www.yorktech.com

Download Report

Transcript www.yorktech.com

1
Chapter 4
DESIGNING A
MANAGEMENT
INFRASTRUCTURE
Chapter 4: Designing a Management Infrastructure
2
MICROSOFT MANAGEMENT CONSOLE (MMC)
 Provides most administrative capabilities
 Most snap-ins use:
 DCOM/RPCs
 SMB/CIFS
 Use IPSec to protect privacy
 Use firewalls to protect against attacks
 Use Group Policy settings to restrict snap-in
usage
Chapter 4: Designing a Management Infrastructure
MMC TRAFFIC CAPTURED
3
Chapter 4: Designing a Management Infrastructure
4
REMOTE DESKTOP
 Provides access to almost all administrative
functions
 Limited to two or three users
simultaneously
 Has encryption built in
 Change port number to reduce the risk of
worms
Chapter 4: Designing a Management Infrastructure
REMOTE ASSISTANCE
 Same protocol as Remote Desktop
 Primarily used for managing desktop
computers
 Enables interactively training users
remotely
5
Chapter 4: Designing a Management Infrastructure
TELNET
 Unencrypted text-based management tool
 Client and server included with Microsoft
Windows computers
 Includes no mandatory security
 Should never be used
6
Chapter 4: Designing a Management Infrastructure
TELNET TRAFFIC CAPTURED
7
Chapter 4: Designing a Management Infrastructure
8
SECURE SHELL (SSH)
 Encrypted text-based management tool
 Primarily used for network devices and
UNIX computers
 Client and server not included with Windows
 Download Cygwin
Chapter 4: Designing a Management Infrastructure
9
SNMP
 Unencrypted management tool
 Weak authentication with SNMP community
names
 Most SNMP requests are sent from the
server to the client
 SNMP traps are client to server notifications
Chapter 4: Designing a Management Infrastructure
SNMP SECURITY CONFIGURATION
10
Chapter 4: Designing a Management Infrastructure
11
EMERGENCY MANAGEMENT SERVICES (EMS)
 Remote administration that works when the
operating system is offline
 Requires support by the server hardware
platform
 Useful when server or network has failed, such
as during a denial-of-service (DoS) attack
 Connect by network or serial port:
 Should only be connected to dedicated
management network
 Serial ports require terminal concentrator for
network access
Chapter 4: Designing a Management Infrastructure
EMS WITH TERMINAL CONCENTRATOR
12
Chapter 4: Designing a Management Infrastructure
13
DESIGNING SECURITY FOR EMS
 Focus on physical security
 Choose service processors that provide
authentication and encryption
 Choose terminal concentrators that provide
strong authentication and support SSH
Chapter 4: Designing a Management Infrastructure
14
MANAGING NETWORK LOAD BALANCING (NLB)
 Leave remote access disabled
 Use the Network Load Balancing Manager
administration tool instead of Wlbs.exe
 Use virtual private networks (VPNs) to
provide network encryption
 Restrict access to the quorum disk and
cluster log
 Use a domain group to assign rights to
manage the cluster
Chapter 4: Designing a Management Infrastructure
15
MANAGING SHAREPOINT TEAM SERVICES
 Disable the SharePoint Administration Web
site if possible
 If not:
 Require SSL
 Restrict access to Fpadmdll.dll and
Fpadmcgi.exe
 Change the default port number
Chapter 4: Designing a Management Infrastructure
REMOTE WEB ADMINISTRATION OF IIS
 Disable Remote Web Administration if
possible
 If not:
 Require SSL
 Change the default port number
 Require IPSec
 Carefully restrict administrative rights
 Restrict access to administrative IP
addresses
16
Chapter 4: Designing a Management Infrastructure
17
DESIGNING A MANAGEMENT NETWORK
 Create separate local area networks (LANs)
for user connections and for managing
servers
 Connect only management computers and
servers to the management network
 Block management traffic on the user
network
Chapter 4: Designing a Management Infrastructure
MANAGEMENT NETWORK DIAGRAM
18
Chapter 4: Designing a Management Infrastructure
19
DESIGNING A MANAGEMENT NETWORK WITH
A GATEWAY
 All management connections must go
through a gateway server
 Servers are configured to allow only
management connections from the gateway
server
 Gateway server can enforce strong
authentication even if servers do not
support it
Chapter 4: Designing a Management Infrastructure
MANAGEMENT NETWORK WITH GATEWAY
DIAGRAM
20
Chapter 4: Designing a Management Infrastructure
21
AUTHENTICATING ADMINISTRATORS
 Require strong authentication for
administrators
 Use Remote Authentication Dial-In User
Service (RADIUS) protocol for centralized
authentication
 Use Internet Authentication Service (IAS) to
connect RADIUS clients to Active Directory
Chapter 4: Designing a Management Infrastructure
22
BEST PRACTICES FOR USING ADMINISTRATIVE
RIGHTS
 Log on to your desktop as a user
 Log on to servers as an administrator
 Delegate the responsibility of managing
privileged group memberships
 Fine-tune administrative access:
 Delegation of Control Wizard to assign
granular rights
 Group Policy software restrictions to prevent
administrative accounts from running
unnecessary applications
Chapter 4: Designing a Management Infrastructure
23
SUMMARY
 Most enterprises use MMC, Remote
Desktop, SSH, and SNMP for different
management tasks
 Use EMS for out-of-band management
control, but do not rely on built-in security
 Design a separate network for remote
management, and block management
protocols on other interfaces
 Limit users who have administrative rights,
and restrict the level of administrative
rights