1. Trang chủ
  2. » Công Nghệ Thông Tin

Module 13: Managing Network Security

36 331 1
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Managing network security
Trường học Microsoft Corporation
Chuyên ngành Network Security
Thể loại module
Năm xuất bản 2001
Thành phố Redmond
Định dạng
Số trang 36
Dung lượng 1,02 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Using Group Policy to Secure the User Environment Applying security policies Select the Security Settings node Select the Security Settings node By configuring security settings Configur

Trang 1

Examining Service Packs, Hotfixes, and

Review 31

Module 13: Managing Network Security

Trang 2

Information in this document, including URL and other Internet Web site references, is subject to change without notice Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, places or events is intended or should be inferred Complying with all applicable copyright laws is the responsibility of the user Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property

 2001 Microsoft Corporation All rights reserved

Microsoft, MS-DOS, Windows, Windows NT, <plus other appropriate product names or titles

The publications specialist replaces this example list with the list of trademarks provided by the copy editor Microsoft, MS-DOS, Windows, and Windows NT are listed first, followed by all other Microsoft trademarks listed in alphabetical order > are either registered trademarks or trademarks of Microsoft Corporation in the U.S.A and/or other countries

<The publications specialist inserts mention of specific, contractually obligated to, third-party trademarks, provided by the copy editor>

The names of actual companies and products mentioned herein may be the trademarks of their respective owners

Trang 3

Instructor Notes

This module provides students with an appreciation of the challenges that are

involved in maintaining a secure and reliable system

After completing this module, students will be able to:

! Use Group Policy to apply security policies to secure the user environment

! Use Group Policy to configure password and logon account policies

! Analyze security log files to detect security breaches

! Secure the logon process by using smart cards

! Apply service packs, hotfixes, and antivirus software

Materials and Preparation

This section provides the materials and preparation tasks that you need to teach this module

Required Materials

To teach this module, you need the following materials:

! Microsoft® PowerPoint® file 2126A_13.ppt

Preparation Tasks

To prepare for this module:

! Read all of the materials for this module

! Complete the labs

! Enable auditing and generate each of the events that are discussed in the Analyzing Security Log Files to Detect Security Breaches

Presentation:

30 Minutes

Lab:

60 Minutes

Trang 4

Module Strategy

Use the following strategy to present this module:

! Using Group Policy to Secure the User Environment

In this topic, you will introduce the procedure for implementing security policies Emphasize that a preconfigured security template ensures duplication of desired settings that already exist for a computer, and can be tested before security settings are applied to multiple computers

Demonstrate how to use Group Policy to apply security policies Emphasize that you can define a security setting once and apply it in many places

! Using Group Policy to Configure Account Policies

In this topic, you will introduce account policies and their purpose You will describe how to configure account policies, particularly the account

password and lockout policy settings Emphasize that tight security depends

on these policy settings as they enable you to control the complexity of passwords themselves and the locking of an account in response to the entering of an incorrect password

! Analyzing Security Log Files to Detect Security Breaches Throughout this topic, use Event Viewer to illustrate the events that are discussed You should have previously enabled auditing and purposely generated each of the events that are discussed in the text before beginning this module

! Securing the Logon Process

In this topic, you will discuss the use of smart cards as a strategy for increasing the security of the logon process The configuration of smart cards is simple, so focus on the smart card features, the advantages of using smart cards, and considerations for smart card policies

! Examining Service Packs, Hotfixes, and Antivirus Software Emphasize the importance of keeping servers current with security updates because security threats arise frequently as systems become more complex and are exposed to public networks

Trang 5

Overview

! Using Group Policy to Secure the User Environment

! Using Group Policy to Configure Account Policies

! Analyzing Security Log Files to Detect Security Breaches

! Securing the Logon Process

! Examining Service Packs, Hotfixes, and Antivirus Software

As an administrator, you must manage network security by implementing various security measures You use Group Policy to secure the user environment and configure account policies You can audit security breaches by analyzing security log files You can use smart card technology to secure the logon process You will also be required to evaluate and apply service packs and hotfixes, and maintain antivirus software to ensure your network environment is as safe as current software allows

