+ All Categories
Home > Documents > 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

Date post: 28-Dec-2015
Category:
Upload: benedict-martin
View: 214 times
Download: 0 times
Share this document with a friend
Popular Tags:
63
70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy
Transcript
Page 1: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

70-410: Installing and Configuring Windows

Server 2012

Chapter 6Creating and Managing Group Policy

Page 2: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

Objective 6.1: Creating Group Policy Objects

Page 3: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 3

Introducing Group Policy

• Group Policy is a mechanism for controlling and deploying operating system settings to computers all over your network.

• Consists of user and computer settings for the various Microsoft Windows operating systems.

• Implemented during computer startup and shutdown and user logon and logoff.

• Configure one or more Group Policy objects (GPOs) and then use a process called linking to associate them with specific Active Directory Domain System (AD DS) objects.

• When you link a GPO to a container object, all of the objects in that container receive the settings you configured in the GPO.

Page 4: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 4

Group Policy: User Benefits

• Users can access their files, even when network connectivity is intermittent by using folder redirection and offline files.

• Users can work with a consistent computing environment, regardless of which workstation or location they use to log on.

• User files redirected to a server location can be backed up regularly, saving users from data loss due to workstation failure.

• Applications that become damaged or need to be updated can be reinstalled or maintained automatically.

Page 5: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 5

Group Policy:Administrative

Benefits• Administrators have control over centralized

configuration of user settings, application installation, and desktop configuration.

• Problems due to missing application files and other minor application errors often can be alleviated by the automation of application repairs.

• Centralized administration of user files eliminates the need and cost of trying to recover files from a damaged drive.

• The need to manually make security changes is reduced by the rapid deployment of new settings through Group Policy.

Page 6: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 6

Group Policy Objects (GPOs)

• Group Policy objects (GPOs) contain all the Group Policy settings that administrators can deploy to user and computer objects within a site, domain, or organizational unit.

• To deploy a GPO, an administrator must associate it with the container to which it is deployed (linking).

• Administrative tasks for Group Policy include:o Creating GPOso Specifying where GPOs are storedo Managing the AD DS links

Page 7: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 7

Types of GPOsThere are three types of GPOs: • Local GPOs: On the local computer only• Domain GPOs: Created in Active

Directoryo Linked to sites, domains, or OUs

• Starter GPOs: Template GPO based on a standard collection of settings

Page 8: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 8

Viewing the Group Policy Container

• The Group Policy container (GPC) directory object includes subcontainers that hold GPO policy information

• Two GPOCs, corresponding to the two default GPOs: Default Domain Policy and Default Domain Controller Policy

• Each GPC contains two subcontainers—one for machine (computer) configuration information and another for user configuration information

Page 9: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 9

Viewing Group Policy Templates

• The Group Policy Templates (GPT) is a folder structure that is located in the shared SYSVOL folder on a domain controller.

• Contains the default settings for a new GPO.

• The path to the default GPT structure for a domain is: %systemroot%\SYSVOL\sysvol\<domain name>\Policies

Page 10: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 10

Configuring a Central Store

• A Central Store is a centralized copy of the Administrative Templates (ADMX files).

• Having these files centrally stored and accessible means that they don’t have to be replicated to the SYSVOL volumes on the domain controllers.

• Prevents maintaining multiple copies of the same data.

Page 11: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 11

Using the Group Policy Management Console• The Group Policy Management

Console is the Microsoft Management Console (MMC) snap-in that administrators use to create Group Policy objects and manage their deployment to Active Directory Domain Services objects.

• The Group Policy Management Editor is a separate snap-in that opens GPOs and enables you to modify their settings.

Page 12: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 12

Using Security Filtering

• Linking a GPO to a container causes all the users and computers in that container to receive the GPO settings, by default.

• Security filtering is a technique you use to modify the default permission assignments so that only certain users and computers receive the permissions for the GPO.

Page 13: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 13

Group Policy Processing

• You can have local policies, site policies, domain policies, and OU policies within your domain structure.

• Windows systems receiving GPOs from multiple sources process them in the following order, typically referred to as LSDOU:1. Local policies2. Site policies3. Domain policies4. OU policies

Page 14: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 14

Processing Multiple GPOs

• You can link multiple GPOs to domains, sites, and OUs.

• Many administrators prefer to create individual GPOs for each system configuration task, rather than create one large GPO.

• When multiple GPOs linked to a single AD DS object, you can control the order in which systems apply the GPO settings by using the Linked Group Policy Objects tab in the Group Policy Management console.

Page 15: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 15

GPO Settings Application

• Windows systems process Computer Configuration settings when the computer starts, along with the computer startup scripts.

• The system processes the User Configuration settings and user logon scripts when a user logs on.

• User logoff scripts and computer shutdown scripts run during the shutdown process.

Page 16: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 16

Configuring Exceptions to GPO

Processing• The Enforce setting on an individual GPO link forces

a particular GPO's settings to flow down through the AD DS hierarchy, without being blocked by any child OUs.

• The Block Policy Inheritance setting on a container object such as a site, domain, or OU blocks all policies from parent containers from flowing to this container.

