Security and Policy Enforcement in Windows Server 2008 Table of Contents Introduction 1 Facilities 2 About This Clinic 3 Clinic Outline 4 Infrastructure Optimization Model 5 Security Enhancements in Windows Server 2008 6 Overview 7 Technical Background 13 Implementation/Usage Scenarios 31 Recommendations 33 Summary 34 Network Access Protection 36 Overview 37 Technical Background 39 Implementation/Usage Scenarios 69 Recommendations 71 Summary 72 Hands-On Lab 74 Clinic Summary Error! Bookmark not defined. What Next? 75 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, email addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. The names of manufacturers, products, or URLs are provided for informational purposes only and Microsoft makes no representations and warranties, either expressed, implied, or statutory, regarding these manufacturers or the use of the products with any Microsoft technologies. The inclusion of a manufacturer or product does not imply endorsement of Microsoft of the manufacturer or product. Links are provided to third party sites. Such sites are not under the control of Microsoft and Microsoft is not responsible for the contents of any linked site or any link contained in a linked site, or any changes or updates to such sites. Microsoft is not responsible for webcasting or any other form of transmission received from any linked site. Microsoft is providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement of Microsoft of the site or the products contained therein. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. © ights reserved. Microsoft are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Version 1.0 Security and Policy Enforcement in Windows Server 2008 Introduction 1 2 Security and Policy Enforcement in Windows Server 2008 Facilities Security and Policy Enforcement in Windows Server 2008 3 About This Clinic Description This clinic will provide an overview of Network Access Protection and other new security features and capabilities in Windows Server 2008. Objectives The objective of this clinic is to provide information regarding the benefits, technical details, and implementation of Network Access Protection (NAP), Quality of Service (QOS), IPSec and Windows Firewall in Windows Server 2008. Audience This clinic is intended for IT Professionals currently experienced on the technologies included in Windows Server 2000 and Windows Server 2003, and who hold an MCSE or MCSA certification and/or equivalent knowledge. Prerequisites Experience with Microsoft® Windows Server and client operating systems Experience with IPSec, Group Policy and other security features running on Windows Server 2003 4 Security and Policy Enforcement in Windows Server 2008 Clinic Outline Securing your network, servers and lines of communication is of paramount importance to any administrator. Windows Server 2008 will facilitate these tasks. One of the main focuses in the design and development of Windows Server 2008 was increased security. The new security and policy enforcement features will greatly enhance the administrator’s job of configuring and maintaining security. Objectives This clinic includes the following topics: Security Enhancements in Windows Server 2008. Network Access Protection in Windows Server 2008. Security and Policy Enforcement in Windows Server 2008 5 Infrastructure Optimization Model The Infrastructure Optimization Model helps customers understand and subsequently improve the state of their IT infrastructure and describes what that means in terms of cost, security risk, and operational agility. Microsoft Infrastructure Optimization (IO) is structured around three information technology models: Core Infrastructure Optimization, Application Platform Infrastructure Optimization, and Business Productivity Infrastructure Optimization. Core IO focuses on the foundational elements of IT services and components and includes five key capabilities: Identity and Access Management, Desktop, Device and Server Management, Data Protection and Recovery, Security and Networking, and IT and Security Process. This clinic focuses on those technologies which support the Security and Networking category of the Core Infrastructure Optimization Model. 6 Security and Policy Enforcement in Windows Server 2008 Security Enhancements in Windows Server 2008 Objectives At the end of this section, you will have learned the answers to the following questions: What are some of the new security features in Windows Server 2008? How are security policies enforced in Windows Server 2008? What is the new Windows Firewall? What is IPSec? How does it work and what are its benefits? What other enhancements have been made in Windows Server 2008 to improve security? Security and Policy Enforcement in Windows Server 2008 Overview Windows Server 2008 includes a variety of new security initiatives which provide new methods of security and policy enforcement, ensure integrity and confidentiality of data, and improve security of communications. Methods of Security and Policy Enforcement New methods of security and policy features in Windows Server 2008 will enable administrators to effectively apply security policies in a systematic and efficient manner across the entire network. These improvements translate to an easier transition to increased security without a corresponding level of difficulty. The methods to enforcement include: Network Location Awareness (NLA). Network Location Awareness is built into the Operating System and monitors the network for any changes. The monitoring and constant awareness ensures that client computers and servers can more efficiently process group policies and respond quicker to slow or disconnected network segments. Network Location Awareness no longer depends upon ICMP (PING) for policy application, thereby speeding up the startup process for machines. It is also means that network border devices won’t inhibit the processing of policies by blocking ICMP. 7 8 Security and Policy Enforcement in Windows Server 2008 Network Access Protection (NAP). This new feature ensures compliance with specific health policies for systems accessing the network. Network access protection assists administrators in achieving and maintaining a specific health policy. The main components of Network Access Protection are: Health Policy Validation. The health state of any computer attempting to access the network will be compared against the policy created by the administrator before being allowed access. Health Policy Compliance. Using software management applications (Systems Management Software for example), administrators can automatically update noncompliant computers Limited Access. Only computers that meet or exceed health compliance requirements will be permitted access, all others will be quarantined until they meet the required health standards. Additional information regarding NAP will be provided later in this clinic. Windows Firewall with Advanced Security Windows Firewall with Advanced Security (WFAS) in Windows Server 2008 is a stateful, host-based firewall that filters traffic based on specific rules you create. This firewall is an enhancement of the one found in Windows XP SP2 and Windows Server 2003 SP1. Firewalls within the operating system provide an additional layer of security by filtering traffic to and from the client. Capabilities and new features that have been added to WFAS include: Filters incoming and outgoing traffic. Filtering of outgoing traffic is new with WFAS. Firewall rules that specify the use of IPSec can be configured so that specific Active Directory Groups and Accounts can initiate the communications session. Rules can be based on source and destination IP addresses, source and destination port (TCP and UDP) as well as for multiple ports. You can specify an individual service by service name. In the past, it was necessary to specify a path to the service. Application Rules are still defined based on path and are not hashed values of the executable. Additional details regarding Windows Firewall and Advanced Security will be provided later in this clinic. Security and Policy Enforcement in Windows Server 2008 9 Internet Protocol Security (IPSec) Information is the key to power in today’s digital world. Maintaining appropriate controls over the transmission and access of information is what IPSec is designed to perform. In its basic form, IPSec is implemented to secure communications between computers. But it can do a lot more than just this depending on how you implement IPSec in your network and what type of communication you want to secure. You can deploy IPSec to segment your network, help prevent the theft of data and user-credentials and secure VPN communications. New IPSec Features. Windows Server 2008 has expanded upon the capabilities of IPSec in Windows Server 2003 and added these new capabilities: IPSec is configured from the same interface that is used with Windows Firewall with Advanced Security (WFAS). You can also use command-line tools to configure the Windows Firewall with Advanced Security and IPSec. IPv6 is fully supported by IPSec. During initial session establishment, Windows Server 2008 will attempt to communicate in the clear as well as trying to negotiate a protected communication session in parallel. Depending on the response, the initiator will continue to communicate only in the clear, or continue in the clear only until a secure channel is established. Can be used for NAP enforcement. IPSec Scenarios. There are several scenarios to choose from when deploying IPSec: Packet Filtering. Acts as a host-based packet filter and limited firewall. End-to-end security between specific hosts. You can secure the communications between two specific hosts. End-to-end traffic through a Microsoft Internet security and Acceleration (ISA) Server-secured network address translator. In this scenario IPSec NAT Traversal (NAT-T) is supported and services requests to provide secure access to clients. Secure server. You can ensure secure communications with this server by requiring the use of IPSec for all connections to a specific server. Layer Two Tunneling (L2TP) over IPSec (L2TP/IPSec) for remote access and site-to-site virtual private network (VPN) connections. In this scenario, you can provide secure communications for clients accessing a corporate network and also for branch offices to communicate securely. Site-to-site IPSec tunneling with non-Microsoft gateways. This will support interoperability with networks that do not run either L2TP/IPSec or Point-toPoint Tunneling Protocol (PPTP) VPNs. IPSec Prerequisites. 10 Security and Policy Enforcement in Windows Server 2008 If you are going to deploy IPSec policies through Group Policy, then you must have Active Directory configured. Computers that are to use IPSec must have a policy assigned and authentication must be configured correctly on BOTH ends. Operating systems, routers, firewalls and other devices must be able to support IPSec and be configured. Additional information regarding IPSec will be provided later in this clinic. Windows Server Hardening Windows Server 2008 hardens the operating system and protects the environment to provide a solid foundation for running and business applications and services. With Windows Service Hardening fewer services are running by default, and service accounts now have fewer privileges and limited network access. This helps keep systems safer by preventing critical Windows services from being used by abnormal activity in the file system, registry, or network. Windows Server 2008 also provides better protection for kernel mode services by reducing amount of code that has to run at the kernel level. By ensuring that services run with the least privilege necessary, service hardening improves the system security. For example, in the past there have been some printer drivers that used both kernel-mode code and user-mode code. With service hardening, printer drivers have been moved into the user-mode layer which means that there is no kernel code in the drivers themselves. Server and Domain Isolation With Windows Server 2008, you can logically isolate server and domain resources to limit access to authenticated and authorized computers. You can create a logical network inside an existing physical network, where computers share a common set of requirements for secure communications. In order to establish connectivity, each computer in the logically isolated network must provide authentication credentials to other computers in the isolated network to prevent unauthorized computers and programs from gaining access to resources inappropriately. Requests from computers that are not part of the isolated network will be ignored. Two types of isolation are supported: Server isolation. In a server isolation scenario, specific servers are configured using IPSec policy to accept only authenticated communications from other computers (for example, a database server configured to accept connections only from a Web application server). Domain isolation. To isolate a domain, you can use Active Directory domain membership to ensure that domain member computers accept only authenticated and secured communications from other domain member computers. Domain isolation Security and Policy Enforcement in Windows Server 2008 11 uses IPSec policy to provide protection for traffic sent between domain members, including all client and server computers. Server and domain isolation