WS-011 Windows Server 2019 Administration

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 66

WS-011 Windows

Server 2019
Administration

© Copyright Microsoft Corporation. All rights reserved.


Module 8: Windows
Server security
Module Overview

This module describes how securing your servers is the key to securing your entire on-
premises environment
 Lessons:
o Lesson 1: Credentials and privileged access protection in Windows Server

o Lesson 2: Hardening Windows Server

o Lesson 3: JEA in Windows Server

o Lesson 4: Securing and analyzing SMB traffic

o Lesson 5: Windows Server update management


Lesson 1: Credentials
and privileged access
protection in Windows
Server
Lesson 1 overview

This lesson describes how to secure Windows Server.


It includes properly configurating user accounts and ensuring accounts
have only the privileges needed to perform necessary tasks
 Topics:
o Configure user rights

o Protected users and groups, authentication policies, and authentication-policy silos

o What is Windows Defender Credential Guard?

o Windows Defender Credential Guard requirements

o Configure Windows Defender Credential Guard

o NTLM blocking

o Locate problematic accounts

o Demonstration: Locate problematic accounts


Configure user rights (1 of 3)

 Follow principle of least privilege


 Use separate user accounts for daily tasks and administrative tasks
 Assign user rights to the account in Active Directory or with Group Policy Object (GPO)
Configure user rights (2 of 3)

User rights assignment Function


policy
Access Credential Manager as a trusted Used by Credential Manager during backup and restore. You should not assign this privilege to
caller user accounts.
Access this computer from the network Determines which users and groups can connect to the computer from the network. This does
not affect RDS.
Act as part of the operating system Allows a process to impersonate a user without authentication. You typically would assign the
LocalSystem account to processes that require this privilege.

Add workstations to domain Allows you to join workstations to the domain.

Adjust memory quotas for a process Determines which security principals can adjust the maximum amount of memory assigned to a
process.
Allow log on locally Determines which users can sign in locally to a computer. Alter this policy on privileged access
workstations to remove members of the Users group as a way of limiting which accounts can
sign into a computer. By default, any authenticated user can sign in to any workstation or server
except for a domain controller, which is limited to members of certain groups.

Allow log on through Remote Desktop Determines which users and groups can sign in remotely by using Microsoft Remote Desktop.
Services
Back up files and directories Gives permission to back up files, directories, registry, and other objects to which the user
normally would not have permission. Assigning this right gives indirect access to all data on a
computer. This is because the person that has the right can back that data up, and then recover
it in an environment over which they have complete control.
Configure user rights (3 of 3)

Configure additional settings to increase privileged account security:


 Logon Hours
 Logon Workstations
 Smart card is required for interactive logon
 Account is sensitive and cannot be delegated
 Account Expires

Do not enable the following settings, as these decrease security:


 Do not require Kerberos preauthentication
 Password Never Expires
 Use only Kerberos Data Encryption Standard (DES) encryption types for this account
Protected users, authentication policies, and authentication-policy silos
(1 of 3)
 Provides a method of protecting highly privileged accounts
 Authentication policies specify settings that mitigate exposure to credential theft
 Authentication policy silos allow administrators to define a relationship between the User,
Computer, and managed service accounts
Protected users, authentication policies, and authentication-policy
silos (2 of 3)
Workstation protections:
 User credentials are not cached locally
 Credential Security Support Provider protocol (CredSSP) will not cache user credentials
 Windows Digest will not cache user credentials
 NTLM will not cache user credentials
 Kerberos will not create Data Encryption Standard (DES) or RC4 keys, or cache credentials
or long-term keys
 The user can no longer sign in offline

Domain controllers have additional protections


Protected users, authentication policies, and authentication-policy
silos (3 of 3)
Authentication policies:
 Configure user’s TGT lifetime
 Restrict which devices the user can sign in to
 Set criteria that the devices need to meet for signing in

Authentication policy silos:


 Adds configuration restrictions to Protected Users group
 Each account belongs to only one Authentication policy silo
 Used to restrict access to servers and other claims-aware resources
What is Windows Defender Credential Guard?

