functions, SCOM uses these indicators to ensure EDC AD health: No errors or warnings in relevant logs such as AD, DFS, LSASS, and many more Replication latency CPU utilization Free space Disk queue length LDAP ping/query times Cache hit rates Role holder priorities 3.7 SECURITY Windows 2012 R2 Authentication Architecture Windows 2012 R2 is built upon two basic authentication types: local (or interactive) authentication and network (or non-interactive) authentication. Each authentication type has a slightly different architecture. A local authentication occurs when a user logs on through a user interface. (For example, a user initiates a workstation logon sequence such as CTRL-ALT-DEL to authenticate to a Windows 2012 R2 machine or domain.) This type of authentication is not currently implemented or supported in the EDC infrastructure. However, to accommodate an agency s unique needs, this requirement involves decisions regarding: VPN access from the agency to the EDC (Changes to firewall rules) Terminal Server access to applications that reside in the EDC for interactive use (Infrastructure considerations) A network authentication occurs when a client application calls the Security Support Provider Interface (SSPI) to establish a secure network connection. This type of authentication is supported in EDC and is the primary focus for the guidance provided in this document. Windows 2012 R2 authentication architecture updates include: Kerberos; Microsoft's Kerberos version 5 (v5) protocol is an authentication mechanism based upon a publicly available protocol. The SSP uses mutual authentication between a client computer and server or between one server and another, within an Active Directory domain. Negotiate package; a security support provider (SSP) in Windows that provides authentication and encryption. Its role is to negotiate which authentication protocol to use based on the protocols supported on the client computer and server for an authentication request. In versions of Windows earlier than Windows 7 and Windows Server 2012 R2, the Negotiate package supports NTLM and EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 23 OF 32
24 Kerberos. For Windows 7 and Windows Server 2012 R2, the Negotiate package has been updated to support additional SSPs. Authentication credentials stored in the Active Directory that replace the NT4 SAM on domain controllers Windows Methods of Authentication Windows methods of authentication through IIS are: Method Anonymous Basic Digest Integrated Description All users authenticate as the IUSR_machinename account. Use only for unrestricted parts of the site. Basic authentication requests a user name and password for verification, but the user's details are transmitted to the server in clear text. Security is not very good because the packets can be intercepted and credentials stolen. Security can be increased by using the Secure Sockets Layer (SSL), which provides a secure communications channel for the transfer of sensitive information. Digest authentication requests a user name and password before allowing access to the restricted areas of a site. Digest authentication does not send the credentials using clear text as basic authentication does; instead it uses a hashing mechanism to encrypt the data before transmission. In integrated Windows authentication the user s NT domain or Active Directory service account is used for authentication. Since integrated Windows encrypts transmitted data, it is ideal for intranet solutions Certificate Authentication Certificate authentication uses a certificate, or key, stored on the client's computer to verify the user's identification. The certificate is automatically presented for authentication when a restricted resource is requested. If a certificate is not present, access is granted using the guest account. Certificates can be mapped to a single NT domain or Active Directory account (many-to-one mapping) or each certificate can be mapped to a separate account (one-to-one mapping) Forms Authentication Forms authentication uses a custom web page to request a user's logon credentials for restricted areas of a web site. The logon form does not perform user verification; it is solely for collecting authentication details. Custom code validates the user's credentials against a data store for authentication. After the user has been authenticated, a token is returned. The token verifies the user for each subsequent access to a restricted part of a web site. Use cookies or a custom mechanism such as a unique identifier in the URL query string or hidden fields to identify users after they have logged on Recommended Authentication Methods We recommend these authentication methods: Method Intranet site Extranet site Description We recommend Integrated Windows authentication if the web site meets this criteria: All users have an NT domain or Active Directory account. Access is exclusively through Internet Explorer. No unrestricted areas exist. Any one of three forms of authentication are suitable if the web site meets this criteria: Users are from both internal and external sources. Some unrestricted areas exist. Suitable authentications are: Basic authentication Certificate authentication Forms authentication Certificate authentication provides seamless authentication by allowing associated certificates to NT domain or Active Directory accounts. Certificate authentication is a very secure solution for sensitive data stored on the web site. EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 24 OF 32
