WS-011 Windows Server 2019 Administration
WS-011 Windows Server 2019 Administration
WS-011 Windows Server 2019 Administration
Server 2019
Administration
This module describes how securing your servers is the key to securing your entire on-
premises environment
Lessons:
o Lesson 1: Credentials and privileged access protection in Windows Server
o NTLM blocking
Adjust memory quotas for a process Determines which security principals can adjust the maximum amount of memory assigned to a
process.
Allow log on locally Determines which users can sign in locally to a computer. Alter this policy on privileged access
workstations to remove members of the Users group as a way of limiting which accounts can
sign into a computer. By default, any authenticated user can sign in to any workstation or server
except for a domain controller, which is limited to members of certain groups.
Allow log on through Remote Desktop Determines which users and groups can sign in remotely by using Microsoft Remote Desktop.
Services
Back up files and directories Gives permission to back up files, directories, registry, and other objects to which the user
normally would not have permission. Assigning this right gives indirect access to all data on a
computer. This is because the person that has the right can back that data up, and then recover
it in an environment over which they have complete control.
Configure user rights (3 of 3)
Where possible, organizations should avoid accounts with passwords that never expire
Organizations should disable accounts where no sign in has occurred for more than 90 days
Using PowerShell:
Get-ADUser -Filter {Enabled -eq $true -and PasswordNeverExpires -eq $true}
Get-ADUser -Filter {LastLogonTimeStamp -lt (Get-Date).Adddays(-(90))-and
enabled -eq $true} -Properties LastLogonTimeStamp
Demonstration:
Locate
problematic
accounts
Use PowerShell to locate problematic
accounts
Lesson 1: Test your knowledge
This lesson describes how making the servers and devices secure, or hardened, is another
integral part of securing your Windows Server environment
Topics:
What is Local Administrator Password Solution?
How LAPS works
Configure and manage passwords using LAPS
o Demonstration: Configure and deploy LAPS
Local Administrator Password Solution (LAPS) is a tool that helps secure servers by:
Ensuring local Administrator passwords are unique on each computer that LAPS
manages
Changing local Administrator passwords regularly to a random value
Storing local administrator passwords and secrets securely within Active Directory
Domain Services (AD DS)
Controlling access to passwords and secrets with configurable permissions
Transmitting LAPS-retrieved passwords to the client in a secure encrypted manner
What is Local Administrator Password Solution? (2 of 2)
LAPS prerequisites:
LAPS works with any domain-member x86 or x64 Windows client or Windows Server
computer
Requires Windows Server 2003 or later Active Directory Domain functional level
You must extend the Active Directory schema to use LAPS
Install LAPS client on managed computers
Requires Microsoft .NET Framework 4.0 and Windows PowerShell 2.0 or later
How LAPS works
LAPS determines if the password of the local Administrator account has expired
If the password has expired, LAPS performs the following steps:
Changes the local Administrator password to a new random value
Transmits the new password and expiration date to AD DS, where it is stored in a special
confidential attribute associated with the computer account of the computer
Configure and manage passwords by using LAPS
Add computer accounts to an organizational unit (OU) and enable the OU to use LAPS by
using Windows PowerShell
Configure password properties using Group Policy:
Password complexity
Password length
Password expiration
View passwords by using Windows PowerShell, Active Directory Users and Computers, or the
LAPS UI app
Demonstration:
Configure and
deploy LAPS
Learn how to configure and deploy LAPS
Limit administrative access to secure hosts (1 of 3)
Do not use a computer that is used for daily tasks such as internet browsing and answering
email, for administrative tasks
Perform administrative tasks only on secure hosts (privileged access workstations):
Minimize the chance of a compromised workstation being used for administrative tasks
Limit the possibility of lateral movement through credential harvesting
Limit administrative access to secure hosts (2 of 3)
Jump servers:
Are also known as bastion hosts
Are configured similarly to a PAW
Are only accessed remotely
Do not guarantee the security of the workstation used to connect from
Secure domain controllers
Run the most recent version of Windows Server and apply all security updates
Use the Server Core installation option
Keep in dedicated, secure racks
Deploy physical domain controllers on hardware with Trusted Platform Module (TPM), and
use BitLocker
Use read-only domain controllers (RODCs) where security is not assured
Run virtualized domain controllers as shielded virtual machines (VMs)
Use AppLocker and Device Guard to control the execution of executables and scripts
Limit inbound Remote Desktop Protocol (RDP) connections to jump servers and PAWs
Configure the perimeter firewall to block traffic from domain controllers
Overview of the Security Compliance Toolkit
Security baselines align closely to Center for Internet Security Level 1 benchmark
Lesson 2: Test your knowledge
This lesson describes JEA. It allows you to apply RBAC and the least privilege principle to
Windows PowerShell remote sessions
Topics:
o What is JEA?
