WS-011 Windows Server 2019 Administration
WS-011 Windows Server 2019 Administration
WS-011 Windows Server 2019 Administration
Server 2019
Administration
Access this computer from the network Determines which users and groups can connect to the computer from the network. This does not affect RDS.
Act as part of the operating system Allows a process to impersonate a user without authentication. You typically would assign the LocalSystem
account to processes that require this privilege.
Add workstations to domain Allows you to join workstations to the domain.
Adjust memory quotas for a process Determines which security principals can adjust the maximum amount of memory assigned to a process.
Allow log on locally Determines which users can sign in locally to a computer. Alter this policy on privileged access workstations to
remove members of the Users group as a way of limiting which accounts can sign into a computer. By default,
any authenticated user can sign in to any workstation or server except for a domain controller, which is limited
to members of certain groups.
Allow log on through Remote Desktop Services Determines which users and groups can sign in remotely by using Microsoft Remote Desktop.
Back up files and directories Gives permission to back up files, directories, registry, and other objects to which the user normally would not
have permission. Assigning this right gives indirect access to all data on a computer. This is because the
person that has the right can back that data up, and then recover it in an environment over which they have
complete control.
Configure user rights (3 of 3)
Windows Defender Credential Guard uses virtualization-based security to isolate secrets such as cached
credentials
Mitigates Pass-the-Hash or Pass-the-Ticket attacks
Utilizes hardware security, including secure boot and virtualization
Isolates credentials within a virtualized container
Windows Defender Credential Guard requirements
Where possible, organizations should avoid accounts with passwords that never expire
Organizations should disable accounts where no sign in has occurred for more than 90 days
Using PowerShell:
Get-ADUser -Filter {Enabled -eq $true -and PasswordNeverExpires -eq $true}
Get-ADUser -Filter {LastLogonTimeStamp -lt (Get-Date).Adddays(-(90))-and enabled
-eq $true} -Properties LastLogonTimeStamp
Demonstration:
Locate problematic
accounts
Use PowerShell to locate problematic
accounts
Lesson 1: Test your knowledge
This lesson describes how making the servers and devices secure, or hardened, is another integral part of
securing your Windows Server environment
Topics:
What is Local Administrator Password Solution?
How LAPS works
Configure and manage passwords using LAPS
o Demonstration: Configure and deploy LAPS
o Limit administrative access to secure hosts
o Secure domain controllers
o Overview of the Security Compliance Toolkit
What is Local Administrator Password Solution? (1 of 2)
Local Administrator Password Solution (LAPS) is a tool that helps secure servers by:
Ensuring local Administrator passwords are unique on each computer that LAPS manages
Changing local Administrator passwords regularly to a random value
Storing local administrator passwords and secrets securely within Active Directory Domain Services
(AD DS)
Controlling access to passwords and secrets with configurable permissions
Transmitting LAPS-retrieved passwords to the client in a secure encrypted manner
What is Local Administrator Password Solution? (2 of 2)
LAPS prerequisites:
LAPS works with any domain-member x86 or x64 Windows client or Windows Server computer
Requires Windows Server 2003 or later Active Directory Domain functional level
You must extend the Active Directory schema to use LAPS
Install LAPS client on managed computers
Requires Microsoft .NET Framework 4.0 and Windows PowerShell 2.0 or later
How LAPS works
LAPS determines if the password of the local Administrator account has expired
If the password has expired, LAPS performs the following steps:
Changes the local Administrator password to a new random value
Transmits the new password and expiration date to AD DS, where it is stored in a special confidential
attribute associated with the computer account of the computer
Configure and manage passwords by using LAPS
Add computer accounts to an organizational unit (OU) and enable the OU to use LAPS by using Windows
PowerShell
Configure password properties using Group Policy:
Password complexity
Password length
Password expiration
View passwords by using Windows PowerShell, Active Directory Users and Computers, or the LAPS UI app
Demonstration:
Configure and
deploy LAPS
Learn how to configure and deploy LAPS
Limit administrative access to secure hosts (1 of 3)
Do not use a computer that is used for daily tasks such as internet browsing and answering email, for
administrative tasks
Perform administrative tasks only on secure hosts (privileged access workstations):
Minimize the chance of a compromised workstation being used for administrative tasks
Limit the possibility of lateral movement through credential harvesting
Limit administrative access to secure hosts (2 of 3)
Jump servers:
Are also known as bastion hosts
Are configured similarly to a PAW
Are only accessed remotely
Do not guarantee the security of the workstation used to connect from
Secure domain controllers
Run the most recent version of Windows Server and apply all security updates
Use the Server Core installation option
Keep in dedicated, secure racks
Deploy physical domain controllers on hardware with Trusted Platform Module (TPM), and use BitLocker
Use read-only domain controllers (RODCs) where security is not assured
Run virtualized domain controllers as shielded virtual machines (VMs)
Use AppLocker and Device Guard to control the execution of executables and scripts
Limit inbound Remote Desktop Protocol (RDP) connections to jump servers and PAWs
Configure the perimeter firewall to block traffic from domain controllers
Overview of the Security Compliance Toolkit
This lesson describes JEA. It allows you to apply RBAC and the least privilege principle to Windows
PowerShell remote sessions
Topics:
o What is JEA?
