Active Directory Integration: Install and Setup Guide. Insights



Similar documents
Enterprise. Insights. Active Directory Integration: Installation and Setup Guide. v1.0.5

Active Directory: Setup Guide for Umbrella. Active Directory

Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1

Insights Deployment Guide

Networks. Sites and Internal Networks: Setup Guide. Sites and Internal Networks Setup Guide for Umbrella Page 1

WEBTITAN CLOUD. User Identification Guide BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES

Installing and Configuring vcenter Support Assistant

Thinspace deskcloud. Quick Start Guide

Virtual Appliance Setup Guide

Installing and Configuring vcloud Connector

Setup non-admin user to query Domain Controller event log for Windows2003

F-Secure Messaging Security Gateway. Deployment Guide

Step-By-Step Guide to Deploying Lync Server 2010 Enterprise Edition

Quick Start Guide for VMware and Windows 7

Virtual Web Appliance Setup Guide

Virtual Managment Appliance Setup Guide

Virtual Appliance Setup Guide

VMware vcenter Log Insight Getting Started Guide

Product Version 1.0 Document Version 1.0-B

Nagios XI Monitoring Windows Using WMI

F-Secure Internet Gatekeeper Virtual Appliance

BaseManager & BACnet Manager VM Server Configuration Guide

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

NetIQ Sentinel Quick Start Guide

Trial environment setup. Exchange Server Archiver - 3.0

EMC Data Domain Management Center

Installing and Configuring Active Directory Agent

Quick Start Guide for Parallels Virtuozzo

Barracuda Message Archiver Vx Deployment. Whitepaper

StarWind Virtual SAN Installation and Configuration of Hyper-Converged 2 Nodes with Hyper-V Cluster

Roaming Client: Deployment Guide for Umbrella. Roaming Client

VMware Identity Manager Connector Installation and Configuration

GRAVITYZONE HERE. Deployment Guide VLE Environment

Web Application Firewall

Configuration Guide. BES12 Cloud

Installing and Using the vnios Trial

PHD Virtual Backup for Hyper-V

NSi Mobile Installation Guide. Version 6.2

Introduction to Mobile Access Gateway Installation

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

Rally Installation Guide

Pearl Echo Installation Checklist

Universal Management Service 2015

CommandCenter Secure Gateway

XenDesktop Implementation Guide

Core Protection for Virtual Machines 1

CommandCenter Secure Gateway

Installing and Configuring vcloud Connector

SonicWALL SRA Virtual Appliance Getting Started Guide

Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures. Goliath Performance Monitor Installation Guide v11.

Set Up Panorama. Palo Alto Networks. Panorama Administrator s Guide Version 6.0. Copyright Palo Alto Networks

ios Mobile: Setup Guide for Umbrella ios Mobile Devices

Interworks. Interworks Cloud Platform Installation Guide

Getting Started with ESXi Embedded

Barracuda Message Archiver Vx Deployment. Whitepaper

Installing and Configuring Login PI

Table of Contents. Contents

Kaseya Server Instal ation User Guide June 6, 2008

Windows Firewall must be enabled on each host to allow Remote Administration. This option is not enabled by default

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

RSA Authentication Manager 8.1 Virtual Appliance Getting Started

How to install/upgrade the LANDesk virtual Cloud service appliance (CSA)

ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

How To Create An Easybelle History Database On A Microsoft Powerbook (Windows)

Aspera Connect User Guide

Version 3.8. Installation Guide

Installation and Deployment

enicq 5 System Administrator s Guide

Acronis Backup & Recovery 11.5 Quick Start Guide

Discovery Guide. Secret Server. Table of Contents

Step By Step Guide: Demonstrate DirectAccess in a Test Lab

Implementing Microsoft Windows Server Failover Clustering (WSFC) and SQL Server 2012 AlwaysOn Availability Groups in the AWS Cloud

Web-Access Security Solution

SHAREPOINT 2013 IN INFRASTRUCTURE AS A SERVICE

XStream Remote Control: Configuring DCOM Connectivity

SOA Software API Gateway Appliance 7.1.x Administration Guide

Setting up Citrix XenServer for 2X VirtualDesktopServer Manual

Virtual Appliance Setup Guide

Citrix XenServer Workload Balancing Quick Start. Published February Edition

Drobo How-To Guide. What You Will Need. Configure Replication for DR Using Double-Take Availability and Drobo iscsi SAN

Windows Firewall Configuration with Group Policy for SyAM System Client Installation

4cast Client Specification and Installation

RoomWizard Synchronization Software Manual Installation Instructions

Tenrox. Single Sign-On (SSO) Setup Guide. January, Tenrox. All rights reserved.

