Windows Server 2012 / Windows 8 Audit Fundamentals



Similar documents
Microsoft. Official Course. Introduction to Active Directory Domain Services. Module 2

Introduction to Active Directory Services

R4: Configuring Windows Server 2008 Active Directory

Microsoft. Jump Start. M11: Implementing Active Directory Domain Services

ITCertMaster. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!

Introduction to Auditing Active Directory

6425C - Windows Server 2008 R2 Active Directory Domain Services

TestOut Course Outline for: Windows Server 2008 Active Directory

Configuring Windows Server 2008 Active Directory

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

MS-6425C - Configuring Windows Server 2008 Active Directory Domain Services

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Windows Server 2003 Active Directory MST 887. Course Outline

Active Directory. By: Kishor Datar 10/25/2007

Installing, Configuring, and Managing a Microsoft Active Directory

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Configuring and Troubleshooting Windows 2008 Active Directory Domain Services

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

9. Which is the command used to remove active directory from a domain controller? Answer: Dcpromo /forceremoval

Windows 2008 Server DIRECTIVAS DE GRUPO. Administración SSII

Stellar Active Directory Manager

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Lesson Plans LabSim for Microsoft s Implementing a Server 2003 Active Directory Infrastructure

NE-6425C Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

70-413: Designing and Implementing a Server Infrastructure

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain MOC 6425

Course 6425B: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

A Walk Around the SQL Server 2012 Audit Feature. Timothy P. McAliley Microsoft Premier Field Engineer SQL Server

MOC 20413C: Designing and Implementing a Server Infrastructure

Forests, trees, and domains

Active Directory Services with Windows Server

This module explains how to configure and troubleshoot DNS, including DNS replication and caching.

6425C: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Advanced Audit Policy Configurations for LT Auditor+ Reference Guide

Partie Serveur Lab : Implement Group Policy. Create, Edit and Link GPOs. Lab : Explore Group Policy Settings and Features

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Active Directory Services with Windows Server MOC 10969

WINDOWS 2000 Training Division, NIC

Designing a Windows Server 2008 Active Directory Infrastructure and Services

Configuring, Managing and Maintaining Windows Server 2008-based Servers

1. Name of Course: Windows Server 2008 Active Directory, Configuring

MOC 6436A: Designing Active Directory Infrastructure and Services in Windows Server 2008

Course 6419B: Configuring, Managing and Maintaining Windows Server 2008-based Servers

MCTS Guide to Microsoft Windows 7. Chapter 13 Enterprise Computing

Hybrid Cloud Identity and Access Management Challenges

Configuring Managing and Maintaining Windows Server 2008 Servers (6419B)

Active Directory Objectives

Managing Windows Environments with Group Policy

Course 6425C: Five days

411-Administering Windows Server 2012

Lecture 3: Active Directory Domain Service (AD DS)

6419: Configuring, Managing, and Maintaining Server 2008

Active Directory Services with Windows Server 10969B; 5 days, Instructor-led

Course Outline. Course 6419 : Configuring, Managing and Maintaining Windows Server 2008-based Servers. Duration: 5 Days

Administering Windows Server 2012

Securing Active Directory Presented by Michael Ivy

How To Configure An Active Directory Domain Services

COMPLETE COMPUTING, INC.

MCTS: Active Directory (Server 2008)

Lesson Plans LabSim for Microsoft s Configuring Windows Server 2008 Active Directory

Course Active Directory Services with Windows Server

Designing Windows Server 2008 Active Directory Infrastructure and Services Course 6436B; 5 Days, Instructor-led

MS 6419 Configuring, Managing and Maintaining Windows Server 2008-based Servers

Outline SSS Configuring and Troubleshooting Windows Server 2008 Active Directory

Configuring Sites and Understanding AD replication. Dante Villarroel Saavedra

Course: Configuring and Troubleshooting Windows Server 2008 Active Direct-ory Domain Services

M6425a Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

6.1.2 Installing AD DS 7:45

Number: Passing Score: 700 Time Limit: 145 min

Configuring, Managing and Maintaining Windows Server 2008 Servers

LearnKey's Windows Server 2003 Active Directory Infrastructure with Dale Brice-Nash

MCSA/MCITP: Enterprise Windows Server 2008 Course 9952; 14 Days, Instructor-led

Configuring, Managing and Maintaining Windows Server 2008 Servers

HJ594S. Configuring, Managing and Mantaining Windows Server 2008 Servers (6419)