After completing this module, you will be able to:

! Use Group Policy to apply security policies to secure the user environment

! Use Group Policy to configure password and logon account policies

! Analyze security log files to detect security breaches

! Secure the logon process by using smart cards

! Apply service packs, hotfixes, and antivirus software

In this module, you will learn

about managing network

security

Trang 6

Using Group Policy to Secure the User Environment

Applying security policies

Select the Security Settings node

Select the Security Settings node

By configuring security settings

Configure the security setting

By importing the security template

Identify or create a security template

Identify or create a security template

Import the security template into a Group Policy object

Import the security template into a Group Policy object

Analyze the security settings

Group Policy security settings are often configured to represent an organization’s security policy The security policy is enforced on users’ systems

by using Group Policy to prevent unauthorized access to the organization network and users’ computers

The process of defining and implementing a standardized set of Group Policies

is facilitated by using security templates A security template is a collection of

security settings that can be imported into a Group Policy object or used for analysis After it is refined to meet the organization’s needs, the template can be applied to the Group Policy object, which will then apply to other systems according to your design

Topic Objective

To illustrate how to apply

security Group Policy to

secure the user

organizational unit level by

using Group Policy

Delivery Tip

Demonstrate how to import

a security template by using

Import security templates

into Security Settings in

Group Policy to apply

consistent and tested

security policies to

computers in an Active

Directory container

Trang 7

" Using Group Policy to Configure Account Policies

! What Are Account Policies?

! Configuring Password Policy Settings

! Configuring Account Lockout Policy Settings

In Microsoft® Windows® 2000, you can configure account policies that prevent unauthorized persons from logging on to the network and gaining access to network resources These enhanced network security measures include setting a password policy and a user account lockout policy that make it more difficult to guess a password, and they also limit the number of attempts that an

unauthorized person can make to determine a password These measures help prevent unauthorized persons from gaining access to your network

Topic Objective

To introduce using Group

Policy to configure account

policies

Lead-in

You configure account

policies to prevent

unauthorized persons from

logging on to the network

Trang 8

What Are Account Policies?

Use account policies to prevent unauthorized persons from gaining

access to the network

Must set Group Policy at domain level

Must set Group Policy at domain level

Set password requirements to

Set password requirements to

Domain controller does not authenticate

Domain controller does not authenticate

Domain controller locks out user account

Domain controller locks out user account

Set failed logon attempts limit to

Set failed logon attempts limit to

Ensure passwords are difficult to guess

Ensure passwords are difficult to guess

Stop brute force hacking programs

Stop brute force hacking programs

Account policies for user accounts can be used to reduce the possibility of unauthorized persons gaining access to the network When you set account policies in Active Directory, Windows 2000 allows policies to be set at the domain level and at the organizational unit level The domain account policy becomes the account policy of any Windows 2000–based workstation or server that is a member of the domain

The account policy settings for the organizational unit affect the local policy on any computers contained in the organizational unit This means that the account policies set at the domain level always apply when logging on using an account that exists in the domain The local policy settings apply only when logging on using an account that is local to the computer that you are logging on to The account policy settings that you can configure with Group Policy are:

! Password policies Password policies establish restrictions that require users

to periodically change passwords and to use complex passwords Password complexity includes the minimum length and the characters to use,

including alphanumeric, symbols, and upper- and lower-case letters By forcing users to use complex passwords, you make it more difficult for

unauthorized persons to use brute force hacking programs to gain access to your network Brute force hacking programs try to log on repeatedly by

providing different passwords, for example, by attempting to use each word

in a dictionary as the password

! Account lockout policies Account lockout policies ensure that a user

account is locked after a predetermined number of failed logon attempts Setting a limit for failed logon attempts makes it difficult for unauthorized persons to log on by using brute force algorithms to determine a password After a domain controller locks out a user account, the user account cannot