25 Use forms authentication if you do not want to create NT domain or Active Directory accounts for your external users. We also prefer forms authentication if the cost of managing certificates outweighs the added security value. Basic authentication requests a user name and password for verification. SSL provides a secure communications channel for the transfer of sensitive information. After a user is authenticated, verify access rights for the requested resource. If the resource is a file system resource such as a template file, check the ACL. If the user is: Listed in the ACL and has sufficient privileges to perform the requested function, grant access. Not listed in the ACL or does not have sufficient access privileges, deny access to the resource Application Security PALogin Application External constituents must have a PALogin account to have access and single sign-on to all EDC web sites. Accounts that use PALogin to login to the state websites are housed within the USER.APPS.STATE.PA.US domain. This domain does not have any account restrictions such as lockout, minimum password length, or password strength. The constituent manages these accounts (for example, changing a password). These Internet user accounts do not have any access to the internal PA.LCL environment. SQL Authentication Use digest authentication or integrated security for SQL service. Do not use built-in SA account or account database. SQL security can be shared EDC SQL or agency-owned SQL (installed in the agency location or EDC Co-Location). For EDC shared SQL, give owners permissions for SA type rights to their database but not the entire server. For agency-owned SQL, use digest authentication or integrated security with Active Directory. Application Authentication Use digest authentication or integrated security for applications. Do not use built-in authentication / authorization. Terminal Services Authentication Use certificates or integrated security for Terminal Services. Do not use digest or basic model authentication. 3.8 BACKUP AND RECOVERY EDC performs a full backup of Managed Services servers nightly, Monday through Friday, and incremental backups on Sundays. Tapes are sent to an off-site facility weekly. The EDC also maintains a weekly, monthly, and yearly tape archive. Daily and weekly tapes are redeployed in the rotation scheme; yearly backups are retained for seven years. Refer to EDC BACKUP AND RECOVERY OVERVIEW for an overview of EDC Managed Services backup and recovery policies, procedures, and licensing: 3.9 CHANGE MANAGEMENT Refer to EDC CHANGE MANAGEMENT PROCESS AND PROCEDURES to review standard EDC change management processes MAINTENANCE The agency specifies available maintenance windows for the EDC to perform maintenance for each application. The EDC performs Enterprise maintenance that affects a large number of applications during the Enterprise maintenance window. EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 25 OF 32
26 4 Active Directory and Application Development Resources This appendix summarizes important references to Active Directory concepts and components. 4.1 ACTIVE DIRECTORY RESOURCES Designing and Deploying Directory and Security Services: Best Practice Guide for Securing Windows Server Active Directory Installations Windows Server 2012 R2 Deployment Guide DNS and Active Directory Windows DNS Guide FSMO Placement and Optimization on Active Directory Domain Controllers For non-microsoft-specific DNS information, see Albitz, Paul, and Cricket Liu. DNS and BIND Sebastopol: O Reilly & Associates, Inc., 2001 EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 26 OF 32
27 4.2 APPLICATION DEVELOPMENT RESOURCES The Active Directory provides rich support for locating and working with AD objects. Review these links to documents, sites, and sample code that helps with the deployment, administration, and development of applications built upon Active Directory, Active Directory Services Interface (ADSI), and Directory Services. Active Directory Schema ADSI Using Active Directory Roles Sample EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 27 OF 32
28 5 Appendix A Schema Management Process The EDC works closely with and participates in the Architectural Standards Committee (ASC). The ASC works with agencies to understand evolving business requirements and help to leverage, protect, and extend the existing Commonwealth infrastructure. This document describes Active Directory, as it exists today in EDC. The AD product and AD in the Commonwealth (CWOPA) is vastly more complex and encompassing. When you think about the schema, remember: Schema changes are global. An entire forest has a single schema that is globally replicated. A copy of the schema exists on every domain controller in the forest. When you extend the schema, you do so for the entire forest. Schema additions are not reversible. When a new class or attribute is added to the schema, it cannot be removed. An existing attribute or class can be disabled but not removed. Refer to Disabling Existing Classes and Attributes at for more information Disabling a class or attribute does not affect existing instances of the class or attribute, but it prevents new instances from being created. You cannot disable an attribute if it is included in any class that is not disabled. Because the schema is a key part of the directory that affects the entire forest, special restrictions apply to schema extensions. To