Jay Ferron. Blog.mir.net. CEHi, CWSP, CISM, CISSP, CVEi. MCITP, MCT, MVP, NSA IAM. Jay@ferron.com



Similar documents
Deploying Microsoft Windows Rights Management Services

Implementing Active Directory Rights Management Services with Exchange and SharePoint

Configuring Advanced Windows Server 2012 Services

Course Outline: Course Configuring Advanced Windows Server 2012 Services

Configuring Advanced Windows Server 2012 Services MOC 20412

MS Configuring Advanced Windows Server 2012 Services

Configuring Advanced Windows Server 2012 Services Course 20412

Configuring Advanced Windows Server 2012 Services 5 Days

Configuring Advanced Windows Server 2012 Services

"Charting the Course... MOC D Configuring Advanced Windows Server 2012 Services Course Summary

Active Directory Rights Management Services integration (AD RMS)

This version of this course is built on the final release version of Windows Server 2012.

Course 20412A: Configuring Advanced Windows Server 2012 Services

Rights Management Services

Course Outline. Course 20412B: Configuring Advanced Windows Server 2012 Services. Duration: 5 Days

Configuring Advanced Windows Server 2012 Services Course# 20412D

Configuring Advanced Windows Server 2012 Services

70-414: Implementing a Cloud Based Infrastructure. Course Overview

Build Your Knowledge!

MS Implementing an Advanced Server Infrastructure

Training Name Installing and Configuring Windows Server 2012

Quality is Advantage

Hosts HARDENING WINDOWS NETWORKS TRAINING

Lab : Planning and Implementing a Virtual Machine Deployment and Management Strategy

Implementing an Advanced Server Infrastructure

Active Directory Services with Windows Server MOC 10969

MCSA: Windows Server 2012 Boot Camp

What s in Installing and Configuring Windows Server 2012 (70-410):

MCSA Instructor-led Live Online Training Program. Course Outline MCSA Deploying and Managing Windows Server 2012

Course 20465C: Designing a Data Solution with Microsoft SQL Server

Active Directory Services with Windows Server

SINGLE COURSE. 136 Total Hours. After completing this course, students will be able to:

SQL Server for Database Administrators Course Syllabus

6436: Designing a Windows Server 2008 Active Directory Infrastructure and Services (5 Days)

You need to recommend a monitoring solution to ensure that an administrator can review the availability information of Service1. What should you do?

Planning for Windows Server 2008 Servers

AV-006: Installing, Administering and Configuring Windows Server 2012

Computer Visions Course Outline

Configuring and Troubleshooting Identity and Access Solutions with Windows Server 2008 Active Directory

Course Active Directory Services with Windows Server

Implementing a Microsoft SQL Server 2005 Database

Active Directory Services with Windows Server 10969B; 5 days, Instructor-led

Microsoft SharePoint 2007: for End Users and Site Owner

Protect Sensitive Data Using Encryption Technologies. Ravi Sankar Technology Evangelist Microsoft Corporation

Designing a Windows Server 2008 Active Directory Infrastructure and Services

MS 20465C: Designing a Data Solution with Microsoft SQL Server

Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008

MS 10135B Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010

SQM. Maintaining Microsoft SQL for Broadcast Engineers. Training Course Outline

Windows Server : Advanced Services 3 1 1

Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008

Designing a Data Solution with Microsoft SQL Server 2014

Microsoft Active Directory Services with Windows Server

Microsoft SharePoint 2010 Administration

NIIT Education and Training, Doha, Qatar - Contact: /1798;

MOC 6436A: Designing Active Directory Infrastructure and Services in Windows Server 2008

Designing a Data Solution with Microsoft SQL Server

MS Exam Objectives Configuring Advanced Windows Server 2012 Services

Course 10969A Active Directory Services with Windows Server

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

סילבוס -MCITP מנהלי רשתות

70-412: Configuring Advanced Windows Server 2012 Services

Course 20465: Designing a Data Solution with Microsoft SQL Server

Designing a Data Solution with Microsoft SQL Server

Rand Morimoto, Ph.D., MCITP. Michael Noel, MVF? MCITP. Omar Droubi, MCSE. Ross Mistry, MVF? MCITP

Module 2: Deploying and Managing Active Directory Certificate Services

This course is intended for IT professionals who are responsible for the Exchange Server messaging environment in an enterprise.