• Loopback Processing is a Group Policy option that provides an alternative method of obtaining the ordered list of GPOs to be processed for the user. When set to Enabled, this setting has two options: merge and replace.

Page 17: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 17

Managing Starter GPOs

• Starter GPOs are templates that you can use to create multiple GPOs with the same set of baseline Administrative Templates settings

• You create and edit starter GPOs just as you would any other Group Policy object.

Page 18: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 18

Configuring Group Policy Settings

• Group Policy settings enable you to customize the configuration of a user's desktop, environment, and security settings.

• Settings are divided into two subcategories: Computer Configuration and User Configuration.

• Subcategories are referred to as Group Policy nodes.

• A node is a parent structure that holds all related settings specific to computer configurations and user configurations.

Page 19: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 19

Configuring Group Policy Settings

Within the Computer Configuration and User Configuration nodes, the subnodes are as follows:

• Software Settings• Windows Settings• Administrative Templates

Page 20: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 20

Policy StatesTo work with Administrative Template settings, you must

understand the three different states of each policy setting:

• Not Configured: No modification to the registry from its default state occurs as a result of the policy. Not Configured is the default setting for the majority of GPO settings. When a system processes a GPO with a Not Configured setting, the registry key affected by the setting is not modified or overwritten, no matter what its current value might be.

• Enabled: The policy function is explicitly activated in the registry, whatever its previous state.

• Disabled: The policy function is explicitly deactivated in the registry, whatever its previous state.

Page 21: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 21

Creating Multiple Local GPOs

• Computers that are members of an AD DS domain benefit from a great deal of flexibility when it comes to Group Policy configuration.

• Standalone (non-AD DS) systems can achieve some of that flexibility, as long as they are running at least Windows Vista or Windows Server 2008 R2. These operating systems enable administrators to create multiple local GPOs that provide different settings for users, based on their identities.

Page 22: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 22

Creating Multiple Local GPOs

Windows systems supporting multiple local GPOs have three layers of Group Policy support:

• Local Group Policy: Consists of both Computer and User settings and applies to all system users, administrative or not. This is the only local GPO that includes computer settings, so to apply Computer Configuration policies, you must use this GPO.

• Administrators and Non-administrators Group Policy: Consists of two GPOs, one of which applies to members of the local Administrators group and one that applies to all users that are not members of the local Administrators group.

• User-specific Group Policy: Consists of GPOs that apply to specific local user accounts created on the computer. These GPOs can apply to individual users only, not to local groups.

Page 23: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

Objective 6.2: Configuring Security

Policies

Page 24: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 24

Configuring Security Policies Using Group

Policy• One of the primary aims of Group Policy is to

provide centralized management of security settings for users and computers.

• Most of the settings that pertain to security are found in the Windows Settings folder within the Computer Configuration node of a Group Policy object (GPO).

• You can use security settings to govern how users are authenticated to the network, the resources they are permitted to use, group membership policies, and events related to user and group actions recorded in the event logs.

Page 25: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 25

Defining Local Policies• Local Policies enable administrators to set

user privileges on the local computer to govern what users can do on the computer and determine if the system should track them in an event log.

• Auditing is tracking events that take place on the local computer.

• The Local Policies node of a GPO has three subordinate nodes: User Rights Assignment, Security Options, and Audit Policy.

Page 26: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 26

Planning and Configuring an Audit

Policy• The Audit Policy section of a GPO enables

administrators to log successful and failed security events, such as logon events, account access, and object access.

• You can use auditing to track both user activities and system activities.

• Planning to audit requires that you determine the computers to be audited and the types of events you wish to track.

Page 27: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 27

Planning and Configuring an Audit

PolicyThe following guidelines can help you to

plan your audit policy:• Audit only pertinent items. • Archive security logs to provide a

documented history. • Configure the size of your security logs

carefully.

Page 28: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 28

Event Categories• System events• Policy change events• Account management events• Logon events• Account logon events

Page 29: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 29

Restricted Groups• The Restricted Groups policy setting

enables an administrator to specify group membership lists.

• You can control membership in important groups, such as the local Administrators and Backup Operators groups.

• Only those users who are part of the Restricted Group membership list within the policy setting will be added to the group.

Page 30: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 30

Security Templates• A security template is a collection of

configuration settings stored as a text file with an .inf extension.

• Can contain many of the same security parameters as group policy objects.

• Parameters are presented in a unified interface, enabling you to save your configurations as files and simplify the process of deploying them.

Page 31: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 31

Security Template Planning

By creating templates for specific roles, administrators can apply them to multiple computers, using combinations in cases where computers perform multiple roles.

Page 32: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 32

Working with Security Template Settings

• Security templates have more settings than Local Computer Policy, because a template includes options for both standalone computers and computers that are participating in a domain.

• Security templates also provide a means for configuring the permissions associated with files, folders, registry entries, and services.