can help protect specific high-value servers and data as well as protect managed computers from unmanaged or rogue computers and users. Active Directory Domain Services Auditing When a writable domain controller is deployed where security of the server cannot be guaranteed (such as a branch office), it is crucial to audit any changes that occur to the directory services. The improvements made to the Audit directory service access global audit policy in Windows Server 2008 improve your ability to monitor these changes. Additional details regarding AD Domain Services Auditing will be provided later in this clinic. Read-Only Domain Controller (RODC) Except for account passwords, a RODC holds all the Active Directory objects and attributes that a writable domain controller holds. However, changes cannot be made to the replica that is stored on the RODC. Changes must be made on a writable domain controller and replicated back to the RODC. This prevents a change that could otherwise be made from polluting or corrupting the forest. Local applications that request Read access to the directory can obtain access. Lightweight Directory Application Protocol (LDAP) applications that request Write access receive an LDAP referral response. This response directs them to a writable domain controller. Additional details regarding RODCs will be provided later in this clinic. BitLocker Drive Encryption Data security on lost of stolen PC devices, and on remotely located servers, is a growing concern among security experts and corporate executives. The data that is stored on these systems is often more valuable to a corporation that the asset itself, and the loss, theft, or unwanted disclosure of that data can be very damaging. In addition, recent government regulations focus on data protection and privacy; the unregulated disclosure of the data that each law or policy covers can be damaging, with some of the regulations demanding stiff fines and the potential for custodial sentences for offending executives. Many CEOs and board members are looking for solutions that increase protections around data and provide compliance. The problem of data protection also extends to situation where systems need to be decommissioned; in fact, the cost of securely decommissioning a machine by using current methods can run into hundreds of dollars per device. BitLocker Drive Encryption (BDE) is an integral new security feature in the Windows Server 2008 and Windows Vista operating systems that provides considerable protection for the operating system on your computer and data stored on the operating system volume. BDE ensures that data remains encrypted even if the computer is tampered with 12 Security and Policy Enforcement in Windows Server 2008 when the operating system is not running. This helps protect against "offline attacks," attacks made by disabling or circumventing the installed operating system, or made by physically removing the hard drive to attack the data separately. As a result, this technology provides better data protection for computers located at branch offices. BitLocker prevents a thief who boots another operating system or runs a software hacking tool from breaking Windows Server 2008 or Vista file and system protections or viewing offline the files that are stored on the protected drive. Removable Device Installation Control Restricting the devices that users can install will help reduce the risk of data theft, and it can lower support costs by ensuring that users are installing only devices that the help desk is trained and equipped to support. Through Group Policy settings, Windows Server 2008 provides you with a way to protect data from being copied onto removable devices such as a USB drives, keyboards and mice. You have flexibility to determining how removable devices may or may not be used, including: Preventing users from installing any device. Allowing users to install only devices that are on an “approved list. If a device is not on the list, then the user cannot install it. Preventing users from installing devices that are on a “prohibited” list. If a device is not on the list, then the user can install it. Denying read or write access to users for devices that are themselves removable, or that use removable media, such as CD and DVD burners, floppy disk drives, external hard drives, and portable devices such as media players, smart phones, or Pocket PC devices Enterprise PKI There are a number of enhancements to the public key infrastructure (PKI) in Windows Server 2008, including: Easier Management through PKIView. Certificate Web Enrollment. Network Device Enrollment Service. Certificate Policy Settings. Certificate Deployment changes. Online Certificate Status Protocol (OCSP) support. Managing Certificates with Group Policy. Cryptographic Next Generation. Additional details regarding Enterprise PKI improvements will be provided later in this clinic. Security and Policy Enforcement in Windows Server 2008 Technical Background The following sections will provide technical background information regarding: Windows Firewall with Advanced Security. IPSec. Active Directory Domain Services Auditing. Read-Only Domain Controller (RODC). BitLocker Drive Encryption. Enterprise PKI. 13 14 Security and Policy Enforcement in Windows Server 2008 New features and improvements have been made to the Windows Firewall with Advanced Security (WFAS) that make it an effective tool for protecting your computers. The new features and tools will assist you in the creation of firewall rules to control incoming and outgoing communications. You can access the Windows Firewall with Advanced Security GUI through an MMC snap-in. The firewall item in the Control Panel has limited functionality and does not have access to the advanced features that are available through the MMC Snap-in. If you are using the MMC snap-in, you have the option of creating a policy on the local machine, or on a remote machine. An invaluable feature is the ability to create IPSec rules within the same snap-in. The New Inbound or Outbound Rule Wizard is intuitive and will guide you through the creation process. The first step is determining what rule Type you wish to create: Program Port Predefined (for Rules that control connections for a Windows experience) Custom rule. Depending on what rule you select determines the number and type of additional steps you will go through in creating your rules. Firewall rules can be based upon: Security and Policy Enforcement in Windows Server 2008 15 IP Protocol (TCP or UDP) Source and Destination TCP and UDP Ports For all ports or multiple ports Specific Interfaces ICMP and ICMPv6 traffic Type and Code Services (which was originally based on a path to the service, but which can now be based on a process or service). Like the current Windows Firewall in XP SP2, the new Windows Firewall is stateful and host-based that will allow or block network traffic according to its configuration and the applications that are currently running to provide a level of protection from malicious users and programs on a network. The new Windows Firewall includes enhancements for better protection and more advanced configuration. 16 Security and Policy Enforcement in Windows Server 2008 In this demonstration, you will see how to create an inbound and outbound rule using the Windows Firewall with Advanced Security. Key Points: Your instructor will demonstrate the following: Creating an inbound rule Creating an outbound rule Creating an IPSec rule Creating a Firewall Rule limiting a service Security and Policy Enforcement in Windows Server 2008 17 IPSec is used to provide secure communications for IP (Internet Protocol) based networks. When IPSec is properly implemented it will provide security for communications in four main areas: Data Integrity. Ensures that the contents of a packet have not been modified whilst in transit (either through accident or malicious intent). Data Confidentiality. Ensures the packet has not been read whilst in transit (encryption). Authentication. That the packet did indeed come from the sender. Anti-replay. A packet cannot be intercepted and replayed at a later time. In previous versions of the operating system, Windows Firewall and IPSec were configured separately and administrators often found the IPSec configuration to be confusing. As such, in Windows Server 2008 Windows Firewall and IPSec have been combined into a single configurable tool (Windows Firewall Advanced Security) used to control both traditional firewall behavior, and protection of network traffic with IPSec. It is also possible to use commands within the netsh advfirewall context for command line configuration of both firewall and IPSec behavior. 18 Security and Policy Enforcement in Windows Server 2008 Windows Server 2008 includes a number of changes to IPSec which can assist you in tightening security of traffic flowing to and from your branch offices. These improvements include: Simplified IPSec policy configuration. When initiating communication with another network node, an IPSec node running Windows Server 2008 will try to communicate in the clear and negotiate protected communication in parallel. If the initiating IPSec peer does not receive a response to the initial negotiation attempt, the communication continues in the clear. If the initiating IPSec peer receives a response, the communication in the clear is halted until the negotiation can complete. This is an optional behavior and must be enabled before this behavior occurs. Client-to-DC IPSec protection. Windows Server 2008 supports securing traffic between domain members and domain controllers in the following situations: The new negotiation behavior of IPSec results in you no longer needing to configure exemptions for domain controllers, which simplifies IPSec policy and deployment of IPSec protection in a domain. You can configure IPSec policy in the domain to request protected traffic but not require it. Domain controllers will protect most traffic with domain members but allow clear text for domain joins and other types of traffic. You can configure IPSec policy to require protected traffic for domain controllers. When a computer running Windows Server 2008 or Vista attempts to join the domain, the user is prompted for the user name and password of a domain user account. IPSec with the domain controller is negotiated with NTLM v2 user credentials for a protected domain join. This behavior is new and is only available for domain member computers running either Vista or Windows Server 2008 and for domain controllers running Windows Server 2008. Improved load balancing and clustering server support. In Windows Server 2008, the timeout for a cluster node failure is greatly reduced. IPSec is more tightly integrated into the Next Generation TCP/IP stack. Rather than relying on IPSec idle timeouts to detect a cluster node failure, IPSec in Windows Server 2008 monitors TCP connections for established Security Associations (SAs). If the TCP connection for an established SA begins retransmitting segments, IPSec will renegotiate the SAs. This results in the failover to a new cluster node happening quickly, typically in time to keep the application from failing. Improved IPSec Authentication. IPSec authentication in Windows Server 2008 adds support for the following capabilities: You can require that IPSec peers authenticate with a health certificate which is issued by a certificate server when a Network Access Protection client proves that its health state is in compliance with current health policy. Security and Policy Enforcement in Windows Server 2008 19 You can specify user-based or health-based authentication during a new IPSec negotiation mode known as extended mode, in which it can perform an additional level of authentication. Integration with NAP. You can require that IPSec nodes authenticate during extended mode negotiation with a health certificate, certifying that the IPSec node meets current system health requirements. A health certificate server issues a health certificate after an IPSec peer's health status has been evaluated by a Network Policy Server (NPS). Multiple Authentication Methods. When you select multiple authentication methods for computers running Windows Server 2008, IPSec will attempt multiple authentication attempts in an effort to perform mutual authentication. New Cryptographic Support. Windows Server 2008 includes Cryptography Next Generation (CNG) which supports additional key derivation and encryption algorithms such as elliptic curve cryptography (ECC), allowing you to respond to governmental security requirements and trends in the security industry to support stronger cryptography. Integrated IPv4 and IPv6 Support. IPSec support for IPv6 traffic in Windows Server 2008 is the same as that for IPv4, including support for IKE and data encryption. Policy settings for both IPv4 and IPv6 traffic are configured in the same way using either the Windows Firewall with Advanced Security or IP Security Policies snap-ins. Extended events and performance monitor counters. Windows Server 2008 includes 15 new IPSec audit-specific events and the text of 25 existing events has been updated with more useful information to help you troubleshoot failed IPSec negotiations without having to enable the advanced Oakley logging capability. Also included are IPSec performance counters to help identify performance and networking issues with IPSec-protected traffic. Network Diagnostics Framework Support. The Network Diagnostics Framework is an extensible architecture that helps you recover from and troubleshoot problems with network connections. For a failed IPSec negotiation, the Network Diagnostics Framework will prompt you with an option to identify and correct the problem. It then attempts to discover the source of the failed connection and either automatically fixes the problem, or, depending on security considerations, prompts you to make the appropriate configuration changes. 