reduce the possibility of schema changes by one application breaking other applications and to maintain schema consistency, the EDC enforces restrictions on the type of schema changes that an application or user is allowed to make. To engage the ASC, an agency works through their AAM: Contact your AAM (see EDC Engagement Process) Create an addressed to your AAM and include as much of this information as possible: Problem statement Business case Business impact Requirements Diagrams and functional specifications Contact information The commonwealth s appointed technical representative (team technical lead), Microsoft premier support, and other appropriate individuals pre-screen the request to ensure that the object/attribute size, numbers, and rate of change do not exceed the recommended AD maximums. In addition, the technical representative identifies any currently unused attributes that might be adapted, or any commonwealthdeveloped, currently used attributes which might fulfill the need. If approved, the requested attributes and object classes are assigned new names and object identifiers (OIDs) - which are documented by a commonwealth appointed technical representative. To ensure that the modifications have been correctly inserted into the Active Directory, application developers load the schema modifications into a test forest and validate them with Microsoft, the operations team, and other members of applicable team(s). EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 28 OF 32
29 6 Appendix B Managing MUSER Passwords/Accounts To manage MUSER end user accounts and passwords for applications leveraging the MUSER domain via EDC Tools, follow the instructions below: 6.1 CREATING A NEW MUSER ACCOUNT To create a new MUSER account, 1. Access EDC Tools: and login using your CWOPA account. 2. Select the OU you have been granted access to manage from the drop-down menu and then select the Create New User link. 3. Enter user information for the new account, then enter and verify a temporary password and select the Update User button. Important: Leave the Must Change password at next logon checked. 4. Send the temporary password to the user along with the instructions in 6.22 step 2. EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 29 OF 32
30 6.2 RESETTING A MUSER ACCOUNT PASSWORD MUSER Password Reset Rules Please remember when resetting an end-user MUSER password via EDC Tools that it is only a temporary password. Once this is done, the user is required to change their password before accessing any applications: o Use EDC Password Manager available at MUSER passwords have a minimum age of 15 days. This means that once a user changes their password in EDC Password Manager they cannot change it again for 15 days. If they require it to be changed a new temporary password will need set via EDC Tools. If you create a temporary MUSER password for someone and they log into an application, web site, etc before changing their password they will be unable to change the password themselves for 15 days due to the password age. If they need the password changed, a new temporary password should be set via EDC Tools and the user must go to EDC Password Manager to change it themselves. MUSER passwords must meet the following requirements: Passwords must be at least 8 characters in length and contain characters from 3 of the categories below. o Upper case letters [A, B, C, Z] o Lower case letter [a, b, c, z] o Numerals [0, 1, 2, etc] o Non-alphanumeric characters #, $, etc] Passwords expire every 60 days MUSER Password Reset Instructions The MUSER password reset is a 2 step process where the agency admin first creates a new temporary password and the end user then resets the temporary password to a user defined value. 1. Agency administrator creates a temporary MUSER password a. Access EDC (ESF) Tools, and login using your CWOPA account. b. Select the OU you have been granted access to manage, from the drop-down menu. EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 30 OF 32
31 c. Select Modify to the right of the user information. d. Type a temporary password and verify it, then click Reset Password Important: You must leave the Must Change password at next logon checked. EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 31 OF 32
32 e. A Password set confirmation message is displayed. f. Send the temporary password to the user along with the instructions in step The end user is required to change the temporary password to a self-defined password a. Go to EDC Password Manager available at to create your own password. b. Enter your MUSER account as username. c. Enter the temporary MUSER password sent to you in the Old Password field d. Create your new MUSER password and confirm. The password must meet the requirements noted below. e. Select OK. NOTE: MUSER passwords must meet the following requirements: o o Passwords must be at least 8 characters in length and contain characters from 3 of the categories below. Upper case letters [A, B, C, Z] Lower case letter [a, b, c, z] Numerals [0, 1, 2, etc] Non-alphanumeric characters #, $, etc] Passwords expire every 60 days. f. A confirmation message is displayed. You will now be able to access your MUSER applications with their own password. NOTE: If an error message is displayed, please return to the previous screen and try again. Make sure to follow the password rules and requirements. If blank fields are shown after Change Password is clicked, please try again. EDC ACTIVE DIRECTORY RULES OF ENGAGEMENT PAGE 32 OF 32