o JEA limitations
JEA:
Provides RBAC to Windows PowerShell remoting
Specially configured endpoints limit access so that a user can only use a defined set of Windows
PowerShell cmdlets, parameters, and parameter values
Performs actions by using a special local virtual account
Supported natively on Windows Server 2016 and later and Windows 10 version 1511 and later
JEA limitations
Not suitable for tasks where the problem and solution are not clearly defined:
Setup requires understanding precisely which cmdlets, parameters, aliases, and values are needed in
order to perform specific tasks
JEA only works with Windows PowerShell sessions, and does not work with management consoles or other
remote administration tools
Role capability files
Role capability files allow you to specify what administrators can do in a Windows PowerShell session
Anything that is not explicitly allowed in a role capability file or a session configuration file is not allowed
You can create a new blank role capability file by using the New-PSRoleCapabilityFile cmdlet
Role capability files use the .psrc extension
Session configuration files
Session configuration files determine which actions can be performed in a JEA session and which security
principals perform those actions
Create new session configuration files by using the New-PSSessionConfigurationFile cmdlet
Use the .pssc file extension
JEA endpoints
Interactive connection:
Enter-PSSession -ComputerName <computername>
-ConfigurationName <endpoint name>
Implicit remoting:
$DNSOpssession = New-PSSession -ComputerName 'MyServer' -ConfigurationName
'DNSOps’
Import-PSSession -Session $DNSOpssession -Prefix 'DNSOps’
Get-DNSOpsCommand
Programmatic:
Same as for other PowerShell endpoints
Demonstration:
Connect to a JEA
endpoint
Review a connection made to a JEA endpoint
Verify that the session is limited to specific
commands
Lesson 3: Test your knowledge
This lesson describes SMB protocol. It is a network protocol primarily used for file sharing. Whenever
sensitive data is moved by using the SMB protocol, encryption is important.
Topics:
What is SMB 3.1.1 protocol security?
SMB 3.1.1 encryption requirements
Configure SMB encryption on SMB shares
Disable SMB 1.0
o Demonstration: Disable SMB 1.0, and configure SMB encryption on shares
What is SMB 3.1.1 protocol security?
SMB 3.0 provides for encryption of Server Message Block (SMB) traffic
SMB 3.1.1 adds:
Preauthentication integrity
Preauthentication that digitally hashes and signs the negotiate and session setup messages. Tampering
with messages results in a failed connection
Additional security improvements such as AES-GCM-128 encryption
SMB 3.1.1.c adds:
Even more security improvements, including support for write-through to disk
SMB 3.1.1 encryption requirements
Windows Update is a Microsoft service that provides updates for Microsoft software
Orchestrator on devices scans for and downloads updates
Clients and servers can be configured to get updates from the Windows Update Services server
What is WSUS? (1 of 2)
Prerequisites:
1.4 gigahertz (GHz) or faster x64 processor
2 gigabytes (GB) of random-access memory (RAM) or greater (above that needed for other roles)
10 GB or greater
100 megabits per second (Mbps) or greater network adapter
.NET Framework 4.0
Access to Temp folders
Local Administrator group member
Microsoft Report Viewer Runtime 2012
Windows Internal Database or Microsoft SQL Server
WSUS server deployment options
WSUS implementation:
Single server
Multiple servers
Disconnected servers
WSUS hierarchies:
Autonomous mode
Replica mode
WSUS database:
Windows Internal Database
SQL Server database
The WSUS update management process
Four phases:
1. Assess
o Choose topology
2. Identify
o Choose specific updates
3. Evaluate and plan
o Test updates before broad deployment
4. Deploy
o Deploy the updates
o Track status
Azure Update Management
o WS-011T00A-SEA-ADM1
o WS-011T00A-SEA-SVR1
Contoso Pharmaceuticals is a medical research company with about 5,000 employees worldwide. It has
specific needs for ensuring that their medical data and records remain private. The company has a
headquarters location and multiple worldwide sites. Contoso has recently deployed a Windows Server and
Windows client infrastructure.
You have been asked to implement improvements in the server security configuration.
Lab-review questions
3. Which SMB version is negotiated by Windows Server 2019 when communicating with Windows Server
2012 R2?
a. SMB 1.0
b. SMB 2.0
c. SMB 3.02
d. SMB 3.1.1
Module-review answers
2. Which Windows PowerShell cmdlet do you use to configure a specific OU so that computers within that
OU can use LAPS?
d. Set-AdmPwdComputerSelfPermission
3.Which SMB version is negotiated by Windows Server 2019 when communicating with Windows Server
2012 R2?
c. SMB 3.02
References