20 Security and Policy Enforcement in Windows Server 2008 In this demonstration, you will see how to create IPSec rules using the Windows Firewall with Advanced Security Key Points: Your instructor will demonstrate the following: Creation of an IPSec rule Specify different authentication methods Activate/De-activate a rule Security and Policy Enforcement in Windows Server 2008 21 When a writable domain controller is deployed where security of the server cannot be guaranteed (such as a branch office), it is crucial to audit any changes that occur to the directory services. The improvements made to the Audit directory service access global audit policy in Windows Server 2008 improve your ability to monitor these changes. The Audit directory service access global audit policy controls auditing for directory service events to determine whether events are logged in the Security log when certain operations are carried out on objects in the directory. You can control what operations to audit by modifying the system access control list (SACL) on an object. In Windows Server 2008, this policy is enabled by default. In Windows 2000 Server and Windows Server 2003, there was one audit policy, Audit directory service access, which controlled whether auditing for directory service events was enabled or disabled. In Windows Server 2008, this policy is divided into four subcategories: Directory Service Access Directory Service Changes Directory Service Replication Detailed Directory Service Replication 22 Security and Policy Enforcement in Windows Server 2008 In Windows Server 2008, if you do not utilize these subcategories, auditing will be ineffective. Previously, AD DS auditing only logged the name of an attribute that was changed; it did not log the previous and current values of the attribute. Windows Server 2008 has added the ability to log old and new values of an attribute when a successful change is made to that attribute. This ability to audit changes to objects in AD DS is enabled with the new audit subcategory Directory Service Changes. The types of changes that you can audit are create, modify, move, and undelete operations that are performed on an object. The events that are generated by these operations appear in the Security log. Security and Policy Enforcement in Windows Server 2008 23 Except for account passwords, a RODC holds all the Active Directory objects and attributes that a writable domain controller holds. However, changes cannot be made to the replica that is stored on the RODC. Changes must be made on a writable domain controller and replicated back to the RODC. This prevents a change that could otherwise be made from polluting or corrupting the forest. Local applications that request Read access to the directory can obtain access. Lightweight Directory Application Protocol (LDAP) applications that request Write access receive an LDAP referral response. This response directs them to a writable domain controller. Credential caching. Credential caching is the storage of user or computer credentials. Credentials consist of a small set of approximately 10 passwords that are associated with security principals. By default, an RODC does not store user or computer credentials. Exceptions are the computer account of the RODC and a special krbtgt account that each RODC has. You must explicitly allow any other credential caching on an RODC. The RODC is advertised as the Key Distribution Center (KDC) for the branch office. The RODC uses a different krbtgt account and password than the KDC on 24 Security and Policy Enforcement in Windows Server 2008 a writable domain controller uses when it signs or encrypts Ticket-Granting Ticket (TGT) requests. After an account is successfully authenticated, the RODC attempts to contact a writable domain controller at the hub site, and requests a copy of the appropriate credentials. The writable domain controller recognizes that the request is coming from an RODC and consults the Password Replication Policy in effect for that RODC. Password Replication Policy. The Password Replication Policy determines if a user's or computer's credentials can be replicated from the writable domain controller to the RODC. If the Password Replication Policy allows it, the writable domain controller replicates the credentials to the RODC, and the RODC will cache them. When you initially deploy an RODC, you must configure the Password Replication Policy on the writable domain controller that will be its replication partner. The Password Replication Policy acts as an access control list (ACL) and determines if an RODC should be permitted to cache a password. Two new built-in groups are introduced in Windows Server 2008 Active Directory domains to support this capability: Domain RODC Password Replication Allowed Group. By default, the Domain RODC Password Replication Allowed Group has no members and the Allowed List attribute associated with it contains only the Domain RODC Password Allowed Group. Domain RODC Password Replication Denied Group. By default, this group contains the Enterprise Domain Controllers, Enterprise Read-Only Domain Controllers, Group Policy Creator Owners, Domain Admins, Cert Publishers, Enterprise Admins, Schema Admins, and Domain-wide krbtgt account. After the credentials are cached on the RODC, the RODC can directly service that user's logon requests until the credentials change. (When a TGT is signed with the krbtgt account of the RODC, the RODC recognizes that it has a cached copy of the credentials. If another domain controller has signed the TGT, the RODC will forward requests to a writable domain controller.) In the event that a RODC is decommissioned, all users whose credential as currently cached on the RODC will be prompted to change their passwords upon attempting to log in. By limiting credential caching to only users who have authenticated to the RODC, the potential exposure of credentials by a compromise of the RODC is also limited. This is because typically only a small subset of domain users has credentials cached on any given RODC. Thus, in the event that the RODC is stolen, only those credentials that are cached can potentially be cracked. Leaving credential caching disabled might further limit exposure, but would result in all authentication requests being forwarded to a writable domain controller. You Security and Policy Enforcement in Windows Server 2008 25 can modify the default Password Replication Policy to allow users' credentials to be cached at the RODC. Administrator role separation. You can delegate the local administrator role of an RODC to any domain user without granting that user any user rights for the domain or other domain controllers. This permits a local branch user to log on to an RODC and perform maintenance work on the server, such as upgrading a driver. However, the branch user cannot log on to any other domain controller or perform any other administrative task in the domain. In this way, the branch user can be delegated the ability to effectively manage the RODC in the branch office without compromising the security of the rest of the domain. 26 Security and Policy Enforcement in Windows Server 2008 BitLocker enhances data protection by uniting two major subfunctions: drive encryption and integrity checking of early boot components. Drive encryption protects data by preventing unauthorized users from breaking Windows file and system protection on lost, stolen, or inappropriately decommissioned computers. This protection is achieved by encrypting the entire Windows volume. With BitLocker all user and system files are encrypted, including the swap and hibernation files. Integrity checking the early boot components helps to ensure that data decryption is performed only if those components appear unmolested and that the encrypted drive is located in the original computer. BitLocker is tightly integrated into the operating system to provide a seamless, secure, and easily manageable data protection solution for the enterprise. For example, BitLocker optionally leverages an enterprise's existing Active Directory Domain Services infrastructure to remotely escrow recovery keys. BitLocker also has a disaster recovery console that is integrated into the early boot components to provide in-the-field data retrieval. Under default usage, BitLocker requires no end-user actions and even activation itself can be done remotely and automatically. Security and Policy Enforcement in Windows Server 2008 27 BitLocker offers the option to lock the normal boot process until the user supplies a personal identification number (PIN), much like an ATM card PIN, or inserts a USB flash drive that contains keying material. These additional security measures provide multifactor authentication and assurance that the computer will not boot or resume from hibernation until the correct PIN or USB flash drive are presented. This option is not recommended for use in a branch office scenario. BDE provides a wizard for setup and management, as well as extensibility and manageability through a Windows Management Instrumentation (WMI) interface with scripting support. Additionally, BDE simplifies computer recycling by dramatically speeding up the process of secure hardware decommissioning. The day-to-day use of a Windows Server 2008 Server or Windows Vista computer that is protected with BDE can be completely transparent to the user. In the event that system lockout occurs (perhaps through a hardware failure or as a result of a direct attack) BDE offers a simple, efficient recovery process. BDE Hardware and Software Requirements Operating System: Windows Server 2008. Windows Vista - Enterprise and Ultimate versions only. A TPM microchip, version 1.2 (turned on) and a Trusted Computing Group (TCG)compliant BIOS. The TPM interacts with BDE to help provide seamless protection at system startup. This is transparent to the user, and the user logon experience is unchanged. However, if the TPM is missing or changed, or if the startup information has changed, BDE will enter recovery mode, and you will need a recovery password to regain access to the data. For more information about TPM specifications, see the TPM Specifications section of the Trusted Computing Group's Web site (http://go.microsoft.com/fwlink/?LinkId=72757). Partitions. Two NTFS drive partitions, one for the system volume and one for the operating system volume. The system volume partition must be at least 1.5 gigabytes (GB) and set as the active partition. BIOS setting. The BIOS must be set to start up first from the hard drive, not the USB or CD drives. 28 Security and Policy Enforcement in Windows Server 2008 There are a number of enhancements to the public key infrastructure (PKI) in Windows Server 2008, including: Easier Management through PKIView. Originally part of the Microsoft Windows Server 2003 Resource Kit and called the PKI Health tool, PKIView is a Microsoft Management Console (MMC) snap-in for Windows Server 2008 which is used to analyze the health state of CAs, and to view details for CA certificates published in AD CS. PKIView provides a view of the status of the network's PKI environment. Having a view of all CAs and their current health states enables you to manage CA hierarchies and troubleshoot CA errors more easily and effectively. Specifically, PKIView indicates the validity or accessibility of authority information access (AIA) locations and certificate revocation list (CRL) distribution points (CDP). Certificate Web Enrollment. In Windows Server 2008, the ActiveX enrollment control has been replaced with a new COM enrollment control. Network Device Enrollment Service. The Network Device Enrollment Service (NDES) is Microsoft's implementation of the Simple Certificate Enrollment Protocol (SCEP), and used to be called Microsoft Simple Certificate Protocol (MSCEP). It makes it possible for software running on network devices such as routers and switches, which cannot otherwise be authenticated on the network, to enroll for x509 certificates from a certification authority (CA). In Windows Server 2003, MSCEP Security and Policy Enforcement in Windows Server 2008 29 was a Windows Server 2003 Resource Kit add-on that had to be installed on the same computer as the CA. In Windows Server 2008, it is part of the operating system and can be installed on a different computer than the CA. With NDES and SCEP, organizations can enhance the security by allowing network devices such as routers and switches to be authenticated. . Managing Certificates with Group Policy. In Windows Server 2008 Certificaterelated Group Policy settings can now be found in the Group Policy Object Editor, under Computer Configuration\Windows Settings\Security Settings\Public Key Policies. The following policy options can be managed under separate tabs on the Certificate Path Validation Settings properties sheet: Stores. Trusted Publishers. Network Retrieval. Revocation. In addition to the Enterprise Trust and Trusted Root Certification Authorities stores that were available in Windows Server 2003, four new policy stores have been added under Public Key Policies for use in distributing different types of certificates to clients: Intermediate Certification Authorities. Trusted Publishers. Untrusted Certificates. Trusted People. Certificate Deployment changes. User and computer certificates can be deployed by using a number of mechanisms, including auto-enrollment, the Certificate Request Wizard, and Web enrollment. In Windows Server 2003 it was possible to distribute trusted root CA certificate and enterprise trust certificates by using Group Policy. To provide you with a more efficient means of distributing the growing variety of certificates to users and computers in your organization, Windows Server 2008 allows all of the following types of certificates to be distributed through Group Policy: Trusted root CA certificates. Enterprise trust certificates. Intermediate CA certificates. Trusted publisher certificates. Untrusted certificates. Trusted people (peer trust certificates). 