Walton Centre. Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure
Page 1 Walton Centre Access and Authentication (network) Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure Page 2 Table of Contents Section
SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)
WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term
Enterprise Data Center (EDC) SQL Server Database Services
Enterprise Data Center (EDC) SQL Server Database Services Rules of Engagement Application Management Team Version 1.0 October, 09, 2015 SECURITY WARNING The information contained herein is proprietary
ENTERPRISE DATA CENTER CSS HARDWARE LOAD BALANCING POLICY
CSS HARDWARE LOAD BALANCING POLICY Version 2.5 Date: 04/11/2014 SECURITY WARNING The information contained herein is proprietary to the Commonwealth of Pennsylvania and must not be disclosed to un-authorized
Agency Pre Migration Tasks
Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required
Windows Server 2008/2012 Server Hardening
Account Policies Enforce password history 24 Maximum Password Age - 42 days Minimum Password Age 2 days Minimum password length - 8 characters Password Complexity - Enable Store Password using Reversible
NETWRIX PASSWORD MANAGER
NETWRIX PASSWORD MANAGER ADMINISTRATOR S GUIDE Product Version: 6.1 February/2012 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Question Number (ID) : 1 (jaamsp_mngnwi-025) Lisa would like to configure five of her 15 Web servers, which are running Microsoft Windows Server 2003, Web Edition, to always receive specific IP addresses
Barracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
Windows Server 2003 default services
Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance
Deploying F5 with Microsoft Active Directory Federation Services
F5 Deployment Guide Deploying F5 with Microsoft Active Directory Federation Services This F5 deployment guide provides detailed information on how to deploy Microsoft Active Directory Federation Services
How to Secure a Groove Manager Web Site
How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,
Virtual Data Centre. User Guide
Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10
Websense Support Webinar: Questions and Answers
Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server
ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server Inhalte Teil 01 Network Architecture Standards Network Components and Terminology Network Architecture Network Media Access Control Methods
MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)
MCSE 2003 Microsoft Certified Systems Engineer (MCSE) candidates on the Microsoft Windows Server 2003 track are required to satisfy the following requirements: Core Exams (6 Exams Required) Four networking
AV-006: Installing, Administering and Configuring Windows Server 2012
AV-006: Installing, Administering and Configuring Windows Server 2012 Career Details Duration 105 hours Prerequisites This course requires that student meet the following prerequisites, including that
SKV PROPOSAL TO CLT FOR ACTIVE DIRECTORY AND DNS IMPLEMENTATION
SKV PROPOSAL TO CLT FOR ACTIVE DIRECTORY AND DNS IMPLEMENTATION Date: April 22,2013 Prepared by: Sainath K.E.V Microsoft Most Valuable Professional Introduction: SKV Consulting is a Premier Consulting
Password Reset PRO INSTALLATION GUIDE
Password Reset PRO INSTALLATION GUIDE This guide covers the new features and settings available in Password Reset PRO. Please read this guide completely to ensure a trouble-free installation. March 2009
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
NETWRIX ACCOUNT LOCKOUT EXAMINER
NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a
Configuring Sponsor Authentication
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
SharePoint 2013 Logical Architecture
SharePoint 2013 Logical Architecture This document is provided "as-is". Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and
Enabling single sign-on for Cognos 8/10 with Active Directory
Enabling single sign-on for Cognos 8/10 with Active Directory Overview QueryVision Note: Overview This document pulls together information from a number of QueryVision and IBM/Cognos material that are
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
A Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
VMware Identity Manager Connector Installation and Configuration
VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites
BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
DirectAccess in Windows 7 and Windows Server 2008 R2. Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team
DirectAccess in Windows 7 and Windows Server 2008 R2 Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team 0 Introduction to DirectAccess Increasingly, people envision a world
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab
Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab Microsoft Corporation Published: May, 2005 Author: Microsoft Corporation Abstract This guide describes how to create
Vendor Questionnaire
Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining
Embedded Web Server Security
Embedded Web Server Security Administrator's Guide September 2014 www.lexmark.com Model(s): C54x, C73x, C746, C748, C792, C925, C950, E260, E360, E46x, T65x, W850, X264, X36x, X46x, X543, X544, X546, X548,
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
Customer Tips. Basic E-mail Configuration and Troubleshooting. for the user. Overview. Basic Configuration. Xerox Multifunction Devices.