System Administration Training Guide. S100 Installation and Site Management

Extreme Control Center, NAC, and Purview Virtual Appliance Installation Guide

Kaspersky Lab Mobile Device Management Deployment Guide

Drobo How-To Guide. Cloud Storage Using Amazon Storage Gateway with Drobo iscsi SAN

Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures. Goliath Performance Monitor Installation Guide v11.

Unitrends Virtual Backup Installation Guide Version 8.0

Uila SaaS Installation Guide

Netwrix Auditor. Virtual Appliance Deployment Guide. Version: 8.0 8/1/2016

Virtual Data Centre. User Guide

Getting Started Guide

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

VMware Quick Start Guide

Veeam Backup Enterprise Manager. Version 7.0

How To Enable A Websphere To Communicate With Ssl On An Ipad From Aaya One X Portal On A Pc Or Macbook Or Ipad (For Acedo) On A Network With A Password Protected (

NexentaConnect for VMware Virtual SAN

Transcription:

Active Directory Integration: Install and Setup Guide Insights

This guide explains how to install and configure the Active Directory Components provisioned and maintained from the Umbrella Dashboard with Umbrella Insights. By integrating with your Active Directory environment and securely forwarding DNS queries to the Umbrella Security Cloud, you can enforce and report on users, computers and groups. For many customers, only instructions on pages 4-13 are required. Table of Contents Overview... 3 Prerequisites... 4 Virtualized Server Environment Active Directory Environment Network Environment Step 1: Setup DNS Forwarding via Virtual Appliances... 5 Create the Virtual Appliance (VA) Configure the Virtual Appliance Verify the Virtual Appliance Syncs with the Dashboard Create the Redundant Virtual Appliance Route Local DNS Queries Step 2: Prepare your Active Directory Environment... 8 Run the Configuration Script on the AD Server Verify the AD Server Reports to the Dashboard Repeat for Each AD Server Step 3: Connect Active Directory to Umbrella... 10 Install the Connector Verify the Connector Syncs with the Dashboard Verify all Active Directory Components are Operational Step 4: Configure Settings in Dashboard... 12 Step 5: Route DNS Traffic through the Virtual Appliances... 13 Multiple AD Sites... 14 Appendix A: Prepare a Separate non-ad Server to Install the Connector... 15 Appendix B: Configuring AD Servers on Windows Server 2003 R2... 16 Setting the Manage auditing and security log Group Policy Setting DCOM permissions Setting WMI permissions Active Directory Integration: Install and Setup Guide Page 2

Overview The Active Directory integration consists of two components that must reside in your network at each independent AD site: I NOTE: An Active Directory site in the context of this document means an independent location with its own AD server(s), DNS server(s), and connection to the Internet. 1. The Virtual Appliance ( VA for short), which Runs in a virtualized server environment, Forwards local DNS queries to your existing DNS servers and Forwards external DNS queries with non-sensitive metadata to the Umbrella Security Cloud. I NOTE: The recommended installation includes a redundant VA (not shown in the diagram). 2. The Connector, which Runs in your Active Directory environment, Securely communicates non-sensitive user and computer login info to the Virtual Appliances. Securely communicates non-sensitive user and computer group info to the Umbrella Security Cloud service. I NOTE: If your security policy requires it, the Connector can be installed on a different non-ad server (see Appendix A for details). This guide explains how to install each of these components and verify that they are working properly before you deploy them. Active Directory Integration: Install and Setup Guide Page 3