30 Security and Policy Enforcement in Windows Server 2008 Online Certificate Status Protocol (OCSP) support. OCSP responses and the use of Certificate Revocation Lists (CRLs) are two common methods for conveying information about the validity of certificates. Unlike CRLs, which are distributed periodically and contain information about all certificates that have been revoked or suspended, an online responder only receives and responds to requests from clients for information about the status of a single certificate. The amount of data retrieved per request remains constant no matter how many revoked certificates there might be. This capability is supported in Windows Server 2008. Cryptographic Next Generation. Cryptography Next Generation (CNG) provides a flexible cryptographic development platform allowing IT professionals to create, update, and use custom cryptography algorithms in cryptography-related applications, such as Active Directory Certificate Services (AD CS), Secure Sockets Layer (SSL), and Internet Protocol security (IPSec). CNG implements the U.S. government's Suite B cryptographic algorithms, which include algorithms for encryption, digital signatures, key exchange, and hashing. Security and Policy Enforcement in Windows Server 2008 31 Implementation/Usage Scenarios Enforce Security Policy Network Location Awareness (NLA). Network Location Awareness is built into the Operating System and monitors the network for any changes. The monitoring and constant awareness ensures that client computers and servers can more efficiently process group policies and respond quicker to slow or disconnected network segments. Network Location Awareness no longer depends upon ICMP (PING) for policy application, thereby speeding up the startup process for machines. It is also means that network border devices won’t inhibit the processing of policies by blocking ICMP. Network Access Protection (NAP). This new feature ensures compliance with specific health policies for systems accessing the network. Network access protection assists administrators in achieving and maintaining a specific health policy. Improve Domain Security Active Directory Domain Services Auditing. The Audit directory service access global audit policy controls auditing for directory service events to determine whether events are logged in the Security log when certain operations are carried out on objects in the directory. The improvements made to the Audit directory service 32 Security and Policy Enforcement in Windows Server 2008 access global audit policy in Windows Server 2008 improve your ability to monitor these changes. Server and Domain Isolation. With Windows Server 2008, you can logically isolate server and domain resources to limit access to authenticated and authorized computers. Enterprise PKI. There are a number of enhancements to the public key infrastructure (PKI) in Windows Server 2008 that will assist in improving security. Improve System Security BitLocker Drive Encryption (BDE). BDE ensures that data remains encrypted even if the computer is tampered with when the operating system is not running. This helps protect against "offline attacks," attacks made by disabling or circumventing the installed operating system, or made by physically removing the hard drive to attack the data separately. Windows Server Hardening. Windows Server 2008 hardens the operating system and protects the environment to provide a solid foundation for running and business applications and services. With Windows Service Hardening fewer services are running by default, and service accounts now have fewer privileges and limited network access. Improve Network Communications Security Windows Firewall and Advanced Security (WFAS). New features and improvements have been made to WFAS that make it an effective tool for protecting your computers. The new features and tools will assist you in the creation of firewall rules to control incoming and outgoing communications. Internet Protocol Security (IPSec). IPSec is now integrated with WFAS to make it simpler to implement IPSec. In addition, Windows Server 2008 includes a number of changes to IPSec which can assist you in tightening security of traffic flowing to and from systems throughout the enterprise. Security and Policy Enforcement in Windows Server 2008 Recommendations To get the most from the new security features in Windows Server 2008, administrators should: Carefully test and plan all security policies. Implement Network Access Protection. Use Windows Firewall and Advanced Security to implement IPSec. Implement Active Directory Domain Services Auditing. Deploy Read-Only Domain Controllers when physical security of the server cannot be guaranteed. Implement BitLocker Drive Encryption. Take advantage of improvements in Windows Server 2008 to improve your Enterprise PKI implementation. 33 34 Security and Policy Enforcement in Windows Server 2008 Summary Windows Server 2008 includes a variety of new security initiatives which provide new methods of security and policy enforcement, ensure integrity and confidentiality of data, and improve security of communications, including but not limited to: Network Access Protection. Windows Firewall and Advanced Security (WFAS) enhancements. IPSec improvements. Windows Server Hardening. Server and Domain Isolation. Active Directory Domain Services Auditing. Read-Only Domain Controllers (RODCs). BitLocker Drive Encryption. Removeable Device Installation Control. Improvements to Enterprise PKI. Security and Policy Enforcement in Windows Server 2008 35 36 Security and Policy Enforcement in Windows Server 2008 Network Access Protection Objectives At the end of this section, you will have learned the answers to the following questions: What is Network Access Protection? What are the benefits of Using NAP? When should I use NAP? What can I control with NAP? What are the methods used to enforce NAP? What are the components of NAP infrastructure? What are NAP policies? How are NAP policies configured? Security and Policy Enforcement in Windows Server 2008 37 Overview Network Access Protection Network administrators need a mechanism to ensure that any computer connecting to private network assets meets specific health policy requirements and has all requisite patches and hot fixes and other measures applied. This process, known as maintaining computer health, is one of the most time-consuming challenges any network administrator faces. Yet this complex task is made even more difficult when trying to maintain system health for users who connecting from home systems, partner computers and laptops that aren’t necessarily under the prevue of the administrator. These same computers could easily infect a network and cause catastrophic damage. Network Access Protection (NAP) for Windows Server 2008 and Windows Vista will provide this capability and has the requisite components and application programming interfaces required. Using NAP, an administrator can enforce specific compliancy health policies that must be met BEFORE the client computer can access any network resource and if the client computer cannot meet the health requirements, then they will not be allowed access. Examples of the types of health requirements might be having current antivirus signatures installed, proper Firewall configuration, Security Updates installed, or even group membership. This enforcement is done through the Network Policy Server which you will configure to meet your security and health policy requirements. 38 Security and Policy Enforcement in Windows Server 2008 While Network Access Protection is designed to maintain the health policy of computers, it cannot protect the network from malicious users. An authorized user using a computer that meets health requirements can still run malicious programs or perform actions detrimental to the network. In short, NAP will ensure that the computers accessing the network meet specific health requirements, but cannot control the behavior of the users. It is anticipated that NAP will be used in networks that have clients connecting through VPNs or other remote access methods or who have client computers that do not remain connected, such as laptop users. Network Access Protection vs. Network Access Quarantine Control There are some similarities between Network Access Protection (NAP) and Network Access Quarantine Control (NAQC) in that they are both used to help secure external access to the internal network. It is the mechanisms behind NAP and NAQC that define their difference. Network Access Quarantine Control is installed from the Windows Server 2003 Resource Kit or in Windows Server 2003 SP1/R2. NAQC protects the network from machines that are outside the network attempting to connect remotely, either from dial-up or VPN connections, and does not protect the network from clients who are connecting from the internally. A client computer attempting to connect remotely that does not meet specified health criteria in NAQC will be quarantined. An administrator must manually create the network policy requirement scripts that are used to compare the client computer against the defined network policy. Security and Policy Enforcement in Windows Server 2008 Technical Background Network Access Protection consists of several components and architecture models that work in conjunction to provide security for the network. The infrastructure of NAP supports the different servers required to validate, remediate and provide health certificates. The enforcement methods used by NAP (802.1x, DHCP, VPN, NPS RADIUS and IPSec) provide flexibility in determining the appropriate method for securing client access to your network. The following slides will provide technical details regarding: NAP Infrastructure. NAP Platform Architecture. NAP Enforcement Methods. NAP Client Architecture. NAP Server Architecture. Component Communication. 39 40 Security and Policy Enforcement in Windows Server 2008 There are four distinct and important parts to Network access Protection: Automatic Remediation, Health Policy Validation, Health Policy Compliance and Limited Access. Automatic Remediation. Connecting computers will automatically receive required updates. This process will allow a noncompliant computer that is in limited access to receive required updates in order to become compliant. Health Policy Validation. A computer attempting to connect will have its current health status is validated against the health policies defined by an administrator. If a computer is not in compliance, an administrator can place the computer in a monitoring-only environment or in a restricted access environment In a Monitoring only environment, all computers are granted access, even if they do not meet defined health compliance standards, though their compliance status is logged. In a restricted access environment any computer that does not meet compliance standards or is not compatible with Network Access protection will only be granted access to a restricted network. A computer that meets compliance standards will be granted unlimited access (dependent on permissions and other group policies). In either situation, if a computer is NAP compatible, than it will be automatically updated with required settings. Security and Policy Enforcement in Windows Server 2008 41 Health Policy Compliance. Non-compliant computers will automatically be updated to meet NAP requirements. Any missing files will be updated through a software management program such as Microsoft Systems Management Server or Systems Operations Center. If a computer is not in compliance, an administrator can place the computer in a monitoring-only environment or in a restricted access environment. In a Monitoring only environment, all computers are granted access and will receive any required updates. Computers can access the network before they receive any updates. In a restricted access environment any computer that does not meet compliance standards will have only have limited access until the computer has received all required updates. As with Health Policy Validation, as long as a computer is NAP compatible, it will be automatically updated with required settings. Limited Access. In a limited Access Environment the administrator will specify what computers have limited access based on non-compliance with Health Policies. An administrator can specify limited access by time duration, a specific network segment, or a specific resource. 