be used for authentication until the account is unlocked You can configure the lockout duration

unauthorized users from

gaining access to your

network

Delivery Tip

Explain what a brute force

hacking program is

Mention to students that the

most common password

used is password Explain

why it is important to

implement a password

account policy so that users

have complex passwords

Key Points

Administrators must set

Group Policy for account

policies at the domain level

to affect domain logons

Setting password

restrictions and a limit of

failed logon attempts makes

it more difficult for an

unauthorized person to gain

access to the network

Trang 9

Configuring Password Policy Settings

!Password settings apply to the domain

!The settings to configure are:

Group Policy

Action View Passwords [LONDON.NWTraders.msft Computer Configuration Software Settings Windows Settings Security Settings Account Policies Account Lockout Poli Kerberos Policy Local Policies

Allow storage of passwords under reversibl…

Enforce password uniqueness by remem…

Maximum Password Age

Minimum Password Age

Minimum Password Length Passwords must meet complexity require…

User must logon to change password

Attribute Stored Template Settin

Note that when you modify password settings, they do not apply to existing passwords They apply the next time that a user changes his or her password, or when you create or reset a user account

The following list describes the password settings you must configure:

! Enforce password uniqueness by remembering Use this setting to prevent

users from reusing a previous password Windows 2000 will remember the number of passwords that you indicate, ranging from 0 to 24 passwords In a high-security environment, consider setting this value to 24 remembered passwords In a medium-security environment, set this value to six remembered passwords

! Maximum Password Age This setting forces users to change their

passwords after a specified period of time so that they do not continually use the same password In a high-security network, set this value to 30 days In

a medium-security network, set the value to 42 days

! Minimum Password Length This setting determines the required minimum

length of users’ passwords In a high-security environment, set this to at least eight characters

In a multiple-domain network, you can link the same Group Policy object

to each domain container, or you can use different settings in each domain

There are several critical

Group Policy password

settings that you must

configure

Delivery Tip

Demonstrate configuring the

password settings in Group

Policy

Key Points

Group Policy password

settings apply to all user

accounts in the domain

When you configure

password settings, the

settings do not apply to

existing passwords Domain

controllers enforce the

password requirements

when an administrator

creates a user account or

resets a password, or when

a user changes a password

If there is conflict between

the minimum length of a

password setting and the

length determined by the

complex passwords setting,

the most restrictive setting

prevails

Note

Note

Trang 10

! Passwords must meet complexity requirements This setting requires

passwords to comply with the following complexity rules:

• The minimum password length must be six characters If there are conflicts between these settings and the password length setting, the more restrictive setting prevails

• The password cannot contain sections of the user’s full name

• The password must contain characters from at least three of the following four categories

Description Example

English uppercase letters A, B, C, D, … Y, Z English lowercase letters a, b, c, d, … y, z Westernized Arabic numerals 0, 1, 2, … 9 Non-alphanumeric characters !, ?, (, …

! User must log on to change a password This setting forces users to log on

to their accounts before they can change their passwords This setting also disables user accounts that have exceeded the maximum password age Only

an administrator can enable the user account again This prevents unauthorized persons from attempting to log on by using unauthorized user accounts

To configure Password Policy settings, perform the following steps:

1 Open Active Directory User and Computers, create a Group Policy object at the domain level or select an existing Group Policy object that is linked to

the domain, and then click Edit

2 In Group Policy, expand Computer Configuration, expand Windows Settings, expand Security Settings, expand Account Policy, and then expand Password Policy

Trang 11

Configuring Account Lockout Policy Settings

!Account lockout policy settings apply to domains

!You must configure all account lockout policy settings

or none

Group Policy

Action View Account Lockout [LONDON.NWTraders.msft Computer Configuration

Software Settings Windows Settings Security Settings Account Policies Password Policy Account Lockout Policy Kerberos Policy Local Policies