 Windows Defender Credential Guard uses virtualization-based security to isolate secrets


such as cached credentials
 Mitigates Pass-the-Hash or Pass-the-Ticket attacks
 Utilizes hardware security, including secure boot and virtualization
 Isolates credentials within a virtualized container
Windows Defender Credential Guard requirements

Windows Defender Credential Guard requires:


 Windows 10 Enterprise, Windows 10 Education, Windows 10 IoT Enterprise, or Windows
Server 2016 or later
 64-bit CPU
 CPU virtualization extensions plus extended page tables (Intel VT-x or AMD-V)
 Trusted Platform Module (TPM) 1.2 or 2.0
 Unified Extensible Firmware Interface (UEFI) firmware version 2.3.1.c or later
 UEFI secure boot
 UEFI secure firmware update

Supports Hyper-V VMs on:


 Windows Server 2016 or later Microsoft Hyper-V host with IOMMU
 Gen 2 VM with TPM enabled and running supported OS
Configure Windows Defender Credential Guard

Enable Credential Guard:


 Using Group Policy
 Enable virtualization-based security and update the registry
 Use the Windows Defender Device Guard and Windows Defender Credential Guard
hardware readiness tool:
DG_Readiness_Tool.ps1 -Enable -AutoReboot
Disable Credential Guard:
 Disable Group Policy (if enabled without UEFI Lock)
 Update registry (and delete Extensible Firmware Interface (EFI) variables if needed)
 Use the Windows Defender Device Guard and Windows Defender Credential Guard
hardware readiness tool
 Disable Hyper-V
NTLM blocking

Use Group Policy


Prior to blocking the use of NTLM, audit how it is currently being used
Block NTLM by configuring Network security:
 Restrict under NTLM authentication under
Computer Configuration\Windows Settings\Security Settings\Local Policies\
Security Options
Locate problematic accounts

Where possible, organizations should avoid accounts with passwords that never expire
Organizations should disable accounts where no sign in has occurred for more than 90 days
Using PowerShell:
 Get-ADUser -Filter {Enabled -eq $true -and PasswordNeverExpires -eq $true}
 Get-ADUser -Filter {LastLogonTimeStamp -lt (Get-Date).Adddays(-(90))-and
enabled -eq $true} -Properties LastLogonTimeStamp
Demonstration:
Locate
problematic
accounts
 Use PowerShell to locate problematic
accounts
Lesson 1: Test your knowledge

Refer to the Student Guide for lesson-review questions


Lesson 2: Hardening
Windows Server
Lesson 2 overview

This lesson describes how making the servers and devices secure, or hardened, is another
integral part of securing your Windows Server environment
 Topics:
 What is Local Administrator Password Solution?
 How LAPS works
 Configure and manage passwords using LAPS
o Demonstration: Configure and deploy LAPS

o Limit administrative access to secure hosts

o Secure domain controllers

o Overview of the Security Compliance Toolkit


What is Local Administrator Password Solution? (1 of 2)

Local Administrator Password Solution (LAPS) is a tool that helps secure servers by:
 Ensuring local Administrator passwords are unique on each computer that LAPS
manages
 Changing local Administrator passwords regularly to a random value
 Storing local administrator passwords and secrets securely within Active Directory
Domain Services (AD DS)
 Controlling access to passwords and secrets with configurable permissions
 Transmitting LAPS-retrieved passwords to the client in a secure encrypted manner
What is Local Administrator Password Solution? (2 of 2)

LAPS prerequisites:
 LAPS works with any domain-member x86 or x64 Windows client or Windows Server
computer
 Requires Windows Server 2003 or later Active Directory Domain functional level
 You must extend the Active Directory schema to use LAPS
 Install LAPS client on managed computers
 Requires Microsoft .NET Framework 4.0 and Windows PowerShell 2.0 or later
How LAPS works