42 Security and Policy Enforcement in Windows Server 2008 The platform architecture for NAP consists of the following components: NAP Clients. Client computers that can use the Network Access Protocol for secure communications and using 802.1X, DHCP, IPSec or VPN connections. NAP Servers. A computer running Windows Server 2008 and uses a Network Policy Server (NPS). The Network Policy Server is used to determine the system health of any connecting NAP clients. It will also determine if access to the network is allowed, if communication is permitted and what type of (if any) remediation actions are required for computers that are not compliant. Health Registration Authority VPN Server DHCP Server NPS Servers. The Network Policy Server is the replacement for the Internet Authentication Service (IAS). NPS runs on a computer running Windows Server Windows Server 2008 and validates system health policy compliance and network access. Policy Servers. Computers that provide current system health state for Network Policy Servers. Security and Policy Enforcement in Windows Server 2008 43 Active Directory Directory Service. Group Policy settings for IPSec-based communications and VPN and 802.1X credentials are stored in the directory service for connection validation. Restricted Network. This is a separate network segment (logical or physical) that contains the Remediation Servers. A Remediation server will provide the updates needed by non-compliant computers when in a limited access state. Remediation Server. A remediation server maintains the resources, services, that are accessed by non-This is a server or servers on which resources reside that noncompliant clients can use to come into compliance. The remediation servers are available on the restricted network so that noncompliant clients that are not allowed full network access. The remediation server provisions the NAP client with the required updates to bring it into compliance with health policy Health Certificate Server. The Health Certificate Server is responsible for issuing X.509 certificates to quarantined clients once they have met system health validation requirements System Health Agent. The System Health Agent (SHA) is a specific, defined system health requirement or a set of health requirements. The System Health Agent can be configured to check for a particular health parameter and can be matched to a specific remediation server. The System Health Agent will send a Statement of Health (SoH) to the appropriate System Health Validator (SHV). System Health Validator. The System Health Validator server will compare the Statement of Health sent from a System Health Agent against the configured quarantine policy. If there is a match, then the specific check made by the SHA is compliant with the network security policy. Based on the check made by the System Health Validator, a Statement of Health Response (SoHR) message is sent to the Quarantine server stating whether the system is or is not in compliance with the required health state and any remediation instructions. The quarantine server is responsible for garnering responses from each of the SHVs and determines which machines, if any need to be quarantined. The System Health Validator runs on the NPS server. Statement of Health. A Statement of health is the response sent by a System Health Agent to a System Health Validator. A common misconception is that the quarantine is some sort of empty black hole in cyberspace. The fact is that the quarantine network is anything but empty. While an SMS server must be accessible from within Quarantine Mode, there are other components that must be accessible from Quarantine Mode as well. For starters, the quarantine network must have a DNS server. Keep in mind, though, that this server can simply be a forwarding DNS server; it doesn't have to be the organization’s primary DNS server. Finally, the DHCP server and IAS server (VPN Quarantine Mode only) must be accessible whether a machine is quarantined or not. Otherwise, a client would never be able to get out of Quarantine Mode after its Statement of Health has been updated. 44 Security and Policy Enforcement in Windows Server 2008 In a typical scenario, a Network Access Protection Enforcement Client will request access to the network. The actual NAP server must be running Windows Server 2008 and clients must be running Windows Vista. This request is passed along to a NAP server which will indicate whether the access is limited or unlimited. The following are methods of NAP Client enforcement: Internet Protocol Security (IPSec). IPSec Enforcement uses a Health Registration Authority (HRA) to issue an X.509 certificate to clients with limited access once they are in compliance with health policy requirements. The issued certificate is used to authenticate NAP clients when initiating or requesting IPSec communications. The IPSec NAP EC is the most secure of the limited network access protection measures in NAP. IEEE 802.1X authenticated connections. The 802.1X Enforcement method uses a Network Policy Server and an EAPHost NAP Enforcement Client (EC). When a non-compliant client tries to connect to an access point, the NPS sends a message to the access point telling it to place a restricted access profile on the 802.1X client until it is on compliance. Virtual Private Networks (VPN). The VPN Enforcement method consists of a VPN NAP Enforcement Server (ES) component and a VPN NAP EC component. When a client computer attempts to connect remotely using VPN to the network, the VPN Security and Policy Enforcement in Windows Server 2008 45 server will validate the health policy of the compute. VPN Enforcement provides strong limited network access for all computers accessing the network through a VPN connection. Dynamic Host Configuration Protocol (DHCP). DHCP Enforcement comprises DHCP NAP ES and DHCP NAP EC components. Using DHCP Enforcement, DHCP servers can check and enforce health policy requirements any time a computer attempts to lease or renew an IP address configuration on the network. Using DHCP Enforcement is the easiest of the enforcement measures to deploy due to the fact that all DHCP client computers must lease and renew IP addresses at some point. One drawback to DHCP Enforcement is that it is the weakest form of limited network access because DHCP Enforcement relies on entries in the IP routing table. NPS/RADIUS. The Remote Authentication Dial-In User Service component of Network Policy Service is the only Enforcement measure that does not have its own NAP Enforcement Server or Enforcement Client component. Instead, NPS/RADIUS works as a policy server in conjunction with the NAP ES and NAP EC components. Administrators must define system health requirements in the form of policies on the NPS server. Network Policy Servers provide health policy checks and coordinate with the Active Directory Directory Service any time a client computer attempts to obtain a health certificate or to connect to an 802.1X access point, a VPN server, or a DHCP server. When using NPS/RADIUS, you must add a RADIUS client for each access device or NAP server that requires NAP health determination. You do this through the NAP Radius Client Wizard. 46 Security and Policy Enforcement in Windows Server 2008 In this demonstration, you will see how to create NAP policies Windows Server 2008. Key Points Your instructor will demonstrate the following: Creating NAP policies Use the MMC to create Client NAP Configuration settings Create a new RADIUS client Create new System Health Validators for Windows Vista and Windows XP SP2 Security and Policy Enforcement in Windows Server 2008 The following sections will discuss the following with respect to NAP: Logical Networks IPSec Enforcement IEEE 802.1X Remote Access VPNs DHCP 47 48 Security and Policy Enforcement in Windows Server 2008 Enforcement of IPSec is done through dividing the physical network into three distinct logical networks. A computer can be a member of but one logical network at any one time. The logical networks created for IPSec enforcement are done so based on the current state of connecting computers. Some computers will have health certificates and others which require IPSec authentication with health certificates for incoming communication attempts. The three logical networks created enable computers to be placed into limited access areas with access to remediation and still provide compliant computers with a level of protection from noncompliant computers. IPSec Enforcement defines the following logical networks: Secure Network. This comprises the computers that have valid health certificates, require that incoming communication attempts authenticate with health certificates, and share a common set of IPSec policy settings for providing IPSec protection. Boundary Network. The Boundary network is where computers that posses health certificates and do not require incoming communication attempts be authenticated with health certificates and use IPSec protection. Restricted Network. This set of computers do not have health certificates. They have not completed health checks, are guests, or are not NAP-capable computers such as computers running versions of Windows that do not support NAP, Apple Macintosh computers, or UNIX-based computers. Security and Policy Enforcement in Windows Server 2008 49 Using one of the three types of logical networks (secure, boundary and restricted) communication using IPSec between these different areas occurs: Within the Secure Network. Health compliant computers within a secure network have health certificates. The two computers will validate the health certificates of the other. IPSec authentication is successful and subsequent data traffic is protected with IPSec. The result is authenticated peers and protected traffic. Secure Network to Boundary Network. A computer trying to communicate with another computer in the boundary network will use IPSec authentication using its own health certificate. Computers in the boundary network have valid health certificates and will validate the health certificates of the other. IPSec authentication is successful and subsequent data traffic is protected with IPSec. The result is authenticated peers and protected traffic. Secure Network to Restricted Network. A computer trying to communicate with another computer in the restricted network will attempt to use IPSec authentication using its own health certificate. Computers in the restricted network do not have health certificates and IPSec communication will fail. Communication to this logical network will be unsecure. 50 Security and Policy Enforcement in Windows Server 2008 Within the Boundary Network. A computer trying to communicate with another computer in the boundary network will use IPSec authentication using its own health certificate. Computers in the boundary network have valid health certificates and will validate the health certificates of the other. IPSec authentication is successful and subsequent data traffic is protected with IPSec. Boundary Network to Secure Network. A computer trying to communicate with another computer in the secure network will use IPSec authentication using its own health certificate. Computers in the boundary network have valid health certificates and will validate the health certificates of the other. IPSec authentication is successful and subsequent data traffic is protected with IPSec. Boundary Network to Restricted Network. A computer trying to communicate with another computer in the restricted network will attempt to use IPSec authentication using its own health certificate. Computers in the restricted network do not have health certificates and IPSec communication will fail. Communication to this logical network will be unsecure. Within the Restricted Network. Computers in the restricted network are either not NAP clients or are NAP clients that do not have a health certificate. Computers in the restricted network do not have health certificates and IPSec communication will fail. Communication within this logical network will be unsecure. Restricted Network to Boundary Network. When a computer in the restricted network initiates unprotected communication with a computer in the boundary network, the boundary network computer allows the unprotected communication and responds with unprotected traffic because the boundary network computer does not require IPSec protection for incoming communication requests. The result is unauthenticated peers and unprotected traffic when a computer in the restricted network initiates communication with a computer in the boundary network. Restricted Network to Secure Network. This will only lead to dropped or failed communications as the computers in the restricted network are not using IPSec. Security and Policy Enforcement in Windows Server 2008 51 A health certificate is obtained to validate the compliance of a computer with the health policy. A computer will need to obtain a health certificate and become a member of the secure or boundary networks. A NAP client using IPSec Enforcement using the following process: When the computer starts, the host-based firewall is enabled but does not allow any exceptions so that no other computer can initiate communications with it until it is in compliance or is blocked. At this point, the computer is in the restricted network because it does not have a health certificate to validate compliance. The computer can communicate with other computers in the restricted and boundary networks and can access the Internet. However, it cannot initiate communications with computers in the secure network until it has received a health certificate. NAP client obtains network access and an IP address configuration. The IPSec NAP EC on the NAP client creates an HTTPS secure communication channel with the HRA. The IPSec NAP EC sends its credentials, a certificate request for a health certificate, and its list of SoHs to the HRA over the HTTPS channel. The HRA passes the list of SoHs to the NPS server as RADIUS vendor-specific attributes (VSAs) in a RADIUS Access-Request message. 