Prerequisites To support the Umbrella Insights Active Directory integration, you must have: Virtualized Server Environment VMware ESXi 4.1 or newer to create the Virtual Appliances. Your ESXi server host is set to the correct date and time for predictable VA behavior. Your ESXi server host has one CPU core, 512Mb of RAM and 6.5Gb of hard disk drive space available to be provisioned per Virtual Appliance instance. Active Directory Environment Windows Server 2003 R2, 2008 or 2008 R2 with the latest service packs and 100Mb free hard disk drive space. Only a single domain environment. I IMPORTANT! When deploying Umbrella Insights Active Directory Components at more than one WANlinked (MPLS-type network) AD site, repeat steps 1-5 after verifying a complete, functioning installation at current site before moving on to the next. A new user account with: o o o o The logon name (aka. samaccountname) set to OpenDNS_Connector. The box Password never expires checked. A password entered without backslash or quotation characters. Make sure the OpenDNS_Connector user is a member of the following groups and if not, please add the missing ones: Event Log Readers Distributed COM users Enterprise Read-only Domain Controllers I IMPORTANT! For environments on Windows Server 2003 R2, several manual steps are required (see Appendix B for instructions). Network Environment Set the following ports to be open from the Active Directory server to the Virtual Appliances: o 443 TCP Set the following outbound ports to be open from the VAs and connectors to opendns.com: o o o 53 TCP & UDP 443 TCP 2222 TCP Do not place devices with network address translation (NAT), or that in any manner obfuscates the internal IP address, between hosts and the Virtual Appliance per site. Active Directory Integration: Install and Setup Guide Page 4

Step 1: Setup DNS Forwarding via Virtual Appliances The purpose of Virtual Appliances is to map internal source IP addresses to AD users and computers then forward external DNS queries from your network to the Umbrella Security Cloud via one of the OpenDNS Global Network data centers. Local DNS queries are forwarded to your internal DNS servers. Create the Virtual Appliance (VA) 1. On any network PC with the ability to log into your ESXi server using the VMware vsphere client, point your browser to https://dashboard2.opendns.com and log in with your Umbrella credentials. 2. From the Dashboard, navigate to Configuration > System Settings > Active Directory Configuration. 3. Click the download components button in the upper-right corner and select the 'Virtual Appliance'. I NOTE: If you already downloaded this file a few days ago, please re-download it in case of a newer version. System prompts will update you on the status of the download the OpenDNS.ova file. 4. Log onto your VMware vsphere client. 5. Select the File tab, and click Deploy the OVF Template. 6. Follow the deployment wizard prompts; taking note of: a. For the source, browse to the.ova file you just downloaded. b. Verify that your VMware server host is running version 4.1 or newer. c. Specify a unique name and location of your Virtual Appliance. d. Select the disks appropriate to your environment. e. Make sure you select the Thin Provision radio button. f. Specify the network. I NOTE: This is the same network that includes your AD servers (also referred to as the Domain Controller, or DC) and VA instances. These two components must be able to communicate with each other. Active Directory Integration: Install and Setup Guide Page 5

7. Click Finish after completing the deployment configuration. System prompts will update you on the status. 8. Select the device just created and right-click. Select Power > Power on. 9. Right-click the device just created, and select Open Console. Configure the Virtual Appliance 1. From the VMware console after a brief boot up process, you are prompted to configure the DNS forwarder by tabbing between fields. I NOTE: For Local DNS 1 and 2 enter your local DNS servers, which is often the IP addresses of your Windows Servers with both the Active Directory Domain Services and DNS Server roles installed. 2. At the Add Domain prompt enter the name of your domain (adding internal zones is described below). 3. Press Return. 4. Tab to Save and press Return. I NOTE: You should see a sync message indicating that the VA and the Umbrella service are communicating. Active Directory Integration: Install and Setup Guide Page 6

Verify the Virtual Appliance Syncs with the Dashboard When you return to the Umbrella Dashboard, you will see the VA you just created in the Inactive state on the Active Directory Configuration page. Create the Redundant Virtual Appliance Repeat the above steps to create a secondary Virtual Appliance, which is required for continuous operation. I NOTE: It ensures 100% uptime in the event of any critical issues, as well as, enabling auto-upgrades to stagger any necessary reboots. Depending on your setup, you can place each VA on a separate VMware host. Route Local DNS Queries To ensure correct DNS responses to local hosts inside your internal network, you will want to configure your VAs to route queries to your existing DNS servers. To add internal DNS zones: 1. From the VMWare console, select Edit. 2. Use Tab until you have highlighted the Add domain option. 3. Add your internal zone(s) (e.g. example.com). 4. Add your reverse zone(s) (e.g. if your network is 192.168.1.0/24 you should add: 1.168.192.in-addr.arpa). 5. Select Save and hit Enter. To add A & PTR records for your VAs 1. On your local DNS server, click Start, Run and type dnsmgmt.msc 2. Navigate to your forward lookup zones for your local domain (e.g. corp.domain.com). 3. Select the local zone (e.g. corp.domain.com). 4. On the right hand side right-click, select New Host. 5. Enter a hostname for the VA, an IP and make sure the box Create associated pointer (PTR) record is checked. 6. Click Add Host. To verify if the records were created correctly, you can test with nslookup: 1. Enter: nslookup (IP ADDRESS of the VA). For example: Ø nslookup 192.168.1.2 Server:192.168.1.1 Address:192.168.1.1#53 Non-authoritative answer: 1.168.192.in-addr.arpaname = va01.corp.domain.com. 2. Enter: nslookup (HOSTNAME of the VA). For example: Ø nslookup va01.corp.domain.com Server: 192.168.1.1 Address: 192.168.1.1#53 Non-authoritative answer: Name: va01.corp.domain.com Address: 67.215.92.152 Active Directory Integration: Install and Setup Guide Page 7