Windows Server 2008 Active Directory Resource Kit

M6419 Configuring, Managing and Maintaining Windows Server 2008 Servers

Planning Domain Controller Capacity

Course 6419A: Configuring, Managing and Maintaining Windows Server 2008 Servers

LT Auditor Windows Assessment SP1 Installation & Configuration Guide

Administering Windows Server 2012

Course 10969A Active Directory Services with Windows Server

Administering Windows Server 2012

Planning and Implementing Windows Server 2008

You need to identify the minimum password length required for each marketing user. What should you identify?

MOC 6419: Configuring, Managing, and Maintaining Windows Server 2008

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Administering Windows Server 2012

Configuring, Managing and Maintaining Windows Server 2008 Servers

AV-006: Installing, Administering and Configuring Windows Server 2012

Transcription:

Windows Server 2012 / Windows 8 Audit Fundamentals Jacksonville ISACA Chapter May 17, Speaker Introduction: Timothy P. McAliley 13+ years in IT Currently work for Microsoft Premier Field Engineer SQL Server, Washington, DC. Previously Worked for: Symantec Football Fanatics (Jacksonville, FL) (High Volume e-commerce) ASM Research, Inc. (Fairfax, VA) (Defense Contractor) CISM, CISA, CISSP, MCT, MCITP, MCTS, PMP, ITIL V3 Jacksonville ISACA Chapter - May 1

Structure of this Presentation Part 1 Windows Server 2012 and Windows 8 Security Model Fundamentals Part 2 New Audit Features in Windows Server 2012 and Windows 8 50 minutes each, break in between Focused on Demonstrations/Walk-Throughs Objective and Scope of this Presentation Cover security fundamentals high level Dig into new security and audit features Nothing specifically covering virtualization, although this is applicable to both physical and virtual infrastructure Nothing specifically covering Cloud technologies, although this is applicable to Infrastructure as a Service (IaaS) Jacksonville ISACA Chapter - May 2

Framing the Discussion Why Are We Auditing? Compliance Framework Best Practices Reduce Risk Surface Change Monitoring and Tracking Framing the Discussion What Are We Auditing? Changes to user account and resource permissions. Failed attempts by users to log on. Failed attempts to access resources. Changes to system files. Lots more! Jacksonville ISACA Chapter - May 3

Framing the Discussion Challenges Control Audit Volume Analyze Audit Events Centrally Manage Audit Policy Audit Removable Storage Devices Part 1 - Agenda Windows Server 2012 and Windows 8 Security Model Fundamentals Demo/Walk-through of Local Security Model and Local Security Audit Policy Active Directory Overview Group Policy Objects (GPOs) Overview Domain Security Policy and Group Policy Objects Demo/Walk-through of Active Directory /GPO Administrative Tools Jacksonville ISACA Chapter - May 4

Windows Server 2012 and Windows 8 Security Model Fundamentals Windows Server 2012 and Windows 8 Security Model Fundamentals Demo/Walk-through of Local Security Model and Local Security Audit Policy Jacksonville ISACA Chapter - May 5

Windows Server 2012 and Windows 8 Security Model Fundamentals Active Directory Overview What Are ADDS Domains? What Are OUs? What Is an ADDS Forest? What Is the ADDS Schema? What Is a Domain Controller? What Is the Global Catalog? What Are Operations Masters? Overview of ADDS AD DS is composed of both physical and logical components Physical components Data store Domain controllers Global catalog server RODC Logical components Partitions Schema Domains Domain trees Forests Sites OUs Jacksonville ISACA Chapter - May 6

What Are ADDS Domains? AD DS requires one or more domain controllers All domain controllers hold a copy of the domain database which is continually synchronized The domain is the context within which user, group, and computer accounts are created The domain is a replication boundary An administrative center for configuring and managing objects Any domain controller can authenticate any logon in the domain What Are OUs? Organizational Units Containers that can be used to group objects within a domain Create OUs to: Delegate administrative permissions Apply Group Policy Jacksonville ISACA Chapter - May 7

What Is an ADDS Forest? Forest Root Domain Tree Root Domain adatum.com fabrikam.com atl.adatum.com What Is the ADDS Schema? The Active Directory schema acts as a blueprint for AD DS by defining the attributes and object classes such as: Attributes objectsid samaccountname location manager department Classes User Group Computer Site Jacksonville ISACA Chapter - May 8