52 Security and Policy Enforcement in Windows Server 2008 The NPS server receives the RADIUS Access-Request message, extracts the list of SoHs from the RADIUS VSAs, and passes the list of SoHs to the NAP Administration Server component. The NAP Administration Server receives the list of SoHs and forwards the SoHs to the appropriate SHVs. Each SHV analyzes the contents of the SoH passed by the NAP Administration Server and then constructs and sends a Statement of Health Response (SoHR) to the NAP Administration Server component. The NAP Administration Server passes the list of SoHRs to NPS. NPS compares the list of SoHRs to a configured set of network access and system health policies and then makes a limited/unlimited network access decision. NPS constructs and sends a RADIUS Access-Accept message containing the System Statement of Health Response (SSoHR)—indicating whether the client has limited or unlimited network access—and the list of SoHRs as RADIUS VSAs. The HRA sends the SSoHR and the list of SoHRs back to the IPSec NAP EC on the NAP client. If the NAP client is compliant, the HRA obtains a health certificate from the existing public key infrastructure (PKI) and sends it to the NAP client. If the NAP client is issued a health certificate via the HRA, it adds that certificate to its computer certificate store. If the IPSec policy settings have not already been configured, the IPSec NAP EC configures IPSec settings to authenticate using the health certificate for IPSec-based communications. The IPSec NAP EC configures the host-based firewall to allow incoming communications from any peer that uses a health certificate for IPSec authentication. The NAP client is now a member of the secure network. The IPSec NAP EC performs steps 3-12 whenever new SoH information arrives at the NAP Agent or when the health certificate is about to expire. NAP Client IPSec-based is Noncompliant If the IPSec-based NAP client is not in compliance or does not have a health certificate it cannot initiate communication with computers in the secure network. The noncompliant NAP client performs the following remediation process to become a member of the secure network: The IPSec NAP EC passes the list of SoHRs to the NAP Agent. The NAP Agent forwards the SoHRs to the appropriate SHA. Each SHA analyzes its SoHR, and based on the contents, performs the remediation as needed to correct the NAP client's system health state. After an SHA has performed the remediation function, it passes an updated SoH to the NAP Agent. The NAP Agent collects the updated SoHs from all of the SHAs that required remediation, creates a new list of SoHs, and passes it to the IPSec NAP EC. Security and Policy Enforcement in Windows Server 2008 53 The IPSec NAP EC establishes a new HTTPS secure session with the HRA and sends the new list of SoHs. The HRA receives the list of SoHs and sends them to the NPS server. The NPS server receives the list of SoHs and passes them to the NAP Administration Server. The NAP Administration Server receives the list of SoHs, and assuming that it has not already cached the SoHRs, forwards the SoHs in the list to the appropriate SHVs. The SHVs analyze the contents of the SoH passed by the NAP Administration Server and then construct and send an SoHR to the NAP Administration Server, The NAP Administration Server passes the list of SoHRs to NPS. NPS compares the list of SoHRs to a configured set of network access and system health policies and then makes an unlimited network access decision. NPS constructs and sends a RADIUS Access-Accept message containing the SSoHR and the list of SoHRs. The HRA receives the RADIUS Access-Accept message, extracts the SSoHR and the list of SoHRs, and sends them to the NAP client over the HTTPS session. Because the NAP client is now compliant, the HRA obtains a health certificate and sends it to the NAP client. 54 Security and Policy Enforcement in Windows Server 2008 Network Access Protection provides enforcement for the following technologies in Windows Vista and Windows Server Windows Server 2008: IPSec IEEE 802.1X VPN connections DHCP Administrators can use these technologies separately or together to limit the network access of noncompliant computers. NPS acts as a policy server for all of these technologies. Overview and Capabilities IPSec support in NAP consists of a Health Registration Authority (HRA) and an IPSec NAP EC on NAP clients. The HRA is a computer running Windows Server "Windows Server 2008" and Internet Information Services (IIS). The HRA obtains X.509 certificates from a certification authority (CA) for NAP clients when the NPS server has determined the clients to be compliant. NAP clients use health certificates for IPSec authentication when they initiate IPSec-protected communications with other NAP clients on an intranet. Health certificates can also be used for IEEE 802.1X authentication or by applications. If a NAP client does not have a health certificate, the IPSec peer Security and Policy Enforcement in Windows Server 2008 55 authentication fails and the NAP client cannot initiate communication with a compliant IPSec peer. IPSec Enforcement confines the communication on your network to those computers that are considered compliant and protects network traffic from end-to-end, rather than just across a network connection. By leveraging IPSec and its configuration flexibility, IPSec Enforcement allows to you to define requirements for secure communications with compliant clients on a per-IP address or per-TCP or User Datagram Protocol (UDP) port number basis. For example, you could specify IPSec policy settings to secure all Remote Procedure Call (RPC) traffic, subject to IPSec Enforcement. IPSec Enforcement is the strongest and most flexible form of limited network access in Network Access Protection. IPSec Enforcement vs. VPN and DHCP Enforcement VPN Enforcement limits the access of noncompliant VPN clients that are attempting to access a private intranet through a VPN connection. DHCP Enforcement limits the access of noncompliant DHCP clients that are attempting to obtain a valid IP address configuration. In both of these cases, the access to a restricted network is based on a client-server relationship and implemented at the server through which network access or configuration is being requested. For VPN Enforcement, the VPN server enforces the limited network access of noncompliant VPN clients. For DHCP Enforcement, the DHCP server provides settings that limit the access of noncompliant DHCP clients. With IPSec Enforcement, the communication attempt is made from end-to-end, rather from a specific type of client to a specific type of server. Unlike VPN and DHCP Enforcement, IPSec Enforcement is enforced by each individual computer, rather than at the point of entry into the network. Additionally, the determination of client health is performed via the HRA, a computer that is separate from the computer to which communication is being attempted. IPSec Enforcement limits the access of noncompliant clients that are attempting to communicate after network access to the intranet has been successfully made and after a valid IP address configuration has been allocated. IPSec Enforcement limits communication for IPSec-based NAP clients by dropping incoming communication attempts that are sent from computers that do not have health certificates. Using IPSec Enforcement with Existing IPSec Protection IPSec Enforcement can be used in conjunction with the following IPSec deployment scenarios: Secure server, Server isolation, and Domain isolation. Secure Server. When implementing an IPSec secure server deployment use the IPSec policy to provide protection for traffic sent between specific sets of servers, such as the traffic sent between database servers or domain controllers. IPSec Enforcement can be deployed in conjunction with a secure server deployment so that a combination of IPSec policy settings and NAP policy settings ensure that the servers remain healthy and use IPSec to protect traffic sent between them. 56 Security and Policy Enforcement in Windows Server 2008 Server Isolation. An IPSec server isolation deployment uses IPSec policy to provide protection for traffic sent between all domain members and a specific set of servers, such as the traffic sent between database client computers that are domain members and database servers. IPSec Enforcement can be deployed in conjunction with a server isolation deployment so that a combination of IPSec policy settings and NAP policy settings ensure that the domain members and specific sets of servers remain healthy and communication with compliant NAP client computers on a per-server or per-application basis is protected with IPSec. Domain Isolation. An IPSec domain isolation deployment uses IPSec policy to provide protection for traffic sent between all domain members, including all client and server computers. IPSec Enforcement can be deployed in conjunction with a domain isolation deployment so that a combination of IPSec policy settings and NAP policy settings ensure that domain members remain healthy and that traffic sent between domain members is authenticated with domain credentials, a health certificate, or both and is protected with IPSec. For more information on Server and Domain Isolation see: http://www.microsoft.com/technet/network/sdiso/default.mspx Security and Policy Enforcement in Windows Server 2008 57 IEEE 802.1X Enforcement instructs an 802.1X-capable access point to use a limited access profile, either a set of IP packet filters or a virtual LAN identifier (VLAN ID), to limit the traffic of the 802.1X-based noncompliant client so that it can reach only resources on the restricted network. For IP packet filtering, the 802.1X-capable access point applies the IP packet filters to the IP traffic that is exchanged with the 802.1X client and silently discards all packets that do not correspond to a configured packet filter. For VLAN IDs, the 802.1X-capable access point applies the VLAN ID to all of the packets exchanged the 802.1X client and the traffic does not leave the VLAN corresponding to the restricted network. To indicate its health state, an 802.1X NAP client can use one of the following: List of SoHs In this case, the EAPHost NAP EC sends its list of SoHs using a PEAP-TLV message in a manner equivalent to that for VPN-based connections. A health certificate In this case, the EAPHost NAP EC sends its health certificate. By sending a health certificate, the NPS server does not have to check the list of SoHs and determine the health state of a connecting client. If the health certificate is valid, the client is compliant. Using a health certificate is the recommended method of health validation for 802.1X connections. 