Step 2: Prepare your Active Directory Environment Running the script on each of the AD servers (also referred to as the Domain Controller, or DC) prepares them to communicate with the Connector. I IMPORTANT! For environments running on Windows Server 2003 R2, several manual steps are required before completing step 2 (see Appendix B for instructions). Run the Configuration Script on the AD Server 1. From the 'Active Directory Configuration' page, click download components and then 'Windows Configuration'. 2. Download the file and save it to a location on the machine you plan to run it on. I NOTE: The configuration script is written in Visual Basic Script and is human readable. For reference, it automates the instructions you ll find in Appendix B, plus more. Contact support for more details. 3. As Admin, open an elevated command prompt. 4. Enter: cscript <filename> where <filename> is the name of the configuration script you downloaded in Step 2. The script will display your current configuration, then offer to auto-configure the AD Server for operation. If the auto-configure steps are successful, the script will register the AD Server with the Umbrella Dashboard. I NOTE: The OpenDNS_Connector user must be created before running the script, as detailed in the prerequisites. There are also several Group Policies that affect system operation that may need manual configuration. The script will display the status of these settings and, if needed, provide instructions on changing them. Active Directory Integration: Install and Setup Guide Page 8

Verify the AD Server Reports to the Dashboard When you return to the Dashboard, you will see the hostname of the AD Server you just ran the script on in the Inactive state on the 'Active Directory Configuration' page. I NOTE: The configuration script only runs once; it is not an application or service. If you change the IP address or hostname of the AD Server, remove the previous instance of the AD Server by clicking the round X icon, and repeat tasks 1-4. Repeat for Each AD Server Repeat the above steps to prepare additional AD Servers (or DCs) in your single domain environment to successfully communicate with the Connector. Active Directory Integration: Install and Setup Guide Page 9

Step 3: Connect Active Directory to Umbrella The purpose of the Connector is to monitor one or more AD servers. It listens to user and computer logins via the security event logs, and subsequently enables IP-to-user and IP-to-computer mappings on the Virtual Appliances. It synchronizes user-to-group, computer-to-group and group-to-group memberships with the Umbrella service, enabling you to create and enforce group-based settings and view user, computer and group-based reports. I NOTE: You only need to install one Connector per site, but you may install more than one. If your security policy does not allow you to install software directly on your AD Server, you can install it on a separate Windows machine (see Appendix A), otherwise it is recommended to install the Connector on one or more of your AD Servers. Install the Connector 1. From the Active Directory Configuration page, click download components and then 'Windows Service'. I IMPORTANT! You must download the zip file to the local machine where you plan to run it. Issues have been observed attempting to install the connector from networked drives. 2. As Admin, select the zip file and extract the setup.msi file. 3. Run setup.msi. 4. Enter the password you configured for the OpenDNS_Connector user you created. (see Prerequisites). 5. Follow the setup wizard prompts. 6. When finished, click Close. 7. Return to the Dashboard. Verify the Connector Syncs with the Dashboard 1. When you return to the Dashboard, you will see the hostname of the AD Server or other Windows machine that you installed the Connector on the 'Active Directory Configuration' page. 2. The Umbrella Security Cloud automatically configures and connects the VAs to the AD Servers via the Connectors for each configured site, and the status of all of your VAs, AD Servers, and Connectors should change from Inactive to Active. If not, contact support. 3. Navigate to 'Configuration > Policies'. i. The AD Servers should automatically synchronize user and computer group memberships, and any subsequent changes, with the Umbrella Security Cloud via the Connector. You can verify that this has occurred successfully by clicking 'add a new policy' and confirming that your groups are present. ii. As such, you should see all of your AD Groups, included those nested within other groups, within the identity picker of the policy wizard. iii. If you don t see your groups, check the 'Active Directory Configuration' page to see if the status of all components is Active. If not, contactsupport@opendns.com. I NOTE: It can take up to 10 minutes for large numbers of AD user, computer and group objects to synchronize for the first time. Active Directory Integration: Install and Setup Guide Page 10