LAPS determines if the password of the local Administrator account has expired
If the password has expired, LAPS performs the following steps:
 Changes the local Administrator password to a new random value
 Transmits the new password and expiration date to AD DS, where it is stored in a special
confidential attribute associated with the computer account of the computer
Configure and manage passwords by using LAPS

Add computer accounts to an organizational unit (OU) and enable the OU to use LAPS by
using Windows PowerShell
Configure password properties using Group Policy:
 Password complexity
 Password length
 Password expiration

View passwords by using Windows PowerShell, Active Directory Users and Computers, or the
LAPS UI app
Demonstration:
Configure and
deploy LAPS
 Learn how to configure and deploy LAPS
Limit administrative access to secure hosts (1 of 3)

Do not use a computer that is used for daily tasks such as internet browsing and answering
email, for administrative tasks
Perform administrative tasks only on secure hosts (privileged access workstations):
 Minimize the chance of a compromised workstation being used for administrative tasks
 Limit the possibility of lateral movement through credential harvesting
Limit administrative access to secure hosts (2 of 3)

Privileged access workstations (PAWs) configuration:


 Only authorized users can sign in
 Credential Guard is enabled
 BitLocker Drive Encryption is enabled
 Application execution is restricted by using Device Guard policies
 Access to all external sites is blocked by the perimeter network firewall
 Includes all the tools needed for administrative tasks
 Limits physical access
Limit administrative access to secure hosts (3 of 3)

Jump servers:
 Are also known as bastion hosts
 Are configured similarly to a PAW
 Are only accessed remotely
 Do not guarantee the security of the workstation used to connect from
Secure domain controllers

 Run the most recent version of Windows Server and apply all security updates
 Use the Server Core installation option
 Keep in dedicated, secure racks
 Deploy physical domain controllers on hardware with Trusted Platform Module (TPM), and
use BitLocker
 Use read-only domain controllers (RODCs) where security is not assured
 Run virtualized domain controllers as shielded virtual machines (VMs)
 Use AppLocker and Device Guard to control the execution of executables and scripts
 Limit inbound Remote Desktop Protocol (RDP) connections to jump servers and PAWs
 Configure the perimeter firewall to block traffic from domain controllers
Overview of the Security Compliance Toolkit

The SCT helps you:


 Analyze your current security configuration against security configuration baselines
 Compare GPO settings to settings that Microsoft recommends

The SCT consists of:


 Security baselines
 Policy Analyzer tool
 Local Group Policy Object tool

Security baselines align closely to Center for Internet Security Level 1 benchmark
Lesson 2: Test your knowledge

Refer to the Student Guide for lesson-review questions


Lesson 3: JEA in Windows
Server
Lesson 3 overview

This lesson describes JEA. It allows you to apply RBAC and the least privilege principle to
Windows PowerShell remote sessions
 Topics:
o What is JEA?

o JEA limitations

o Role capability files

o Session configuration files

o JEA endpoints

o Connect to a JEA endpoint

o Demonstration: Connect to a JEA endpoint


What is JEA?

JEA:
 Provides RBAC to Windows PowerShell remoting
 Specially configured endpoints limit access so that a user can only use a defined set of
Windows PowerShell cmdlets, parameters, and parameter values
 Performs actions by using a special local virtual account
 Supported natively on Windows Server 2016 and later and Windows 10 version 1511
and later
JEA limitations

Not suitable for tasks where the problem and solution are not clearly defined:
 Setup requires understanding precisely which cmdlets, parameters, aliases, and values are
needed in order to perform specific tasks
JEA only works with Windows PowerShell sessions, and does not work with management
consoles or other remote administration tools
Role capability files

 Role capability files allow you to specify what administrators can do in a Windows
PowerShell session
 Anything that is not explicitly allowed in a role capability file or a session configuration file is
not allowed
 You can create a new blank role capability file by using the New-PSRoleCapabilityFile
cmdlet
 Role capability files use the .psrc extension
Session configuration files

 Session configuration files determine which actions can be performed in a JEA session and
which security principals perform those actions
 Create new session configuration files by using the New-PSSessionConfigurationFile
cmdlet
 Use the .pssc file extension
JEA endpoints