Implementing an Advanced Server Infrastructure

Sophos for Microsoft SharePoint startup guide

Report on CAP Cybersecurity November 5, 2015

AD RMS Microsoft Federation Gateway Support Installation and Configuration Guide... 3 About this guide... 3

Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack B; 5 days, Instructor-led

Course Syllabus. 6416: Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server Key Data.

Designing a Windows Server 2008 Active Directory Infrastructure and Services

MS 20417B: Upgrading Your Skills to MCSA Windows Server 2012

MCSA Windows Server Eğitimi İçeriği

MS 20341B: Core Solutions of Microsoft Exchange Server 2013

Jay Ferron. Blog.mir.net. CEHi, CWSP, CISM, CISSP, CVEi. MCITP, MCT, MVP, NSA IAM.

Course 5431: Getting Started with Microsoft Office PowerPoint Course 5420: Editing and Proofreading Documents in Microsoft Office Word 2007

Course 20465C: Designing a Data Solution with Microsoft SQL Server

BEING MOBILE WITH WINDOWS 8.1

10231B: Designing a Microsoft SharePoint 2010 Infrastructure

Microsoft Dynamics CRM 2011 Installation and Deployment

Vormetric Data Security

50412: Implementing Active Directory Federation Services 2.0

MCITP MCITP: Enterprise Administrator on Windows Server 2008 (5 Modules)

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 616 Securing Windows Infrastructure. Make The Difference CAST.

ITCertMaster. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008 (MS6416)

Course Syllabus. Maintaining a Microsoft SQL Server 2005 Database. At Course Completion

LEARNING SOLUTIONS website milner.com/learning phone

Designing a Data Solution with Microsoft SQL Server 2014

MS Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010

ABOUT THIS COURSE AT COURSE COMPLETION PREREQUISITES COURSE OUTLINE. Core Solutions of Microsoft Exchange Server 2013 Duration : 5 days

Managing and Maintaining Windows Server 2008 Servers

MS Upgrading Your Skills to MCSA Window Server 20102

Quality Management Consultancy

Build Your Knowledge!

Course Syllabus. Planning and Administering Windows Server 2008 Servers. Key Data. Audience. At Course Completion. Prerequisites. Recommended Courses

Transcription:

Jay Ferron CEHi, CWSP, CISM, CISSP, CVEi. MCITP, MCT, MVP, NSA IAM Jay@ferron.com Blog.mir.net

Tools to use How do we make our job easer? What tools are there at low or no cost? What do you use today? What Issues to do need to solve? This is a discussion of how we can help each other, and share ideas.

Tools to test Network GFI LanGuard Network auditing: Analyze your network centrally Vulnerability assessment: Discover security threats early Patch management: Fix vulnerabilities before an attack

Nessus The versatile Nessus vulnerability scanner provides patch, configuration, and compliance auditing; mobile, malware, and botnet discovery; sensitive data identification; and many other features

CSET 5.0 The Cyber Security Evaluation Tool (CSET ) is a Department of Homeland Security (DHS) product that assists organizations in protecting their key national cyber assets. It was developed under the direction of the DHS Industrial Control System Cyber Emergency Response Team (ICS-CERT) by cybersecurity experts and with assistance from the National Institute of Standards and Technology (NIST). This tool provides users with a systematic and repeatable approach for assessing the security posture of their cyber systems and networks. It includes both high-level and detailed questions related to all industrial control and IT systems.

https://www.infragard.org/ InfraGard is a partnership between the FBI and the private sector. It is an association of persons who represent businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the U.S.

What Is IRM? Major functional uses of IRM: Provides business-level encryption of information Enables information protection while in use Allows for simple mapping of business classifications Provides offline use without users needing network access for particular amounts of time Provides full auditing of access to documents and changes that business users make to usage rights

Database Server AD RMS Cluster AD DS 7 1 Publishing 6 8 Consuming 2 3 4 5 9 Information Author Information Recipient

AD RMS Deployment Scenarios AD RMS deployment scenarios: AD RMS in a single forest AD RMS licensing-only cluster in a single forest AD RMS in multiple forests AD RMS in an extranet AD RMS AD FS AD RMS with AD FS

AD RMS Components AD RMS Cluster Types IIS AD RMS Licensing- Only Cluster AD DS AD RMS Client AD RMS Client SQL Server Configuration Data Logging SQL Server AD RMS Client AD RMS Client Root cluster Licensing-Only cluster