58 Security and Policy Enforcement in Windows Server 2008 The following process occurs when a NAP-capable 802.1X client connects to an 802.1X access point and sends its list of SoHs for health validation: Ether the 802.1X access point or the 802.1X client initiates 802.1X authentication using the EAP over LAN (EAPOL) protocol. The NPS server sends an EAP-Request/Identity message to the EAPHost NAP EC on the 802.1X client. The EAPHost NAP EC responds with an EAP-Response/Identity message that contains the user or computer name of the 802.1X client. The NPS server sends an EAP-Request/Start PEAP message to the 802.1X client. The 802.1X client and the NPS server exchange a series of TLS messages to negotiate an encrypted TLS channel. The NPS server sends a request for the list of SoHs to the 802.1X client using a PEAP-TLV message. The EAPHost NAP EC queries the NAP Agent for the list of SoHs. The EAPHost NAP EC passes the list of SoHs to the NPS server using a PEAP-TLV message. The NPS server requests that the 802.1X client authenticate itself using its user or computer credentials, using a PEAP authentication method such as PEAP-MS-CHAP v2. The 802.1X client authenticates itself against the NPS server using the negotiated PEAP authentication method. The NPS component on the NPS server extracts the list of SoHs from the PEAP-TLV message sent in step 9 and passes it to the NAP Administration Server component. The NAP Administration Server component passes the SoHs in the list of SoHs to the appropriate SHVs. The SHVs analyze the contents of the SoH passed by the NAP Administration Server and send an SoHR to the NAP Administration Server. The NAP Administration Server passes the list of SoHRs to NPS. NPS compares the list of SoHRs to a configured set of network access and system health policies and then makes a limited/unlimited network access decision. NPS sends a PEAP-TLV message containing the SSoHR and the list of SoHRs to the 802.1X client. NPS sends a RADIUS Access-Accept message containing the SSoHR to the 802.1X access point. If the 802.1X connection is limited, the RADIUS Access-Accept message also contains an access profile to limit the traffic of the 802.1X client to the restricted network. Security and Policy Enforcement in Windows Server 2008 59 If the 802.1X connection is unlimited, the RADIUS Access-Accept message does not contain an access profile to limit network access. After the 802.1X connection completes, the NAP client will have unlimited network access. The 802.1X client and 802.1X access point complete the 802.1X connection. The following process occurs when a NAP-capable 802.1X client connects to an 802.1Xcapable access point and sends its health certificate for health validation: Either the 802.1X access point or the 802.1X client initiates 802.1X authentication using EAPOL. The 802.1X NAP client uses PEAP and a configured PEAP authentication method to perform user or computer authentication to gain access to the network. The EAPHost NAP EC sends its health certificate to the NPS server using a PEAPTLV message. NPS sends a PEAP-TLV message containing the SSoHR to the 802.1X client. NPS sends a RADIUS Access-Accept message containing the SSoHR to the 802.1X access point. If the health certificate is not valid, the RADIUS Access-Accept message also contains a limited access profile. If the health certificate is valid, the RADIUS Access-Accept message does not contain a limited access profile. After the 802.1X connection completes, the NAP client will have unlimited network access. The 802.1X client and 802.1X access point complete the 802.1X connection. Noncompliant 802.1X - based NAP Client If the 802.1X NAP client is noncompliant, the 802.1X connection has the limited access profile applied and the client can reach only resources on the restricted network. The process of remediation and obtaining unlimited access to the network will depend on whether the 802.1X NAP client is using a list of SoHs or a health certificate for health validation. The following process performs the remediation required for unlimited network access when the NAP client is using a list of SoHs: The EAPHost NAP EC extracts the list of SoHRs in the PEAP-TLV message received from the NPS Server and passes it to the NAP Agent. The NAP Agent passes the SoHRs to the appropriate SHAs. Each SHA analyzes its SoHR, and based on the contents, performs the remediation as needed to correct the NAP client's system health state. After the SHA has performed the remediation function, it passes an updated SoH to the NAP Agent. The NAP Agent collects the updated SoHs from all of the SHAs that required remediation, creates a new list of SoHs, and passes it to the EAPHost NAP EC. 60 Security and Policy Enforcement in Windows Server 2008 The EAPHost NAP EC restarts 802.1X authentication and sends its list of SoHs for health validation. Health validation succeeds and the 802.1X client has unlimited network access. The following process performs the remediation required for unlimited network access when the NAP client is using a health certificate: The EAPHost NAP EC sends a certificate request with its list of SoHs to the HRA. The HRA passes the list of SoHs to the NPS server for evaluation. The NPS server sends the list of SoHRs to the HRA. The HRA sends the list of SoHRs to the EAPHost NAP EC. The EAPHost NAP EC extracts the list of SoHRs and passes it to the NAP Agent. The NAP Agent passes the SoHRs to the appropriate SHAs. Each SHA analyzes its SoHR, and based on the contents, performs the remediation as needed to correct the NAP client's system health state. After the SHA has performed the remediation function, it passes an updated SoH to the NAP Agent. The NAP Agent collects the updated SoHs from all of the SHAs that required remediation, creates a new list of SoHs, and passes it to the EAPHost NAP EC. The EAPHost NAP EC sends a new certificate request with its list of SoHs to the HRA. The HRA sends the list of SoHs to the NPS server. The NPS server evaluates the list of SoHs and sends back an SSoHR indicating unlimited access to the HRA. The HRA sends a new health certificate to the 802.1X client. The 802.1X client restarts 802.1X authentication and sends its new health certificate for health validation. Health validation succeeds and the 802.1X client has unlimited network access. VPN Connections VPN Enforcement uses a set of remote access IP packet filters to limit the traffic of the VPN client so that it can reach only resources on the restricted network until validated. The VPN server applies the IP packet filters to the IP traffic that is received from the VPN client and silently discards all packets that do not correspond to a configured packet filter. The following process occurs when a NAP-capable VPN client connects to a NAPcapable VPN server: The VPN client initiates a connection to the VPN server using either Point-to-Point Tunneling Protocol (PPTP) or Layer Two Tunneling Protocol with Internet Protocol Security (L2TP/IPSec). Security and Policy Enforcement in Windows Server 2008 61 The VPN NAP ES on the VPN server (a component of Routing and Remote Access) sends an EAP-Request/Identity message to the VPN NAP EC on the VPN client. The VPN NAP EC on the VPN client (a component of the Remote Access Connection Manager service) responds with an EAP-Response/Identity message that contains the user name of the VPN client. The VPN NAP ES on the VPN server sends the EAP-Response/Identity message as a RADIUS Access-Request message to the NPS server. For all subsequent PEAPbased messages, the logical communication occurs between the NPS server and the VPN NAP EC on the VPN client, using the VPN server as a pass-through device. Messages between the VPN server and the NPS server are a series of RADIUS Access-Request, Access-Challenge, and Access-Accept messages. The NPS server sends an EAP-Request/Start PEAP message to the VPN client. The VPN client and the NPS server exchange a series of TLS messages to negotiate an encrypted TLS channel. The NPS server sends a request for the list of SoHs to the VPN client using a PEAPTLV message. The VPN NAP EC queries the NAP Agent for the list of SoHs. The VPN NAP EC passes the list of SoHs to the NPS server using a PEAP-TLV message. The NPS server requests that the VPN client authenticate itself using its client credentials, using a PEAP authentication method such as PEAP-Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2). The VPN client authenticates itself to the NPS server using the negotiated PEAP authentication method. The NPS component on the NPS server extracts the list of SoHs from the PEAP-TLV message sent in step 9 and passes it to the NAP Administration Server component. The NAP Administration Server component passes the SoHs in the list of SoHs to the appropriate SHVs. The SHVs analyze the contents of the SoH passed by the NAP Administration Server and then construct and send an SoHR to the NAP Administration Server. The NAP Administration Server passes the list of SoHRs to NPS. NPS compares the list of SoHRs to a configured set of network access and system health policies and then makes a limited/unlimited network access decision. NPS constructs and sends a PEAP-TLV message containing the SSoHR and the list of SoHRs to the VPN client. NPS sends a RADIUS Access-Accept message containing the SSoHR to the VPN server. 62 Security and Policy Enforcement in Windows Server 2008 If the VPN connection is limited, the RADIUS Access-Accept message also contains a set of IP packet filters that limit the traffic of the VPN client to the restricted network. If the VPN connection is unlimited, the RADIUS Access-Accept message does not contain IP packet filters to limit network access. After the VPN connection completes, the NAP client will have unlimited network access. The VPN client and VPN server complete the VPN connection. Noncompliant VPN-based NAP Client If the VPN client is noncompliant, the VPN connection has the packet filters applied, and the VPN client can reach only resources on the restricted network. The following process performs the remediation required for unlimited network access: The VPN NAP EC extracts the list of SoHRs in the PEAP-TLV message received from the NPS Server and passes it to the NAP Agent. The NAP Agent passes the SoHRs to the appropriate SHAs. Each SHA analyzes its SoHR, and based on the contents, performs the remediation as needed to correct the NAP client's system health state. After the SHA has performed the remediation function, it passes an updated SoH to the NAP Agent. The NAP Agent collects the updated SoHs from all of the SHAs that required remediation, creates a new list of SoHs, and passes it to the VPN NAP EC. The VPN NAP EC passes the list of SoHs to the NPS server using a PEAP-TLV message. The NPS component on the NPS server extracts the list of SoHs from the PEAP-TLV message and passes it to the NAP Administration Server component. The NAP Administration Server component passes the SoHs in the list of SoHs to the appropriate SHVs. The SHVs analyze the contents of the SoH passed by the NAP Administration Server and then construct and send an SoHR to the NAP Administration Server. The NAP Administration Server passes the list of SoHRs to NPS. NPS compares the list of SoHRs to a configured set of network access and system health policies and then makes a limited/unlimited network access decision. NPS constructs and sends a PEAP-TLV message via the VPN server containing the SSoHR and the list of SoHRs to the VPN client. NPS constructs and sends a RADIUS Access-Accept message to the VPN server containing the SSoHR and does not include IP packet filters for limited network access. Security and Policy Enforcement in Windows Server 2008 63 Upon receipt of the RADIUS Access-Accept message, the VPN server removes the IP packet filters from the VPN connection and the VPN client has unlimited network access. DHCP IP Address Configuration DHCP IP address configuration limits network access for the DHCP client through its IP routing table. The DHCP Enforcement sets the DHCP Router option value to 0.0.0.0, so the noncompliant computer does not have a configured default gateway and cannot gain egress to the secure network. DHCP Enforcement also sets the subnet mask for the allocated IP address to 255.255.255.255, so that there is no route to the attached subnet. To allow the noncompliant computer to access the remediation servers on the restricted network, the DHCP server assigns the Classless Static Routes DHCP option, which contains a set of host routes to the computers on the restricted network, such as the DNS and remediation servers. The end result of DHCP limited network access is a configuration and routing table that allows connectivity only to specific destination addresses. Therefore, when an application attempts to send to a unicast IPv4 address other than those supplied via the Classless Static Routes option, the TCP/IP protocol returns a routing error. Notes DHCP Enforcement is for IP version 4 (IPv4) only and does not limit the network access of IP version 6 (IPv6)-based DHCP clients. Because DHCP Enforcement is based on entries in the IPv4 routing table, it cannot prevent a malicious user who is a local administrator from manually changing the IPv4 routing table and gaining unlimited network access. The following process occurs when a NAP-capable DHCP client attempts to obtain an IPv4 address configuration from a NAP-capable DHCP server: The DHCP NAP EC on the NAP client (a component of the DHCP Client service) queries the NAP Agent component for the list of SoHs. The NAP Agent, which has cached the SoHs from the installed set of SHAs, responds to the DHCP NAP EC with the list of SoHs. The DHCP Client service constructs and sends a DHCPDiscover message. Contained within the DHCPDiscover message is the list of SoHs in one or more Microsoft vendor-specific DHCP options. The DHCP Server service on the NAP-enabled DHCP server receives the DHCPDiscover message. The DHCP NAP ES on the DHCP server (a component of the DHCP Server service) extracts the list of SoHs from the DHCPDiscover message and sends the list of SoHs to the NPS server as RADIUS vendor-specific attributes in a RADIUS Access-Request message. The NPS server receives the RADIUS Access-Request message, extracts the list of SoHs from the RADIUS vendor-specific attributes, and passes the list of SoHs to the NAP Administration Server component. 