Account Lockout Policy

Attribute Stored Template Settin

Account lockout control Lockout account for Reset account lockout count after

5 Invalid logon attempts Forever

Limit on failed logon attempts

Limit on failed logon attempts

Amount of time that the lockout is in effect

Like password settings, account lockout policy settings apply to all user accounts in a domain Link the Group Policy object for account lockout policy settings to the domain or domains in the network

Domain controllers start enforcing the requirements during user authentication after the Group Policy object is applied to the domain controllers You must configure all three of the account lockout policy settings to set up an account lockout policy

The following list describes the account lockout settings that you must configure:

! Account lockout count This setting determines the allowed number of failed

logon attempts before Windows 2000 locks the account The number of failed logon attempts must match the security level that your network requires In a high-security network, set this value to five logon attempts

! Lockout account for This setting determines the amount of time that the

lockout is effective In a high-security network, select Forever This means

that an administrator must manually unlock the user account In a security network, set this value to 30 minutes to prevent the effective use of automated methods to guess a password

medium-! Reset account lockout count after This setting determines the amount of

time after which the counter for failed attempts returns to zero In a security network, set this value to one day (1,440 minutes) In a medium-security network, set this value to 30 minutes

Account lockout policy

works well with password

policy by limiting the number

of times that a person can

attempt to log on

Delivery Tip

Demonstrate configuring the

account lockout settings in

Group Policy

Key Points

An administrator can only

set Group Policy account

lockout settings at the

domain level

An administrator must

configure all three settings

or none

The number of logon

attempts that are allowed

must match the security

required in the network

Trang 12

To configure Account Lockout Policy settings, perform the following steps:

1 Open Active Directory User and Computers, create a Group Policy object at the domain level or select an existing Group Policy object linked to the

domain, and then click Edit

2 In Group Policy, expand Computer Configuration, expand Windows Settings, expand Security Settings, expand Account Policy, and then expand Account Lockout Policy

Trang 13

Lab A: Using Group Policy to Secure the Desktop

Trang 14

Lab Setup

# Log on to your domain as

Administrator with a

password of password

a Press CTRL+ALT+DEL to open the logon screen

b In the User Name box, type Administrator

c In the Password box, type password

d In the Domain box, ensure that your domain is listed

e Click OK

Trang 15

Exercise 1

Implementing Security Policy

In this exercise, you will create a new GPO, which is linked to the Domain Controllers

organizational unit and named Additional Security Settings Policy, to implement the required

security settings

Scenario

You are a domain administrator for a domain in the Northwind Traders organization, and are

required to implement the following security settings on your domain controllers:

! Passwords must be at least six characters

! A dialog box should appear during the logon process, informing users that unauthorized access is not allowed

! Domain Admins should have only the Administrator account as a member

! Telnet, which is set to start manually, should be disabled

1 Create a new GPO linked to

the Domain Controllers

organizational unit Name

this new GPO Additional

Security Settings Policy

a On the Administrative Tools menu, open Active Directory Users and

2 Modify the Additional

Security Settings Policy

GPO to implement the

following security setting:

Passwords must be at least

six characters

a With the Additional Security Settings Policy GPO selected, click Edit

b Under Computer Configuration, expand Windows Settings, expand Security Settings, expand Account Policies, and then click Password Policy

c In the details pane, double-click Minimum password length

d In the Security Policy Setting dialog box, select the Define this policy setting check box, change the value for the minimum password

length to 6, and then click OK

3 Modify the Additional

Security Settings Policy

GPO to implement the

following security setting:

Display a dialog box at

logon that warns users that

unauthorized access is not

Trang 16

(continued)

4 Modify the Additional

Security Settings Policy

GPO to implement the

following security setting:

Domain Admins should

have only the Administrator

account as a member

a In the console tree, click Restricted Groups

b Right-click Restricted Groups, and then click Add Group

c In the Add Group dialog box, click Browse,

d In the Select Groups dialog box, under Name, click Domain Admins

click Add, and then click OK

e Click OK to close the Add Group dialog box

f In the details pane, double-click Domain\Domain Admins

g In the Configure Membership for Domain\Domain Admins dialog

box, click Add to the right of Members of this group

h In the Add Member dialog box, click Browse

i In the Select Users or Groups dialog box, under Name, select Administrator, click Add, and then click OK

j Click OK to close the Add Member dialog box

k Click OK to close the Configure Membership for Domain\Domain

Admins dialog box

5 Modify the Additional

Security Settings Policy

GPO to implement the

following security setting:

The Telnet service should be

disabled

a In the console tree, click System Services

b In the details pane, double-click Telnet

c In the Security Policy Setting dialog box, click the Define this policy setting check box

Notice that the Security for Telnet security editor appears

System services need to be properly secured, so this dialog box appears for any service in the list

d Select Everyone, and then click Remove

e Click Add and in the Select Users, Computers, or Groups dialog box

verify that domain.nwtraders.msft displays (where domain is your

domain) and then double-click Domain Admins and click OK

f Select the Allow check box beside Full Control, and then click OK

g In the Security Policy Setting dialog box, ensure that Disabled is

selected, and then click OK

h Close all open windows, and then restart the computer

6 Verify that the modifications

to the Additional Security

Settings Policy GPO are

being applied correctly

a Log on as Administrator with a password of password

Did the warning message appear when you tried to log on?

Yes

Trang 17

(continued)

6 (continued) b Change your password from password to 123

Did the minimum password length Group Policy setting of six characters prevent you from changing your password to one that contained only three characters? Why or why not?

No, the password was changed successfully Password Group Policy is only enforced when it is set at the domain level

6 (continued) c Change your password back to password

d Add the Guest user account to the Domain Admins group

e Force a refresh of Group Policy by opening a command prompt, typing

secedit /refreshpolicy machine_policy /enforce and then pressing

ENTER

Is the Guest user account still listed as a member of the Domain Admins group? Why or why not?

No The membership of Domain Admins is restricted to the Administrator account When Group Policy was refreshed, the Guest account was removed

6 (continued) f Open Services from the Administrative Tools menu

What is the value in the Startup Type column for the Telnet service?

Disabled

6 (continued) g Close all open windows

7 Run the Delpol.cmd batch

file in the

C:\Moc\2155\Labfiles\Lab1

4A folder This batch file

removes all GPOs created in

the labs in this module

a Open the D:\Moc\2155\Labfiles\Lab14A folder

b Double-click Delpol.cmd to remove the log on and log off messages in

the GPOs created during the labs in this module

c Restart your computer

d Click OK to close the VBScript message

Trang 18

Analyzing Security Log Files to Detect Security Breaches

! Security Logs and Event Viewer

! Common Security Events

In many cases, such as denial-of-service attacks, security breaches have obvious consequences However, often the consequences of a security breach are more subtle For example, if an unauthorized user attempts to gain access to another user’s account by guessing the password, the attempt will not cause a service failure The unauthorized user may guess the correct password and gain access, even if the user account is locked

Some breaches exploit security loopholes and configuration errors For example, if a mistake has been made in the permissions of a security-sensitive file and a user notices this mistake, the user can access the file without mounting any kind of attack

An organization can detect these kinds of events by using the security log, which exists on all Windows 2000 computers If you are responsible for network security, you must know how to detect these events by using the logs

It is assumed here that the security Audit policy has already been planned and implemented by the top-level administrators in your organization This topic concentrates on analyzing the resulting log files For more information

about configuring auditing, see the topic “Security” in the Microsoft Windows

2000 Server Manual

Topic Objective

To equip the students with

the ability to identify

common security-related

events in the Security Log

Lead-in

If your responsibilities

include security protection,

you must be able to

recognize a security breach

Key Points

It has been assumed here

that the Audit policy has

already been defined and

implemented in your

organization and that the

students’ role will be to

monitor the resulting logs,

not change the

Ngày đăng: 04/11/2013, 13:15

TỪ KHÓA LIÊN QUAN