Options for Configuring AD RMS Clusters The two types of clusters in Windows Server 2012: Root-certification cluster Licensing-only cluster Root-certification cluster: The first server that you install always becomes the root certification cluster It handles all certification and licensing requests for the domain Simple cluster: The simplest form of a cluster is one AD RMS server Complex cluster: You can configure multiple servers as a cluster behind a single, shared URL You can create licensing-only clusters, in addition to the root- certification cluster

Guidelines for Designing AD RMS Clusters When designing AD RMS clusters, follow these guidelines: Use single-server cluster Add servers in a cluster behind a single URL Use root-certification cluster, with additional AD RMS servers added Create licensing-only cluster

Configuring High Availability for AD RMS Services High availability for AD RMS services: Use a DNS CNAME for the RMS services URI Configure NLB for two or more AD RMS servers Ensure AD RMS database is configured for High Availability Microsoft SQL Server Failover Clustering Log Shipping Database Mirroring AlwaysOn Consider sizing carefully

Planning AD RMS Management AD RMS administrative roles: AD RMS Enterprise Administrators AD RMS Template Administrators AD RMS Auditor

Implementing an AD RMS Backup and Recovery Strategy AD RMS Backup and Recovery Identify the AD RMS components that you should back up Make a backup strategy for each component Choose a restore scenario (database or full AD RMS) Consider the ServiceConnectionPoint object Test your backup and restore strategies

ecommissioning and Removing AD MS Decommissioning and Removing AD RMS: Decommission AD RMS before you remove the AD RMS role from a server Remember that decommisioned server can decrypt all protected content Plan the time of the decommision period Keep in mind that you cannot return a decommisioned server to its previous state Ensure that you should have an current AD RMS backup

Planning the AD RMS Super Users Group Super Users group planning The AD RMS Super Users group is a special group that has full control over all content that AD RMS manages You can use the Super Users group to recover data By default, the Super Users group is not enabled If you enable the group, specify a universal group to be the AD RMS Super Users group An Exchange server can belong to the Super Users Members of the Super Users group have full owner rights in all use licenses

Planning for AD RMS Client Applications AD RMS can integrate with: Exchange Server 2007 and newer Office SharePoint Server 2007 and newer Integration Between Exchange Server and AD RMS provides: Protection with transport rules Enables journal report decryption Enables IRM Search Enables IRM Outlook Web Application Integration between SharePoint and AD RMS: Helps protect documents on a SharePoint site Provides strong cryptography for AD RMS

Options for Enabling Application Access for AD RMS Clients Options for enabling application access Supported AD RMS-enabled Office applications XPS: XML Paper Specification Office Viewers, XPS Viewers and Rights Management Add-on Liquid Motion add RMS to Other Applications

Integrating AD RMS with Windows Live ID Recipients of IRM documents can use Windows Live ID to read AD RMS protected content: You need to establish a trust policy between AD RMS and Windows Live ID The user must have a Windows Live ID account Anonymous access to the AD RMS IIS licensing service is required This service is not guaranteed to be permanent The recipient can only consume content, not protect it

Integrating AD RMS with AD FS Integrating AD RMS with AD FS Deploy and install AD FS properly both organizations Add and configure AD RMS as a claims-aware application Grant Security Audit Privileges to the AD RMS Service Account Add an extranet URL Install and enable the IFS role service for AD RMS Assign home realm to AD FS-R computers via registry changes

What Is DAC? DAC is new in Windows Server 2012 and provides organizations with: Data identity Access control Auditing access Rights Management protection Classifies files automatically and manually Provides central access policies for an organizationwide safety net Provides central audit policies for compliance reporting and forensic analysis Reduces information leaks

Overview of Dynamic Access Control Configuration Process Dynamic Access Control configuration process: Process to map a business request to a central access policy Understand and translate business intent Express access policy in Windows Server 2012 constructs Determine the user groups, resource properties and claim types Create File Shares on File Servers Determine the servers where this policy should be applied to

Integrating AD RMS and DAC DAC applies encryption by using AD RMS DAC protects documents even if inadvertently saved, sent, or processed incorrectly DAC extends AD RMS to the file server

How AD RMS Integrates with DAC 1 AD DS Controller 4 User 2 File Server 3 AD RMS Cluster Classification Engine

Blog.mir.net Free Training FREE Training Camp Microsoft Virtualization for VMWare Professionals Microsoft Deployment Toolkit 2013 Free on-demand Jump Start training System Center 2012 R2 Free on-demand Jump Start Training Se Free migration to Windows 7 course on MVA Server 2012 r2

Questions Contact me for a copy of this deck Jay@ferron.com