o JEA limitations
o JEA endpoints
JEA:
Provides RBAC to Windows PowerShell remoting
Specially configured endpoints limit access so that a user can only use a defined set of
Windows PowerShell cmdlets, parameters, and parameter values
Performs actions by using a special local virtual account
Supported natively on Windows Server 2016 and later and Windows 10 version 1511
and later
JEA limitations
Not suitable for tasks where the problem and solution are not clearly defined:
Setup requires understanding precisely which cmdlets, parameters, aliases, and values are
needed in order to perform specific tasks
JEA only works with Windows PowerShell sessions, and does not work with management
consoles or other remote administration tools
Role capability files
Role capability files allow you to specify what administrators can do in a Windows
PowerShell session
Anything that is not explicitly allowed in a role capability file or a session configuration file is
not allowed
You can create a new blank role capability file by using the New-PSRoleCapabilityFile
cmdlet
Role capability files use the .psrc extension
Session configuration files
Session configuration files determine which actions can be performed in a JEA session and
which security principals perform those actions
Create new session configuration files by using the New-PSSessionConfigurationFile
cmdlet
Use the .pssc file extension
JEA endpoints
Interactive connection:
Enter-PSSession -ComputerName <computername>
-ConfigurationName <endpoint name>
Implicit remoting:
$DNSOpssession = New-PSSession -ComputerName 'MyServer' -
ConfigurationName 'DNSOps’
Import-PSSession -Session $DNSOpssession -Prefix 'DNSOps’
Get-DNSOpsCommand
Programmatic:
Same as for other PowerShell endpoints
Demonstration:
Connect to a JEA
endpoint
Review a connection made to a JEA
endpoint
Verify that the session is limited to
specific commands
Lesson 3: Test your knowledge
This lesson describes SMB protocol. It is a network protocol primarily used for file sharing.
Whenever sensitive data is moved by using the SMB protocol, encryption is important.
Topics:
What is SMB 3.1.1 protocol security?
SMB 3.1.1 encryption requirements
Configuring SMB encryption on SMB shares
Disable SMB 1.0
o Demonstration: Disable SMB 1.0 and configure SMB encryption on shares
What is SMB 3.1.1 protocol security?
SMB 3.0 provides for encryption of Server Message Block (SMB) traffic
SMB 3.1.1 adds:
Preauthentication integrity
Preauthentication that digitally hashes and signs the negotiate and session setup
messages. Tampering with messages results in a failed connection
Additional security improvements such as AES-GCM-128 encryption
o What is WSUS?
Windows Update is a Microsoft service that provides updates for Microsoft software
Orchestrator on devices scans for and downloads updates
Clients and servers can be configured to get updates from the Windows Update Services
server
What is WSUS? (1 of 2)
Prerequisites:
1.4 gigahertz (GHz) or faster x64 processor
2 gigabytes (GB) of random-access memory (RAM) or greater (above that needed for other
roles)
10 GB or greater
100 megabits per second (Mbps) or greater network adapter
.NET Framework 4.0
Access to Temp folders
Local Administrator group member
Microsoft Report Viewer Runtime 2012
Windows Internal Database or Microsoft SQL Server
WSUS server deployment options
WSUS implementation:
Single server
Multiple servers
Disconnected servers
WSUS hierarchies:
Autonomous mode
Replica mode
WSUS database:
Windows Internal Database
SQL Server database
The WSUS update management process
Four phases:
1. Assess
o Choose topology
2. Identify
o Choose specific updates
4. Deploy
o Deploy the updates
o Track status
Azure Update Management
o WS-011T00A-SEA-ADM1
o WS-011T00A-SEA-SVR1
Contoso Corporation is a medical research company with about 5,000 employees worldwide.
It has specific needs for ensuring that their medical data and records remain private. The
company has a headquarters location and multiple worldwide sites. Contoso has recently
deployed a Windows Server and Windows client infrastructure.
You have been asked to implement improvements in the server security configuration.
Lab-review questions
3. Which SMB version is negotiated by Windows Server 2019 when communicating with
Windows Server 2012 R2?
SMB 3.02
Thank you.