 Connect to JEA endpoints to perform administrative tasks


 Configuration is determined by a session configuration file that links security groups
and role capability files
 A server can have multiple JEA endpoints
 Create JEA endpoints by using the Register-PSSessionConfiguration cmdlet:
Register-PSSessionConfiguration -Name DNSOps -Path DNSOps.pssc
Connect to a JEA endpoint

Interactive connection:
Enter-PSSession -ComputerName <computername>
-ConfigurationName <endpoint name>
Implicit remoting:
$DNSOpssession = New-PSSession -ComputerName 'MyServer' -
ConfigurationName 'DNSOps’
Import-PSSession -Session $DNSOpssession -Prefix 'DNSOps’
Get-DNSOpsCommand
Programmatic:
 Same as for other PowerShell endpoints
Demonstration:
Connect to a JEA
endpoint
 Review a connection made to a JEA
endpoint
 Verify that the session is limited to
specific commands
Lesson 3: Test your knowledge

Refer to the Student Guide for lesson-review questions


Lesson 4: Securing and
analyzing SMB traffic
Lesson 4 overview

This lesson describes SMB protocol. It is a network protocol primarily used for file sharing.
Whenever sensitive data is moved by using the SMB protocol, encryption is important.

 Topics:
 What is SMB 3.1.1 protocol security?
 SMB 3.1.1 encryption requirements
 Configuring SMB encryption on SMB shares
 Disable SMB 1.0
o Demonstration: Disable SMB 1.0 and configure SMB encryption on shares
What is SMB 3.1.1 protocol security?

SMB 3.0 provides for encryption of Server Message Block (SMB) traffic
SMB 3.1.1 adds:
 Preauthentication integrity
 Preauthentication that digitally hashes and signs the negotiate and session setup
messages. Tampering with messages results in a failed connection
 Additional security improvements such as AES-GCM-128 encryption

SMB 3.1.1.c adds:


 Even more security improvements, including support for write-through to disk
SMB 3.1.1 encryption requirements

Both host and client must support SMB 3.1.1


Preauthentication is not compatible with some older network equipment
Communication with an older OS will use an earlier version of SMB:
 SMB 3.02: Windows 8.1 and Windows Server 2012 R2
 SMB 3.0: Windows 8 and Windows Server 2012
Configure SMB encryption on SMB shares

Use Windows PowerShell to enable encrypted SMB:


 For an existing file share:
Set-SmbShare –Name <sharename> -EncryptData $true
 To encrypt all sharing on a file server:
Set-SmbServerConfiguration –EncryptData $true
 To create a new SMB file share and enable SMB encryption simultaneously:
New-SmbShare –Name <sharename> -Path <pathname> –EncryptData $true
Disable SMB 1.0

You can disable SMB 1.0 support by using Windows PowerShell:


 To disable SMB 1.0:
Set-SmbServerConfiguration –EnableSMB1Protocol $false
 To uninstall SMB 1.0:
Remove-WindowsFeature FS-SMB1
Demonstration:
Disable SMB 1.0,
and configure
SMB encryption
on shares
 Disable SMB 1.x on Windows Server
 Configure a share for SMB encryption
Lesson 4: Test your knowledge

Refer to the Student Guide for lesson-review questions


Lesson 5: Windows
Server update
management
Lesson 5 overview

This lesson describes WSUS.


It provides infrastructure to download, test, and approve updates which help block attacks
 Topics:
o Overview of Windows Update

o What is WSUS?

o WSUS server deployment options

o The WSUS update management process

o Azure Update Management


Overview of Windows Update

 Windows Update is a Microsoft service that provides updates for Microsoft software
 Orchestrator on devices scans for and downloads updates
 Clients and servers can be configured to get updates from the Windows Update Services
server
What is WSUS? (1 of 2)

WSUS provides an infrastructure for managing updates for Windows devices


WSUS allows you to:
 Choose the updates you want to download
 Test updates before broad deployment
 Choose which devices get updates and when they receive them
 Track status of updates
What is WSUS? (2 of 2)