What Is a Domain Controller? Domain Controllers Servers that host the Active Directory database (NTDS.DIT) and SYSVOL Kerberos authentication service and KDC services perform authentication Best practices: Availability: At least two domain controllers in a domain Security: Read-Only Domain Controller (RODC) and BitLocker What Is the Global Catalog? Schema Schema Configuration Domain A Global catalog: Hosts a partial attribute set for other domains in the forest Supports queries for objects throughout the forest Configuration Domain A Domain B Global catalog server Schema Configuration Schema Configuration Domain B Domain B Jacksonville ISACA Chapter - May 9

What Are Operations Masters? In any multimaster replication topology, some operations must be single master Many terms are used for single master operations in AD DS, including the following: Operations master (or operations master roles) Single master roles FSMOs Roles Forest: Domain naming master Schema master Domain: RID master Infrastructure master PDC Emulator master Windows Server 2012 and Windows 8 Security Model Fundamentals Group Policy Objects (GPOs) Overview Group Policy Processing Jacksonville ISACA Chapter - May 10

Group Policy Objects (GPOs) Overview Components of Group Policy What Are Multiple Local GPOs? Storage of Domain GPOs Components of Group Policy A Group Policy setting defines a specific configuration change to apply to a user or a computer A GPO is a collection of Group Policy settings that can be applied to a user, computer, or both, to enact changes Jacksonville ISACA Chapter - May 11

What Are Multiple Local GPOs? Multiple Local Group Policies: Have a single computer configuration that applies to the computer for all users who log on Have layers of user settings that can apply only to individual users, not to groups There are three layers of user configurations: Administrator Non-Administrator User-specific Storage of Domain GPOs Group Policy Components GPO Contains Group Policy settings Stores content in two locations Group Policy Container Stored in AD DS Provides version information Template Stored in shared SYSVOL folder on PDC Emulator Single Operations Master Provides Group Policy settings Jacksonville ISACA Chapter - May 12

Group Policy Processing GPO Links Applying GPOs Group Policy Processing Order What Are the Default GPOs? GPO Links To deliver settings to an object, a GPO must be linked to a container Disabling a link removes the settings from the container Deleting a link does not delete the GPO GPOs can be linked to: Sites Domains OUs GPOs cannot be linked to: Users Groups Computers System containers Jacksonville ISACA Chapter - May 13

Applying GPOs When you apply GPOs, remember that: Computer settings apply at startup User settings apply at logon Polices refresh at regular, configurable intervals Security settings refresh at least every 16 hours Policies refresh manually by using: TheGpupdatecommand The Windows PowerShell cmdlet Invoke- Gpupdate With the new Remote Policy Refresh feature in Windows Server 2012, you can remotely refresh policies Group Policy Processing Order GPO1 Local Group GPO2 Group Policy Processing Order Site GPO3 GPO4 Domain OU GPO5 OU OU Jacksonville ISACA Chapter - May 14

What Are the Default GPOs? There are two default GPOs: Default Domain Policy Used to define the account policies for the domain: Password Account lockout Kerberos protocol Default Domain Controllers Policy Used to define auditing policies Defines user rights on domain controllers Windows Server 2012 and Windows 8 Security Model Fundamentals Demo/Walk-through of Active Directory /GPO Administrative Tools Jacksonville ISACA Chapter - May 15

Windows Server 2012 and Windows 8 Security Model Fundamentals ~BREAK~ Part 2 -Agenda New Audit Features in Windows Server 2012 and Windows 8 Dynamic Access Control Expression-based Security Audit Policies Enhanced Global Object Access Auditing Enhanced User Login Auditing Auditing New Types of Securable Objects Auditing Removable Storage Devices Jacksonville ISACA Chapter - May 16

New Audit Features in Windows Server 2012 and Windows 8 New Audit Features in Windows Server 2012 and Windows 8 New or Enhanced Functionality: Dynamic Access Control Expression-based Security Audit Policies Enhanced Global Object Access Auditing Enhanced User Login Auditing Auditing New Types of Securable Objects Auditing Removable Storage Devices Jacksonville ISACA Chapter - May 17