Xerox Multifunction Devices Customer Tips November 24, 2003 This document applies to these Xerox products: x WC Pro 32/40 Color x WC Pro 65/75/90 x WC Pro 35/45/55 WC M35/M45/M55 x DC 555/545/535 x DC
vcloud Air - Virtual Private Cloud OnDemand Networking Guide
vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Siteminder Integration Guide
Integrating Siteminder with SA SA - Siteminder Integration Guide Abstract The Junos Pulse Secure Access (SA) platform supports the Netegrity Siteminder authentication and authorization server along with
How to Install Microsoft Mobile Information Server 2002 Server ActiveSync. Joey Masterson
How to Install Microsoft Mobile Information Server 2002 Server ActiveSync Joey Masterson How to Install Microsoft Mobile Information Server 2002 Server ActiveSync Joey Masterson Copyright Information
redcoal EmailSMS for MS Outlook and Lotus Notes
redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: [email protected] Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
How To Secure Your Data Center From Hackers
Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard
This chapter describes how to set up and manage VPN service in Mac OS X Server.
6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure
nappliance misa Server 2006 Standard Edition Users Guide For use with misa Appliances 2006 nappliance Networks, Inc.
nappliance misa Server 2006 Standard Edition Users Guide For use with misa Appliances The information contained in this document represents the current view of Microsoft Corporation on the issues discussed
Advanced Administration
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
Step By Step Guide: Demonstrate DirectAccess in a Test Lab
Step By Step Guide: Demonstrate DirectAccess in a Test Lab Microsoft Corporation Published: May 2009 Updated: October 2009 Abstract DirectAccess is a new feature in the Windows 7 and Windows Server 2008
Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements
Creating the Conceptual Design by Gathering and Analyzing Business and Technical Requirements Analyze the impact of Active Directory on the existing technical environment. Analyze hardware and software
Planning Domain Controller Capacity
C H A P T E R 4 Planning Domain Controller Capacity Planning domain controller capacity helps you determine the appropriate number of domain controllers to place in each domain that is represented in a
Backup Exec Private Cloud Services. Planning and Deployment Guide
Backup Exec Private Cloud Services Planning and Deployment Guide Chapter 1 Introducing Backup Exec Private Cloud Services This chapter includes the following topics: About Backup Exec Private Cloud Services
Barracuda SSL VPN Administrator s Guide
Barracuda SSL VPN Administrator s Guide Version 1.5.x Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2004-2009, Barracuda Networks,
Networking Best Practices Guide. Version 6.5
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected]
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
Password Reset PRO. Quick Setup Guide for Single Server or Two-Tier Installation
Password Reset PRO Quick Setup Guide for Single Server or Two-Tier Installation This guide covers the features and settings available in Password Reset PRO version 3.x.x. Please read this guide completely
How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (
UAG715 Support Note Revision 1.00 August, 2012 Written by CSO Scenario 1 - Trunk Interface (Dual WAN) Application Scenario The Internet has become an integral part of our lives; therefore, a smooth Internet
CHARON-VAX application note
CHARON-VAX application note AN-33 Required Windows Standard Services Author: Software Resources International Date: 16-Jan-2006 Software Resources International (SRI) recommends the use of the host operating
Dell Spotlight on Active Directory 6.8.4. Deployment Guide
Dell Spotlight on Active Directory 6.8.4 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5
DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites
70-413: Designing and Implementing a Server Infrastructure
70-413: Designing and Implementing a Server Infrastructure Course Overview This course covers everything you need to know about designing and implementing a server infrastructure. Students will learn about
Understanding and Configuring Password Manager for Maximum Benefits
Understanding and Configuring Password Manager for Maximum Benefits Written by Chris Radband, senior professional services consultant, Dell Software Introduction About Password Manager The pain of password