Prerequisites:
 1.4 gigahertz (GHz) or faster x64 processor
 2 gigabytes (GB) of random-access memory (RAM) or greater (above that needed for other
roles)
 10 GB or greater
 100 megabits per second (Mbps) or greater network adapter
 .NET Framework 4.0
 Access to Temp folders
 Local Administrator group member
 Microsoft Report Viewer Runtime 2012
 Windows Internal Database or Microsoft SQL Server
WSUS server deployment options

WSUS implementation:
 Single server
 Multiple servers
 Disconnected servers

WSUS hierarchies:
 Autonomous mode
 Replica mode

WSUS database:
 Windows Internal Database
 SQL Server database
The WSUS update management process

Four phases:
1. Assess
o Choose topology

o Choose type of updates to deploy

2. Identify
o Choose specific updates

3. Evaluate and plan


o Test updates before broad deployment

4. Deploy
o Deploy the updates

o Track status
Azure Update Management

 Part of Azure Automation


 Free cloud-based service
 Can manage updates on Azure and non-Azure servers, including those on premises
 Requires download of Log Analytics agent
Lesson 5: Test your knowledge

Refer to the Student Guide for lesson-review questions


Instructor-led lab:
Configuring
security in
Windows Server
 Configuring Windows Defender Credential
Guard
 Locating problematic accounts
 Implementing LAPS
Lab: Monitoring and troubleshooting Windows Server

 Exercise 1: Configuring Windows Defender Credential Guard


 Exercise 2: Locating problematic accounts
 Exercise 3: Implementing LAPS

Sign-in information for the exercises:


 Virtual machines:
o WS-011T00A-SEA-DC1

o WS-011T00A-SEA-ADM1

o WS-011T00A-SEA-SVR1

 User name: Contoso\Administrator


 Password: Pa55w.rd
Lab Scenario

Contoso Corporation is a medical research company with about 5,000 employees worldwide.
It has specific needs for ensuring that their medical data and records remain private. The
company has a headquarters location and multiple worldwide sites. Contoso has recently
deployed a Windows Server and Windows client infrastructure.

You have been asked to implement improvements in the server security configuration.
Lab-review questions

1. How do you manage local administrator account passwords in your organization?


2. What is the name of the tool that you can use to enable Credential Guard?
3. When a computer is configured to use LAPS, Which Windows PowerShell cmdlet do you
use to retrieve the local Administrator password from AD DS?
Lab-review answers

1. How do you manage local administrator account passwords in your organization?


 Answers will vary. Some students will indicate that their organizations have no te
chnology in place. Other students will have a solution, including some who use L
APS.
2. What is the name of the tool that you can use to enable Credential Guard?
 The tool that you can use to enable Credential Guard is called the Hypervisor-
Protected Code Integrity and Windows Defender Credential Guard hard
ware readiness tool.
3. Which Windows PowerShell cmdlet do you use to retrieve the local Administrator
password from AD DS when a computer is configured to use LAPS?
 You use the Get-
AdmPwdPasswordcmdlet to retrieve the local Administrator password
from AD DS when a computer is configured to use LAPS.
Module-review questions

1. What should an organization do before it institutes NTLM blocking?


2. Which Windows PowerShell cmdlet do you use to configure a specific OU so that
computers within that OU can use LAPS?
3. Which SMB version is negotiated by Windows Server 2019 when communicating with
Windows Server 2012 R2?
Module-review answers

1. What should an organization do before it institutes NTLM blocking?


1. Audit NTLM usage
2. Configure the Restrict NTLM: NTLM Authentication Group Policy
3. Enable Kerberos authentication

2. Which Windows PowerShell cmdlet do you use to configure a specific OU so that


computers within that OU can use LAPS?
Set-AdmPwdComputerSelfPermission

3. Which SMB version is negotiated by Windows Server 2019 when communicating with
Windows Server 2012 R2?
SMB 3.02
Thank you.

© Copyright Microsoft Corporation. All rights reserved.

You might also like