Dynamic Access Control Dynamic Access Control What Is Dynamic Access Control? You can use Dynamic Access Control to help to address four scenarios: Central access policy for access to files Auditing for compliance and analysis Protecting sensitive information Access denied remediation Jacksonville ISACA Chapter - May 18

Dynamic Access Control Most common reasons for implementing Dynamic Access Control: Cannot achieve desired results with NTFS Reduce security group complexity Adhere to compliance regulations Protect sensitive information Upgrading to access control based on attributes Dynamic Access Control Demo/Walk-through of Configuring Dynamic Access Control Jacksonville ISACA Chapter - May 19

Expression-based Security Audit Policies Expression-based Security Audit Policies Windows Server 2012 introduces expression-based security audit policies. Dynamic Access Control in Windows Server 2012 enables you to create targeted audit policies by using expressions that are based on: user Computer resource claims Jacksonville ISACA Chapter - May 20

Expression-based Security Audit Policies The following are examples of expression-based audit policies that administrators can apply in Windows Server 2012 : Audit everyone who does not have a high security clearance and yet tries to access documents with high business value. Audit all vendors when they try to access documents that are related to projects that they are not working on. Narrowly defined policies such as these can help regulate the volume of audit events and limit them to only the most relevant data or users. Expression-based audit policies can be authored directly on a file or folder or applied centrally through Group Policy by using Global Object Access Auditing. Expression-based Security Audit Policies Demo/Walk-through of Configuring Expression-based Access Control Jacksonville ISACA Chapter - May 21

Enhanced Global Object Access Auditing Enhanced Global Object Access Auditing Windows Server 2012 enables you to create expression-based audit policies by using Global Object Access Auditing. Merges the Global Object Access Auditing policies from multiple GPOs located on the client computers. Jacksonville ISACA Chapter - May 22

Enhanced Global Object Access Auditing Global Object Access Auditing policy settings allow administrators to define computer system access control lists (SACLs) per object type for either: file system registry The specified SACL is then automatically applied to every object of that type. Enhanced Global Object Access Auditing Auditors will be able to prove that every resource in the system is protected by an audit policy by just viewing the contents of the Global Object Access Auditing policy settings. For example, a policy setting "track all changes made by group administrators" shows that this policy is in effect. Jacksonville ISACA Chapter - May 23

Enhanced User Login Auditing Enhanced User Login Auditing Windows Server 2012 and Windows 8 include user logon auditing. With the right audit policy in place, the Windows operating systems will generate an audit event (4624) each time a user logs on to a computer locally or remotely. In Windows Server 2012 and Windows 8, a new event (4626) contains information about the attributes of the file that was accessed. This additional information can be leveraged by audit log management tools to enable event filtering that is based on file attributes and user attributes. Jacksonville ISACA Chapter - May 24

Auditing New Types of Securable Objects Auditing New Types of Securable Objects In Windows Server 2012 and Windows 8, existing File Access events (4656, 4663) contain information about the attributes of the file that was accessed. Jacksonville ISACA Chapter - May 25

Auditing Removable Storage Devices Auditing Removable Storage Devices In Windows Server 2012 and Windows 8, an audit event is generated each time a user attempts to access a removable storage device. Jacksonville ISACA Chapter - May 26

Auditing Removable Storage Devices Demo Configure and Validate Auditing Removable Storage Devices Resources for More Information Jacksonville ISACA Chapter - May 27

Resources for More Information What s New In Security Auditing http://technet.microsoft.com/en-us/library/hh849638 Dynamic Access Control http://technet.microsoft.com/en-us/video/dynamic-access-controldemo-walkthrough.aspx http://channel9.msdn.com/posts/dynamic-access-control-demoand-interview Security Auditing Overview http://technet.microsoft.com/en-us/library/hh849642.aspx Summary Windows Server 2012 and Windows 8 Security Model Fundamentals New Audit Features in Windows Server 2012 and Windows 8 Other Issues and Considerations Resources for More Information Jacksonville ISACA Chapter - May 28

Q&A? Email me at timothy.mcaliley@microsoft.com ~Presentation is on the event site~ Follow Me on Twitter @Sysframeworks LinkedIn: Timothy P. McAliley Make Sure To Register For IT Pro Camp, June 15, 6 CPEs -free for full day attendance www.itprocamp.com/jacksonville Jacksonville ISACA Chapter - May 29

Thank You! Jacksonville ISACA Chapter - May 30