Business Ready Security Information Protection Lab Manual version 4.0g (5-Dec-2010) Page |1 Business Ready Security - Lab Manual Identity and Access Management Abstract The Information Protection Lab showcases the core technologies that enable a safe and secure information scenario. Employees using different email clients, based in different locations, share critical and confidential business information using email. This scenario shows Exchange customers how Forefront and AD RMS can mitigate the risks and enable organizations to securely communicate using email. Scenario-based Hands-on-Lab Note: This is a scenario hands-on-lab. That is different from a regular product-based hands-on-lab. In the lab environment, multiple products are used in combination. You will not perform all the confirmation of the different products, but instead examine the configuration needed for a particular scenario. Page |2 Environment The complete Business Ready Security (BRS) demo environment, consists of 15 VMs. It can be used to demonstrate all Forefront products, including Windows access technologies, such as AD FS and DirectAccess. The machine on the left are in the Woodgrove Bank domain. Paris and Tokyo are in the Trey Engineering domain. The two companies have established an AD FS relationship between the two domains. For the Information Protection Solution lab, 5 of the VMs are needed. Page |3 Exercise 1 Information Protection with AD RMS and Exchange 2010 In this exercise, you will examine how AD RMS protects email messages that are sent by Exchange 2010. The user Joe will connect from an unmanaged client computer (Kiosk) on the Internet, through Unified Access Gateway (UAG) in order to access his email. Tasks Detailed Steps This exercise uses the following virtual machines: Denver (AD DS/AD RMS/AD FS), Ibiza (UAG), Madrid (Exchange 2010), Cairo (Managed Internal Client), and Kiosk (Unmanaged Kiosk Computer). Perform the following steps on the Kiosk (Client) computer. 1. On the Kiosk computer, log into the company’s remote access portal from a kiosk computer. Log on - User: Chris - Password: password 2. Navigate to OWA and attempt to send an attachment a. On the Kiosk computer, on the Start menu, open Internet Explorer. b. In Internet Explorer, connect to https://portal.woodgrovebank.com/ While the page is loading notice the Checking for endpoint compliance message. The Application and Network Access Portal logon page opens. c. In the Application and Network Access Portal, log on with the following credentials: User name: Chris Password: password d. The Application and Network Access Portal page opens. Chris can easily access his company’s remote access portal from anywhere, as long as he has an Internet connection. a. Under File Access, click the Details. Microsoft Forefront Unified Access Gateway (UAG) has detected that the client computer does not meet the configured access policy, and therefore is not allowed to access this application. The access policy for the File Access application specifies that the client Page |4 b. c. d. e. f. 3. Using OWA on a kiosk send an unprotected email that contains confidential information computer must be in the domain. The Kiosk computer is not member of the domain. Close the UAG Error Page. Click Woodgrove Bank Mail. The Inbox of Joe opens in Outlook Web App. In Outlook Web App, right-click the email from Alan Brewer with subject Urgent Information, and then click Reply All. In the new message window, click the Attach File icon. Notice that UAG has blocked Chris’s ability to send files using OWA based on the compliance status of the kiosk computer. Close the UAG notification window. a. In the new message, in the body of the email reply, type Hi Joe, Can you provide Alan the information? The purchase order number is 1-0912-0248. Notice that Chris has not used AD RMS to protect the email. b. Click Send. Perform the following steps on the Cairo (Client) computer. 4. On the Cairo computer, review the email request from Chris and notice that the email has been automatically protected by RMS. a. On the Cairo computer, log on as user Joe with password password. b. On the Start menu, click Microsoft Outlook 2010. Microsoft Outlook appears. c. Select the new email from Chris Preston. Notice that the email has been automatically protected by Exchange without any user interaction. This is based on RMS transport rules defined in Exchange 2010. d. In the preview pane, click the permission banner, and then click View Permission. On this message, Joe only has permission to View, Reply, and Reply All. e. Click OK to close the My Permission Page |5 message box. Perform the following steps on the Madrid (Exchange 2010) computer. 5. On the Madrid computer, in the Exchange Management Console, review the transport policy that triggered the automatic protection of the email. a. On the Exchange computer, on the Start menu, click Microsoft Exchange Server 2010, and then click Exchange Management Console. The Exchange Management Console opens. b. In the Exchange Management Console, expand Microsoft Exchange On-Premises, expand Organization Configuration, and then select Hub Transport. c. In the middle pane, on the Transport Rules tab, right-click Woodgrove Bank–AD RMS Protect–Purchase Order, and then click Edit Rule. The Edit Transport Rule dialog box opens. d. On the Introduction page, click Next. Notice that the transport rule applies RMS protection to all messages between members of the allusers and sales groups, that contain a particular text pattern (\d-\d\d\d\d-\d\d\d\d). The text pattern is a regular expression that corresponds to the Purchase Order IDs that Woodgrove Bank uses. e. Click Cancel to close the Edit Transport Rule wizard. Perform the following steps on the Cairo (Client) computer. 6. On the Cairo computer, in Outlook, reply to the email from Chris. Attach an infected file in the reply. a. On the Cairo computer, in Outlook, right-click the new message from Chris Preston, and then click Reply All. b. In the new message window, click the Attach File button. c. In the Insert File dialog box, browse to the C:\Tools\Docs folder, select the Woodgrove Bank - Trey Information.doc file and click Insert. d. In the body of the message, type Alan/Chris Attached you will find the requested information. Page |6 e. Click Send. Perform the following steps on the Kiosk (Client) computer. 