Verify all Active Directory Components are Operational 1. Before you deploy your Umbrella configuration, confirm that you can resolve DNS traffic by entering the following command that sends a query to opendns.com through your VA: C:\>nslookup > server {{enter the IP of one of your VA's}} > opendns.com 2. You can further verify DNS traffic by entering the following command to send a TXT Record query to debug.opendns.com through the VA: > set type=txt > debug.opendns.com > exit This query returns a string of information if you are going through the VA. If you receive a non-existent domain result from that query, there is still something wrong with your configuration and you should contact support. Active Directory Integration: Install and Setup Guide Page 11

Step 4: Configure Settings in Dashboard Once verifying that all Active Directory components were integrated successfully, define and apply security and acceptable use policies to AD Groups. 1. Navigate to Configuration>Policies, and click add a new policy or click the name of an existing policy. 2. Check the AD Groups box if you want to apply a single policy for all AD users and/or computers, or check the box next to one or more specific groups via the identity picker. To remove a selected group, either uncheck its box via the identity picker or click the red X icon to the right of its name. Then click next. I IMPORTANT: Clicking on a group will show its members including nested groups, user accounts or computer accounts. Selecting the group will apply the policy to all its members. You can select only a nested group, but not an individual user or computer account. As a best practice, centrally manage your group memberships via your AD servers. Any changes will be synced with the Umbrella Security Cloud within a few minutes. 3. Select the 'Policy Settings', then 'Block Page Settings' you would like enforced for this policy. Then click next. I NOTE: If you have not yet created any non-default settings, go to the 'Policy Settings' or 'Block Page Settings' pages to do so. 4. Set a meaningful description for the policy, then click save. I NOTE: The policy you created will be applied within 60-90 seconds to any new connections coming into the Umbrella Security Cloud from the selected computers. 5. Click and hold the drag handle icon to re-order the policy above or below any other existing policies. I NOTE: Policy execution follows a top-down, first-match order of operations. The first policy assigned to an identity is enforced. Any subsequent policies assigned to the same identity are ignored. There is an editable, but immutable, Default Policy always ordered last, which is a catchall for any identity. Active Directory Integration: Install and Setup Guide Page 12

Step 5: Route DNS Traffic through the Virtual Appliances In order for you to begin enforcing your settings, all DNS traffic should be routed through your Virtual Appliances. 1. It is suggested that you test on a few devices by manually configuring their DNS settings to use the Virtual Appliances. I IMPORTANT: When testing the policy enforcement, some DNS responses may already be cached for several minutes to days. You may want to flush the DNS cache via both the browser and the OS to avoid waiting for the cached responses to expire. 2. If possible, a good next step is to change the DNS settings for a specific DHCP server pool or scope in your organization. 3. Once you ve verified correct enforcement of policies with your pilot group of computers, you can either stage the cut over to using the Virtual Appliances for DNS or cut over the entire organization. The best time to affect the cut over is typically after users log out for the day. 4. When users log in after the installation is complete, they should begin sending all DNS queries to the one of the VAs forwarding DNS traffic. I NOTE: Most stub DNS resolvers, those that reside on endpoint devices, do not have a true primary vs. secondary DNS server relationship. Stub DNS resolvers behavior on many operating systems are undocumented in regards to which DNS server they will use at any time. Active Directory Integration: Install and Setup Guide Page 13

Multiple AD Sites Follow the previous steps 1-5 again, and after each sub-step to verify that the component has synced or reported to the dashboard, assign the component to a site by clicking on its name and selecting an existing site or creating a new site. You may also rename the default or any existing sites. I IMPORTANT: When testing the policy enforcement, some DNS responses may already be cached for several minutes to days. You may want to flush the DNS cache via both the browser and the OS to avoid waiting for the cached responses to expire. Active Directory Integration: Install and Setup Guide Page 14

