Click here to

advertisement
Tom Neilly
System’s Administration – Final Project
12/1/2014
For my final project in System’s Administration, my original goal was to create a domain and an antivirus server with the ability remotely install the anti-virus software to domain computers and monitor
network threats. However, my project grew from there as I have added one physical machine and
several virtual machines to my domain which perform different tasks such as backup, file serving, and
Hyper-V replication.
My final project consists of several virtual machines and two physical machines. The first physical
machine I am using is a Dell PowerEdge R210 Server, the second being a Microsoft Surface Pro 2 tablet. I
will give speficic information about every different computer on my network in its own dedicated
section of the documentation. This information will include the the purpose of the machine, the
Operating System, the Ipv4 settings, any Windows features or roles installed, software installed, and
configurations that were made.
Before I get started, I’d like to display the network topology for my domain, tom.frickin.neilly. As we
move down through the different machines, this picture (which was created using Adobe Illustrator)
should help the reader keep all of the machines straight and displays how they are connected.
1
Tom Neilly
System’s Administration – Final Project
12/1/2014
Host-Server (Dell PowerEdge physical machine)
Operating system : Microsoft Server 2012 Datacenter R2
IP address : 10.10.10.11
Subnet mask : 255.255.255.0
Default gateway : 10.10.10.1
DNS : 10.10.10.1
The main function of the Dell PowerEdge server is to simply run Hyper-V manager and support all of the
virtual machines. To get started, I had to set up the Dell PowerEdge server. The very first step was to
install two 1.5 TB hard disk drives. After the HDD installation, I configured the server to use the two hard
disk drives (HDDs) in a RAID 1 configuration. To do this, I interrupted the boot process to access the BIOS
of the server and changed the HDD settings.
The second step to the initial server configuration was to install Microsoft Server 2012 R2 Datacenter.
This was not a straight forward, typical OS installation. The server itself was designed to run Microsoft
Server 2008, so to get Server 2012 installed took some research and tinkering around. While initially
trying to install Server 2012, the drivers for the HDDs were missing entirely – when choosing what disks
to install the OS onto, it was simply blank and there were no options. After installing several different
drivers from Dell’s website (http://www.dell.com/support/home/us/en/19/productsupport/servicetag/30v6fp1/drivers?s=BSD) with no luck, I did some more research. To solve this
problem, I had to go to Dell’s support website and download and burn two .ISO files to discs in order to
reset the server.
Now my host server is successfully up and running with the Microsoft Server 2012 Datacenter R2 OS and
the HDDs configured to RAID 1. Before I began installing VMs through Hyper-V manager, I first created
some External Virtual Switches in Hyper-V. These switches act like physical network cards, giving the
VMs the ability to create and be on their own internal network, which is how they will authenticate with
the Domain Controller, share files, and push MalwareBytes installations to remote clients. I created two
external virtual switches - one for my internal network (EXTERNAL 10.10.10.X) to allow connections from
DC1 to all other machines, and another (EXTERNAL INTERNET) to share internet connectivity between
the physical NIC on the Dell Poweredge and my virtual machines.
DC1 (PowerEdge VM)
Operating System : Microsoft Server 2012 Datacenter R2
IP address : 10.10.10.1
Subnet mask : 255.255.255.0
Default gateway : null
DNS server : 127.0.0.1
The first VM I installed was my Domain Controller using the same OS, Microsoft Server 2012 Datacenter
R2. The domain controller allows me to create a domain, add my host server and all VMs to my domain,
and use Active Directory to manage all of the users, computers, and group policys in my domain.
2
Tom Neilly
System’s Administration – Final Project
12/1/2014
After installing the necessary roles and features (Active Directory, DNS, and .NET framework) and setting
up my IP settings, I was ready to add computers to my domain and create user accounts, computer
accounts, group accounts, and organizational units (OUs) in Active Directory.