7. On the Kiosk computer, use OWA to open the email and file attachment. Notice that the file has been cleaned by Forefront Protection for Exchange. a. On the Kiosk computer, in Outlook Web App, select the new message from Joe Andreshak. Notice that Outlook Web App 2010 provides native AD RMS integration. This means that users can open RMS protected emails directly in OWA. b. In the preview pane, right-click the attachment named Woodgrove Bank-Trey Information.txt, and then click Open. c. In the File Download message box, click Open. Notice that Forefront Protection for Exchange has detected a virus infection in the attachment file, and has removed the file. Note: Exchange 2010 allows anti-malware applications access to the unprotected content of RMS protected messages, so that the content can be inspected. d. Close Notepad. e. Close the Outlook Web App window. f. Close the Application and Network Access Portal window. Perform the following steps on the Cairo (Client) computer. 8. On the Cairo computer, in Outlook, create an new email to financial@woodgrovebank.com. Notice that the message is automatically protected based on the recipient. a. On the Cairo computer, in Outlook, click New E-Mail. b. In the new message window, in the To text box, type financial@woodgrovebank.com, and then press Tab. Notice how the email is automatically protected with AD RMS because the recipient group triggered the protection. This is based on a so-called Outlook Protection Rule in Exchange 2010. c. Close the new message window without saving the changes. Page |7 Exercise 2 Information Protection with AD RMS and FCI In this exercise, you will explore the new File Classification Infrastructure (FCI) functionality in Windows Server 2008 R2. FCI can be used to classify existing documents on a file share, and use the AD RMS Bulk Protection tool to apply the appropriate RMS protection to those files. Tasks Detailed Steps This demonstration uses the following virtual machines: Denver (AD DS, AD RMS, FCI/Bulk Protection Tool) and Cairo (Client). Perform the following steps on the Cairo computer. 1. On the Cairo computer, Joe is storing sensitive information in the organization using a network share. a. On the Cairo computer, open the C:\Tools\Bank Docs folder. b. In the Bank Docs folder, right-click the Woodgrove Bank-Customer Information.docx document, and then click Open. The document contains sensitive customer information, including credit card information. Note that the document is currently not protected by AD RMS. c. Close the document. d. Select the five documents in the folder, and drag them to the Sensitive Docs Share shortcut. This operation will copy the documents to the \\denver\WGBDocument share on the server. e. Right-click the Sensitive Docs Share shortcut, and then click Open. Woodgrove Bank’s share folder \\denver\WGBDocuments appears. Note that the documents are not RMS protected at this time. Perform the following steps on the Denver (AD RMS/FCI Server) computer. Page |8 Tasks 2. On the Denver computer, examine the configuration of the FCI Server and notice how the policies has been set up in Windows Server 2008 R2 File server to protect using the AD RMS Bulk Protection tool. Detailed Steps a. On the Denver computer, on the Start menu, click Administrative Tools, and then click File Server Resource Manager. The File Server Resource Manager console opens. b. Expand Classification Management and then select Classification Properties. Notice the two classification properties that are going to be assigned. For all documents stored in the file share, depending on the content, we will assign a High Business Impact (HBI) tag or a Low Business Impact (LBI) tag. c. In the left pane, select Classification Rules. d. In the middle pane, right the High Business Impact (RegEx) policy, and then click Edit Rule Properties. After creating the different classification policies, we define the conditions/content that will trigger the HBI tag. For this scenario, we will be use regular expressions; there is another scenario for keywords. e. Select the Classification tab. Notice that this policy will assign the High Business Impact (HBI) property to all documents matching this rule. f. On the Classification tab, click Advanced, and then select the Additional Classification Parameters tab. FCI will look in the documents for regular expressions (text patterns). In this particular case, FCI will look for credit card numbers represented with the regular expression value and \d{4}-\d{4}-\d{4}-\d{4} value. g. Click Cancel to close the Additional Rule Parameters dialog box. h. Click Cancel to close the Classification Rule Definition dialog box. i. In the right pane, click Run Classification With all rules now. j. In the Run Classification dialog box, select Wait for classification to complete execution, and Page |9 Tasks Detailed Steps then click OK. This will be classifying the files stored in the share folder, at the end you will see a report provided by FCI. k. Close the Automatic Classification Report. l. In the File Server Resource Manager console, in the left pane, select File Management Tasks. m. In the middle pane, select the Protect HBI documents with AD RMS task The FCI tool leverages the new AD RMS Bulk Protection Tool in order to apply RMS protection after scanning and classifying the content. The FCI tool invokes the protection of the content using a PowerShell script that has all the parameters required to protect content using the AD RMS Bulk Protection tool. n. In the right pane, click Run File Management Task Now. o. In the Run File Management Task dialog box, select Wait for task to complete execution, and then click OK. In the File Management Task Report, you can see that the action (apply RMS protection) was applied to two documents: - Woodgrove Bank–Cycle Design.pptx - Woodgrove Bank–Customer Information.docx. For more technical info open the file C:\Tools\WGBdocuments\RMSLog.log. p. Close the File Management Task Report window. q. Close the File Server Resource Manager console. Perform the following steps on the Cairo (client) computer. 3. On the Cairo computer, examine the RMS protection of the documents in the file share. a. On the Cairo computer, in the \\denver\WGBDocuments share, right-click Woodgrove Bank–Customer Information.docx, and then click Open. P a g e | 10 Tasks Detailed Steps Notice that the document is now protected by RMS. b. Close the document. c. Close the WGBDocuments share.