Security Options... 1
Effective Server Security Options Period: Last 20 week(s) Generated: For: Brian Bartlett [email protected] By: Ecora Auditor Professional 4.5 - Windows Module 4.5.8010.20310 Using: Customized FFR Definition
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0
Internetworking Microsoft TCP/IP on Microsoft Windows NT 4.0 Course length: 5 Days Course No. 688 - Five days - Instructor-led Introduction This course provides students with the knowledge and skills required
RSA Authentication Manager 7.1 Basic Exercises
RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo
Web Plus Security Features and Recommendations
Web Plus Security Features and Recommendations (Based on Web Plus Version 3.x) Centers for Disease Control and Prevention National Center for Chronic Disease Prevention and Health Promotion Division of
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
Novi Survey Installation & Upgrade Guide
Novi Survey Installation & Upgrade Guide Introduction This procedure documents the step to create a new install of Novi Survey and to upgrade an existing install of Novi Survey. By installing or upgrading
OVERVIEW OF TYPICAL WINDOWS SERVER ROLES
OVERVIEW OF TYPICAL WINDOWS SERVER ROLES Before you start Objectives: learn about common server roles which can be used in Windows environment. Prerequisites: no prerequisites. Key terms: network, server,
About Microsoft Windows Server 2003
About Microsoft Windows Server 003 Windows Server 003 (WinK3) requires extensive provisioning to meet both industry best practices and regulatory compliance. By default the Windows Server operating system
multiple placeholders bound to one definition, 158 page approval not match author/editor rights, 157 problems with, 156 troubleshooting, 156 158
Index A Active Directory Active Directory nested groups, 96 creating user accounts, 67 custom authentication, 66 group members cannot log on, 153 mapping certificates, 65 mapping user to Active Directory
Administrator's Guide
Administrator's Guide Contents Administrator's Guide... 7 Using Web Config Network Configuration Software... 8 About Web Config... 8 Accessing Web Config... 8 Restricting Features Available for Users...
GRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
Barracuda Link Balancer
Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב ע"ש ספיר
מודולות הלימוד של מייקרוסופט הקורס מחולק ל 4 מודולות כמפורט:.1Configuring Microsoft Windows Vista Client 70-620 Installing and upgrading Windows Vista Identify hardware requirements. Perform a clean installation.
iboss Enterprise Deployment Guide iboss Web Filters
iboss Enterprise Deployment Guide iboss Web Filters Copyright Phantom Technologies, Inc. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Web. Security Options Comparison
Web 3 Security Options Comparison Windows Server 2003 provides a number of Security Options that can be applied within the scope of managing a GPO. Most are the same as those available in Windows 2000.
Two-Factor Authentication
Two-Factor Authentication IT Professional & Customer Service Desk Feature Guide Two-Factor Authentication for Exchange Online Office 365 Dedicated & ITAR-Support Plans April 26, 2013 The information contained
Fundamentals of Windows Server 2008 Network and Applications Infrastructure
Fundamentals of Windows Server 2008 Network and Applications Infrastructure MOC6420 About this Course This five-day instructor-led course introduces students to network and applications infrastructure
Lesson Plans Managing a Windows 2003 Network Infrastructure
Lesson Plans Managing a Windows 2003 Network Infrastructure (Exam 70-291) Table of Contents Course Overview... 2 Section 0.1: Introduction... 3 Section 1.1: Client Configuration... 4 Section 1.2: IP Addressing...
Kerio VPN Client. User Guide. Kerio Technologies
Kerio VPN Client User Guide Kerio Technologies 2011 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on Kerio VPN Client, version 7.1 for Windows. All additional
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
DIGIPASS Authentication for Citrix Access Gateway VPN Connections
DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer
Active Directory Restructuring Recommendations
Active Directory Restructuring Recommendations Version 2.0 - Final September 7, 2004 Authored By: Jenn Goth Microsoft Services [email protected] Contributors: Brian Redmond Microsoft Services [email protected]