Creating group policy objects
*Note
After playing with the MalwareBytes console, I quickly came to the realization that in order to deploy
MalwareBytes Enterprise to clients on my domain, the computers required .NET Framework 3.5. This is
where group policy comes in handy. I was able to download a redistributable .NET Framework 3.5 .MSI
package from Microsoft here - http://www.microsoft.com/en-us/download/details.aspx?id=65 .
.NET Framework 3.5 Installation Policy
Open MMC, add the snapin “Group Policy Management”. Open it, navigate to “Forest” > “Domains” >
“tom.frickin.neilly” > “Group Policy Objects” > Right click > “New” > Name it “.NET Framework 3.5”.
Select the “.NET Framework 3.5” GPO > Right click > “Edit” > “Computer Configuration” > “Policies” >
“Software Settings” > “Software Installation” > Right click “Software Installation” > “New” > Package.
This is a part that I got hung up on for a bit. By default, when you select “New..Package”, it opens a
folder located at \\tom.frickin.neilly\SysVol\tom.frickin.neilly\scripts.
I made the mistake of navigating to the folder that I had saved my script in and tried running it from
there. After lots of frustration, I finally figured out that I had to move the .NET Framework 3.5 .MSI
package to the pre-selected folder and run it from there. After selecting the package, click “Assigned”
and the package is now created.
Close the “Group Policy Management Editor” and go back to the MMC. Under “Group Policy Objects”,
click the “.NET Framework 3.5” object. Here we can edit our Security Filtering. We want every domain
machine to have this GPO, so I added “Domain Computers” to the Security Filtering to ensure the GPO
links properly. Afterwards, I always “Enforced” the GPO.
Still under “Group Policy Management Editor”, right click “Domain Computers” > “Link an existing GPO”
> “.NET Framework 3.5” > Click “OK”.
The policy will now be applied to all computers in the Domain Computers OU, which is where all
computers on my domain will be. Since I have already installed the .NET Framework 3.5 on the Domain
Controller (DC1), there’s no need to apply this GPO to the “Domain Controllers” OU as well.
Now after joining the domain and rebooting, all machines should be equipped with the .NET Framework
3.5 that is required for the remote MalwareBytes installation.
3
Tom Neilly
System’s Administration – Final Project
12/1/2014
Enable WMI Policy
After still failing to install MalwareBytes from the MB Server, I had to change my group policy to enable
some Windows Firewall Inbound rules. This seems to be the most reliable way to install the
MalwareBytes software using the MalwareBytes Enterprise Console client push.
Under my existing GPO (.NET Framework 3.5), I navigated to > “Computer Configuration” > “Policies” >
“Windows Settings” > “Security Settings” > “Windows Firewall with Advanced Security” > “Inbound
Rules” > Right click > “New Rule” > “Predefined” > “Windows Management Instrumentation (WMI)” >
“Next” > Click all and enable them.
Now after forcing the group policy to update (from CMD, gpupdate /force), all the machines running the
.NET Framework Group Policy will be ready to have MalwareBytes installed onto it.
Windows Firewall Policy
In order to allow VMs to communicate without completely disabling the firewall, I set another group
policy to allow IP connections over the domain.
After creating a new GPO called “Firewall Rules”, I went to > “Computer Configuration” > “Policies” >
“Windows Settings” > “Security Settings” > “Windows Firewall with Advanced Security” > “Windows
Firewall with Advanced Security – LDAP” > On the right pane, click “Windows Firewall Properties” >
“Firewall state – On” > “Inbound Connections – Allow” > “Outbound Connections – Allow”
Remote Desktop Policy
I want to be able to remote desktop into all of my VM’s without going through each on and changing the
settings, so I will apply a Group Policy to do this across my entire domain. After creating a new GPO
called “Remote Desktop”, I went to > “Computer Configuration” > “Policies” > “Administrative
Templates” > “Windows Components” > “Remote Desktop Services” > “Remote Desktop Session Host” >
“Connections” > “Allow users to connect remotely by using Remote Desktop Services” > Enabled.