64 Security and Policy Enforcement in Windows Server 2008 The NAP Administration Server receives the list of SoHs and forwards the SoHs to the appropriate SHVs. The SHVs analyze the contents of the SoH passed by the NAP Administration Server and then construct and send an SoHR to the NAP Administration Server. The NAP Administration Server passes the list of SoHRs to NPS. NPS compares the list of SoHRs to a configured set of network access and policies and then makes a limited/unlimited network access decision. NPS constructs and sends a RADIUS Access-Accept message containing the System Statement of Health Response (SSoHR)—indicating whether the client has limited or unlimited network access—and the list of SoHRs as RADIUS vendor-specific attributes. The DHCP server receives the RADIUS Access-Accept message, extracts the SSoHR and the list of SoHRs, and reformats them as DHCP vendor-specific options. The DHCP server sends a DHCPOffer message containing an IPv4 address configuration. The DHCP client sends a DHCPRequest message requesting the offered IPv4 address configuration. The DHCP server sends a DHCPAck message containing the offered IPv4 address configuration, the SSoHR, and the list of SoHRs as one or more Microsoft vendorspecific DHCP options. If the NAP client is compliant, the DHCPAck message contains the Router DHCP option set to the correct default gateway, a subnet mask for the subnet to which the NAP client is attached, and does not contain the Classless Static Routes option. At this point, the NAP client has unlimited network access. Noncompliant DHCP-based NAP Client If the NAP client is noncompliant, the DHCPAck message that contains the Router DHCP option will be set to 0.0.0.0, the Subnet Mask option set to 255.255.255.255, and the Classless Static Routes option contains the set of static host routes to resources on the restricted network. The following process performs the remediation required for unlimited network access: The DHCP NAP EC passes the list of SoHRs to the NAP Agent. The NAP Agent passes the SoHRs to the appropriate SHAs. Each SHA analyzes its SoHR, and based on the contents, performs the remediation as needed to correct the NAP client's system health state. After the SHA has performed the remediation function, it passes an updated SoH to the NAP Agent. The NAP Agent collects the updated SoHs from all of the SHAs that required remediation, creates a new list of SoHs, and passes it to the DHCP NAP EC. Security and Policy Enforcement in Windows Server 2008 65 The DHCP NAP EC sends the DHCP server a DHCPRequest message to renew its current IPv4 address configuration containing the list of SoHs. The DHCP Server service on the NAP-enabled DHCP server receives the DHCPRequest message. The DHCP NAP ES component of the DHCP Server service extracts the list of SoHs from the DHCPRequest message and sends the list of SoHs to the NPS server as RADIUS vendor-specific attributes of a RADIUS AccessRequest message. The NPS server receives the RADIUS Access-Request message, extracts the list of SoHs from the RADIUS vendor-specific attributes, and passes the list of SoHs to the NAP Administration Server. The NAP Administration Server receives the list of SoHs, and assuming that it has not already cached the SoHRs, it forwards the SoHs in the list to the appropriate SHVs. The SHVs analyze the contents of the SoH passed by the NAP Administration Server and then construct and send an SoHR to the NAP Administration Server, The NAP Administration Server passes the list of SoHRs to NPS. NPS compares the list of SoHRs to a configured set of network access and system health policies and then makes a limited/unlimited network access decision. NPS constructs and sends a RADIUS Access-Accept message containing the SSoHR indicating unlimited network access and the list of SoHRs as RADIUS vendorspecific attributes. The DHCP server receives the RADIUS Access-Accept message, extracts the SSoHR and the list of SoHRs, and reformats them as DHCP vendor-specific options. The DHCP server sends a DHCPAck message with the Router DHCP option set to the correct default gateway, a subnet mask for the subnet to which the NAP client is attached, and does not contain the Classless Static Routes option. The DHCP client now has a renewed IPv4 address configuration for unlimited network access. 66 Security and Policy Enforcement in Windows Server 2008 Authentication Processing A Network Policy Server in Windows Server 2008 can be used as either a RADIUS server or a RADIUS proxy. When NPS is used as a RADIUS server: RADIUS Access-Request messages are authenticated through the Active Directory directory service, a Windows NT Server 4.0 domain, or through the local Security Accounts Manager (SAM). They are authorized with the user or computer account properties and authorization policies. RADIUS Accounting-Request messages are logged in a local log file or a Microsoft SQL Server 2000 or Microsoft SQL Server 2005 database based on accounting settings. When NPS is used as a RADIUS proxy: Access-Request messages are forwarded to another RADIUS server for authentication and authorization. Accounting-Request messages are logged in a local log file or a Microsoft SQL Server 2000 or Microsoft SQL Server 2005 database (based on accounting settings) and forwarded to another RADIUS server for accounting. Security and Policy Enforcement in Windows Server 2008 67 System Health Validators are server software counterparts to System Health Agents (SHAs) - each SHA on the client has a corresponding SHV in NPS. SHVs allow NPS to verify the statement of health (SoH) that is made by its corresponding SHA on the client computer. SHVs contain the details of the required configuration settings on client computers. For example, the Windows Security SHV is the counterpart to the Microsoft SHA on client computers. The Windows Security SHV allows you to create a policy for how various settings on NAP-capable client computers must be configured. If the settings on the client computer as reported in the SoH do not match the settings in the SHV on the NPS server, the client computer is not compliant with health policy. System Health Validator Templates. System Health Validator Templates allow you to define client health policies in NPS by adding one or more SHVs to the template. After an SHV template is configured with one or more SHVs, you can add the SHV template to the settings of a network policy that you want to use to enforce NAP when client computers connect to your network. Using Multiple System Health Validators in a Template. The Windows Security SHV is included by default in NPS. Third party companies might also provide additional SHV and SHA pairs for their NAP-compatible products. In any circumstance where you want to use a NAP-compatible product, you can follow the product's documentation to install the SHA on NAP-capable client computers, and then install the SHV on the NPS server. After you have installed the SHV on the NPS server, you can configure the SHV and then add the SHV to an SHV template. After your template is configured with the SHVs you want to use, you can add the SHV template to a network policy. Remediation Server Group. A Remediation Server Group is a list of servers on the restricted network that provide the resources (software, patches and other solutions) necessary to bring noncompliant NAP-capable clients into compliance with administrator-defined client health policy. A remediation server hosts the updates that NAP agent can use to bring noncompliant client computers into compliance with health policy as defined in NPS. For example, a remediation server can host antivirus signatures. If health policy requires that client computers have the latest antivirus definitions installed, an antivirus SHA, an antivirus SHV, an antivirus policy server, and the remediation server used to host the antivirus signatures work in concert to update non-compliant computers. Authorization Policies Authorization policies are an ordered set of rules that define how connection attempts are either permitted or rejected. Rules will contain a policy type (either grants or denies access), one or more conditions and policy settings. If a connection is authorized, the authorization policy settings can specify a set of connection restrictions. For NAP, 68 Security and Policy Enforcement in Windows Server 2008 authorization policies specify the conditions to check for health requirements and, for noncompliant NAP clients or NAP-ineligible clients, the enforcement behavior. Authorization Policy Conditions for Network Access Protection. For NAP support, the following conditions have been added to Network Policy Server authorization policies: System Health Validator (SHV) Templates. This condition specifies a previously configured System Health Validator (SHV) template. If the evaluation of the health settings of a connection attempt matches the template, then the connection attempt matches this condition of the policy. NAP-Capable Computers. This condition specifies whether the client is or is not NAP-capable. The following are examples of using these conditions for NAP-based authorization policies: For an authorization policy that applies only to compliant NAP-capable clients and pass all of the health requirements of the installed SHVs, specify the following condition: Set SHV Templates to the "Compliant" (example name) template, which specifies the Client passes all SHV checks option. For an authorization policy that applies only to noncompliant NAP-capable clients that fail any of the health requirements of the installed SHVs, specify the following condition: Set SHV Templates to the "Noncompliant" (example name) template, which specifies the Client fails one or more SHV checks option. For an authorization policy that applies only to NAP-ineligible clients, specify the following condition: Set NAP-capable computers to Only computers that are not NAP-capable. Authorization Policy Type for NAP. Because NAP health validation is being done for connection attempts that are also authenticated and authorized, you select the Grant access policy type. The connection attempt is authorized, but the network access of noncompliant NAP clients or NAP-ineligible clients is limited to the restricted network. You can create authorization policies that will explicitly deny access; however, these authorization policies do not need NAP settings as it is not necessary to validate the system health of a computer that is not allowed access. Authorization Policy Settings for NAP. Authorization policies in Windows Server 2008 have a set of Network Access Protection settings for NAP Enforcement, Remediation Servers, and Troubleshooting URL. Security and Policy Enforcement in Windows Server 2008 69 Implementation/Usage Scenarios One of the many benefits of using Network Access Protection is in its flexibility and support. One of the drawbacks on Network Access Quarantine Control was in its lack of support for third party software. This is not the case with NAP. Most third party software can be used with Network Access Protection as long as the third party software provides System Health Agents (SHAs) and System Health Validators (SHVs) capabilities. Some common scenarios where using NAP would prove beneficial: Checking the Health and Status of Roaming Laptops. Laptops that are not connected to the corporate network might not have the latest virus signatures files or hot fixes installed. As a consequence, the laptop may have been infected or been compromised while disconnected and presents a possible viable threat when reconnected to the corporate network. Ensuring the Health of Corporate Desktop Computers. Users of corporate desktop systems might have installed untested and possibly infected software or compromised their systems through other means. These systems should have the latest patches and virus signature files installed in response to threats from viruses and Trojans and this process should be seamless to the user while still maintaining appropriate security and controls 70 Security and Policy Enforcement in Windows Server 2008 Determining the Health of Visiting Laptops. Laptops brought in by external entities (clients, consultants or external partners) present a viable concern. These systems, even though they are authorized access, are still a threat until they meet health compliance. There is no certainty that they have been properly patched and have current anti-virus signatures. Verify the Compliance and Health of Unmanaged Home Computers. Providing remote access to users at home poses a huge threat to corporate networks. Most home users do not properly patch and protect their computers and may have numerous vulnerabilities, Trojans and malware running without their knowledge. The other challenge with allowing access from home computers is the inability to have direct physical access to these machines in order to secure them. By using NAP, administrators can restrict home users from directly accessing the network until their home systems meet approved health compliance standards. Security and Policy Enforcement in Windows Server 2008 71 Recommendations Configure Enforcement for each of the types, IPSec, 802.1X, VPN, DHCP (if applicable) Design in your network the three logical segments (secure, boundary and restricted) to facilitate IPSec support in NAP Detailed testing of NAP, Policies and restricted networks to ensure all security goals are met Use SHA wisely. Rigorously test all third-party SHAs and SHVs before deploying in a production network 72 Security and Policy Enforcement in Windows Server 2008 Summary Network Access Protection is a new initiative to limit the access of connecting computers until they are compliant with system health requirements. Network Access Protection includes client and server components. Administrators can configure IPSec Enforcement, 802.1X Enforcement, VPN Enforcement, DHCP Enforcement, or all of them, depending on their network needs. Network Access Protection provides an infrastructure and an API, which vendors and software developers can use to build their own health requirements validation and network access limitation components that are compatible with Network Access Protection Security and Policy Enforcement in Windows Server 2008 73 74 Security and Policy Enforcement in Windows Server 2008 Hands-On Lab Security and Policy Enforcement in Windows Server 2008 What Next? 75