Appendix A: Prepare a Separate non-ad Server to Install the Connector If your security policy requires it, the Connector can be installed on a non-ad Server machine, but it must be joined to the same domain as the AD Servers that the Connector will be monitoring. 1. Provision a virtual or physical machine using a static IP. 2. Install one of the three supported Windows OS and other components below. a) Windows Server 2008 R2 SP1 (Preferred) i. Install AD Domain Services Snap-ins and Command-line Tools feature via Remote Server Administration Tools > Role Administration Tools > AD DS & AD LDS Tools > AD DS Tools ii. Install.NET v3.5 b) Windows Server 2008 SP2 i. Install Active Directory Lightweight Directory Services role ii. Install.NET v3.5 c) Windows 7 (non-home license) i. Install Remote Support Administration Tools - download available from http://go.microsoft.com/fwlink/?linkid=137379 ii. Install.NET v3.5 3. Join machine to the same domain as the AD Server (domain controller) being connected to 4. Open WMI ports via the following command run as Administrator: netsh advfirewall firewall set rule group="windows Management Instrumentation (WMI)" new enable=yes 5. (Optional) If there is no access to a network file share to retrieve the file locally, download and/or unrestrict Internet Explorer (http://www.microsoft.com/download/en/details.aspx?id=25150) or install a different browser. Active Directory Integration: Install and Setup Guide Page 15

Appendix B: Configuring AD Servers on Windows Server 2003 R2 Setting the Manage auditing and security log Group Policy I NOTE: Adding the OpenDNS_Connector user to this group policy for all AD Servers (DCs) is also required in certain Windows Server 2008 configurations. 1. By default, Windows Server 2003 does not come with the Group Policy Management Console (GPMC) and it may be downloaded here: http://www.microsoft.com/en-us/download/details.aspx?id=21895. I NOTE: Alternatively, 2008 R2 servers should have GPMC installed and you can apply the following permissions from this server to be replicated to the 2003 R2 server. 2. Open the GPMC (via Start > Administrative Tools), and select a Group Policy that applies to Domain Controllers. I NOTE: If you aren t sure what policy to change, open a command prompt and type the following command: "gpresult /scope computer /r". Look for the Applied Group Policy Objects line. Under it will be a list of policies applied to that Domain Controller. Make note of one that is likely to be applied to all Domain Controllers (e.g. Default Domain Controllers Policy ). 3. Right-click that policy and select Edit to bring up the Group Policy Management Editor. 4. Browse to the Computer Configuration\Policies\Windows Settings\Security Settings\Local Policies\User Rights Assignment folder and select Manage audit and security log to view its properties. 5. Check "Define these policy settings", click "Add user or group", browse and select the OpenDNS_Connector Active Directory Integration: Install and Setup Guide Page 16

user. 6. Run the "gpupdate" command on the Domain Controller to make sure the policy is applied. Setting DCOM permissions 1. From a command line run dcomcnfg. 2. Console Root > Component Services > Computers. 3. Right-click on My Computer and select Properties. 4. From My Computer Properties select COM Security tab. 5. In Launch and Activation Permissions area click Edit Limits. 6. Add OpenDNS_Connector user and allow Remote Launch and Remote Activation permissions. 7. Click OK to confirm and close My Computer Properties. Setting WMI permissions 1. Run wmimgmt.msc (Windows Management Infrastructure Control console). 2. Right-click on WMI Control. Click Properties > Security tab. 3. Select Root > CIMV2 namespace and click the Security button. 4. Add the OpenDNS_Connector user and Allow the following permissions: Enable Account, Remote Enable and Read Security. 5. Click OK to exit each dialog window, then click Save to apply changes. Active Directory Integration: Install and Setup Guide Page 17

Umbrella is brought to you by OpenDNS. Trusted by millions around the world. The easiest way to prevent malware and phishing attacks, contain botnets, and make your Internet faster and more reliable. OpenDNS, Inc. www.umbrella.com 1.877.811.2367 Copyright 2012 OpenDNS, Inc. All rights reserved worldwide. No part of this document may be reproduced by any means nor translated to any electronic medium without the written consent of OpenDNS, Inc. Information contained in this document is believed to be accurate and reliable, however, OpenDNS, Inc. assumes no responsibility for its use. TD-Umbrella-Insights-AD-Integration-Guide-v1.2