Infected Machines Policy
Now I want to make another group policy to help me take care of infected machines. On the
MalwareBytes Server, I created a folder called “VirusRemovalTools”, and set the sharing and security
permissions accordingly.
“Computer Configuration” > “Policies” > “Administrative Template” > “System” > “Logon” > “Run these
programs at user logon” > Right-click, “Edit” > “Enabled” > “Show” > Insert the location of the desired
script.
I wrote a batch script that creates a folder on the current user’s desktop which utilizes robocopy to copy
all of the contents from the \\MalwareBytes\VirusRemovalTools$ share to the desktop of the current
user.
4
Tom Neilly
System’s Administration – Final Project
12/1/2014
MalwareBytes-Server (PowerEdge VM)
Operating System : Microsoft Server 2012 Datacenter R2
IP address : 10.10.10.20
Subnet mask : 255.255.255.0
Default gateway : 10.10.10.1
DNS server : 10.10.10.1
The next VM I installed was the MalwareBytes-Server, also using the Microsoft Server 2012 Datacenter.
Upon installation of the OS, I moved directly to changing the system settings. I renamed the machine to
“MalwareBytes-Server”, changed the Ipv4 settings to be on the same Internal network as the Domain
Controller, and added the machine to my domain (tom.frickin.neilly).
The main purpose of this VM is to run the MalwareBytes Enterprise console which gives me the ability to
remotely deploy (and remove) the MB software, run full scans on machines, and monitor network
threats which will help keep my computers and users safe from viruses, spyware, and potentially
unwanted programs.
Installing the MalwareBytes Enterprise Console
This was a simple process. It was just a matter of running the installation wizard, entering the IP address
of the MalwareBytes server, and using the default Admin credentials to log in to the console.
After logging in and exploring the console, I created my own policy which specifies all of the settings for
the client, such as when to scan, what to scan, when to update, how to update, where to store scan logs,
and so on.
There are different ways to find computers to push the MalwareBytes software out to. One way is to do
an IP scan of all the addresses on the network. Another is to select an OU from within Active Directory.
The method I chose was to do an IP scan. The IP scan quickly found all 4 machines on my domain, (the
host server, DC1, MalwareBytes Server, and Windows 7 VM), and since they all had the necessary .NET
Framework 3.5 installed thanks to the group policy from DC1, installations went easily. The client
installations are completely silent - the client sees no progress bars, command prompts, or has to click
or agree to anything. They are completely unaware that they are in the process of becoming extremely
resistant to malware.
5
Tom Neilly
System’s Administration – Final Project
12/1/2014
Windows 7 VM (PowerEdge VM)
Operating System : Windows 7 Evaluation
IP address : 10.10.10.10
Subnet mask : 255.255.255.0
Default gateway : 10.10.10.1
DNS server : 10.10.10.1
This machine was for testing purposes of the different group policies and MalwareBytes Enterprise.
Having multiple different operating systems for testing is important to be sure that everything works on
different versions of Windows.
Microsoft Surface Pro 2 (Toms-Surface) – Physical machine
Operating System : Windows 8.1 Professional
IP address : 10.10.10.19
Subnet mask : 255.255.255.0
Default gateway : 10.10.10.1
DNS server : 10.10.10.1
The main purpose of the Microsoft Surface Pro 2 is to host another set of virtual machines, such as
Fserv, the Backup Server, and a Linux based VM for fun.
After joining my domain, I created two external virtual switches for the Surface to provide connectivity
from DC1 to the Surface itself and the virtual machines. The first virtual switch (EXTERNAL) shares
connectivity with the physical NIC of the Surface’s docking station which allows communications to DC1.
The second switch (INTERNET) shares the Wireless adapter of the Surface to provide internet
connectivity to the virtual machines.
Surface-FServ (Microsoft Surface Pro 2 VM)
Operating system : Microsoft Server 2012 Datacenter R2
IP address : 10.10.10.18
Subnet mask : 255.255.255.0
Default gateway : 10.10.10.1
DNS : 10.10.10.1
On Surface-Fserv, I put a few programs into the \\Surface-FServ\Fileshares folder that any domain users
can access and download from. Only Domain Admins can write to this folder. I did not put much in this
folder as it is just for simulation.
6
Tom Neilly
System’s Administration – Final Project
12/1/2014
Ubuntu (Microsoft Surface VM)
Operating system : Ubuntu 14.04 LTS
IP address : 10.10.10.17
Subnet mask : 255.255.255.0
Default gateway : 10.10.10.1
DNS : 10.10.10.1
https://www.youtube.com/watch?v=eRtT_C6KBJs
http://bjtechnews.org/2014/09/03/joining-ubuntu-to-windows-active-directory-notes/
The main purpose of installing a Linux VM (Ubuntu 14.04 LTS) was to see if I could successfully add it to
my Windows Domain, which I did thanks to this excellent tutorial. I am going to paste these steps from
this tutorial in case this site and video ever get taken down because they are absolutely worth keeping. I
followed along with zero problems and afterwards everything worked as it should. *Commands in red
are exactly what you paste into the terminal. These are the steps:
Adding an Ubuntu 14.04 LTS desktop to Windows Active Directory Open the terminal and paste these ‘wget’ commands in this exact order :
wget http://de.archive.ubuntu.com/ubuntu/pool/main/l/likewise-open/likewise-open_6.1.0.4060ubuntu10_amd64.deb
wget http://de.archive.ubuntu.com/ubuntu/pool/main/libg/libglade2/libglade2-0_2.6.41ubuntu3_amd64.deb
wget http://de.archive.ubuntu.com/ubuntu/pool/universe/l/likewise-open/likewise-opengui_6.1.0.406-0ubuntu10_amd64.deb
Open terminal and get root –
Sudo –s
Enter password
Unpackage the contents –
sudo dpkg -i likewise-open_6.1.0.406-0ubuntu10_amd64.deb
sudo dpkg -i libglade2-0_2.6.4-1ubuntu3_amd64.deb
sudo dpkg -i likewise-open-gui_6.1.0.406-0ubuntu10_amd64.deb
Time to access the Likewise GUI to join your Windows Active Directory
*This will bring up a GUI that allows you to join the Windows Domain.
sudo domainjoin-gui
7
Tom Neilly
System’s Administration – Final Project
12/1/2014
Domain – tom.frickin.neilly (or whatever your domain may be)
Prefix – TOMMY (the prefix for my domain)
Click ‘Join Domain’
Reboot the Ubuntu machine and log back in
Open the terminal and navigate to this directory
cd /usr/share/lightdm/lightdm.conf.d/
Sudo –s
Enter password
gedit 50-ubuntu.conf
This will open the 50-ubuntu.conf text file and allow you to make changes. In the text file, add these two
lines to the configuration –
allow-guest=false
greeter-show-manual-login=true
Click “Save”
Reboot the Ubuntu machine
After rebooting, there should be another option called “Login”. Click “Login”, and for username enter
the full domain and your domain user name (example – tom.frickin.neilly\tneilly) and your domain
username password. You should now be logged in as your Windows domain account.
*Note – you may have to log in as the local Ubuntu administrator and log back out before the “Login”
option is available. Rebooting again is not necessary.
BackupServer (Microsoft Surface VM)
Operating system : Microsoft Server 2012 Datacenter R2
IP address : 10.10.10.13
Subnet mask : 255.255.255.0
Default gateway : 10.10.10.1
DNS : 10.10.10.1
While I did create a BackupServer VM, I unfortunately did not have enough time to actually set up the
backup server. Sorry.
8
Download