Page 33: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 33

Maintaining and Optimizing Group

PolicyThese are the default refresh periods for the

various types of Group Policy settings:• Set Group Policy Refresh Interval for

Computers• Set Group Policy Refresh Interval for

Domain Controllers• Set Group Policy Refresh Interval for Users

Page 34: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 34

Manually Refreshing Group Policy

When you modify Group Policy settings that you wish to be immediately invoked without requiring a restart, a new logon session, or waiting for the next refresh period, you can force a manual refresh by using the Gpupdate.exe tool:

Gpupdate/target:userGpupdate/target:computer

Page 35: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 35

Optimizing Group Policy Processing

When you create a GPO that contains computer or user settings, but not both, you can disable the setting area that is not configured for faster processing.

Page 36: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 36

Configuring Local Users and Groups

Windows Server 2012 provides two separate interfaces for creating and managing local user accounts:

• User Accounts control panel • Local Users and Groups snap-in for MMC Both interfaces provide access to the same

Security Account Manager (SAM) where the user and group information is stored, so any changes you make using one interface will appear in the other.

Page 37: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 37

Configuring User Account Control

• User Account Control (UAC) is the mechanism that prevents users from accessing the system using administrative privileges unless those privileges are required to perform the task at hand.

• Administrators should only log on to a server using an account with administrative access when performing administrative tasks; however, it is often inconvenient to switch back and forth between an administrative account and standard user account.

Page 38: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 38

Performing Administrative Tasks

• When a user logs on to Windows Server 2012, the system issues a token, which indicates the user’s access level.

• Whenever the system authorizes the user to perform a particular activity, it consults the token to see if the user has the required privileges.

• On a computer running Windows Server 2012 with User Account Control, a standard user still receives a standard user token, but an administrative user receives two tokens: one for standard user access and one for administrative user access.

• By default, the standard and administrative users both run using the standard user token most of the time.

Page 39: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 39

Secure Desktop• The secure desktop is an alternative to the

interactive user desktop that Windows normally displays.

• When an elevation or credential prompt is generated, the system switches to the secure desktop, suppressing the operation of all other desktop controls and permitting only Windows processes to interact with the prompt.

• The object of this is to prevent malware from automating a response to the elevation or credential prompt and bypassing the human reply.

Page 40: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

Objective 6.3: Configuring Application

Restriction Policies

Page 41: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 41

Installing Software with Group Policy

• Administrators can use Group Policy to install, upgrade, patch, or remove software applications:o When a computer starts,o When a user logs on to the networko When a user accesses a file associated with an

application that is not currently on the user's computer

• Administrators can use Group Policy to fix problems associated with applications by launching a repair process that will fix the application.

Page 42: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 42

Windows Installer• Windows Server 2012 uses the Windows

Installer with Group Policy to install and manage software that is packaged into Microsoft Installer files, with an .msi extension

• The client-side component is called the Windows Installer Service:o Responsible for automating the installation and

configuration of the designated software

• Server-side component

Page 43: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 43

Windows Installer Service Package File

The package file consists of the following information:• An .msi file, which is a relational database file that is

copied to the target computer system, with the program files it deploys. In addition to providing installation information, this database file assists in the self-healing process for damaged applications and clean application removal.

• External source files that are required for software installation or removal.

• Summary information about the software and the package.

• A reference point to the path where the installation files are located.

Page 44: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 44

Repackaging SoftwareSeveral third-party package-creation

applications on the market enable you to repackage software products into a Windows Installer-enabled format.

The process of repackaging software for .msi distribution consists of the following steps:1. Take a snapshot of a clean computer system.2. Install and configure the application as desired.3. Take a snapshot of the computer after the

application is installed.

Page 45: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 45

Deploying Software Using Group Policy

• Before deploying software using Group Policy, you must create a distribution share—a network location from which users can download the software that they need.

• Create a GPO or modify an existing GPO to include the software installation settings, plus one of two options:o Assign option: Helpful when you are deploying

required applications to pertinent users and computers.

o Publish option: Enables users to install the applications that they consider useful to them.

Page 46: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 46

Configuring Software Restriction Policies

• Software restriction policies are designed to identify software and control its execution.

• Provides organizations greater control in preventing potentially dangerous applications from running.

• You can control who is affected by the policies.

Page 47: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 47

Enforcing Restrictions• If a policy does not enforce restrictions,

executable files run based on the permissions that users or groups have in the NTFS file system.

• You can use three basic strategies for enforcing restrictions:o Unrestricted: Enables all applications to run, except

those that are specifically excluded.o Disallowed: Prevents all applications from running

except those that are specifically allowed.o Basic User: Prevents any application from running that

requires administrative rights, but enables programs to run that only require resources that are accessible by normal users.

Page 48: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 48

Configuring Software Restriction Rules

• There are four types of software restriction rules to specify which programs can or cannot run on your network:o Hash ruleso Certificate ruleso Path ruleso Network zone rules

• You can use multiple rules and they are applied in the order listed above.

Page 49: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 49

Configuring Software Restriction Properties• Within the Software Restriction Policies

folder, you can configure three specific properties to provide additional settings that apply to all policies when implemented.

• These three properties are:o Enforcemento Designated file typeso Trusted publishers

Page 50: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 50

Software Restriction Best Practices

• Software restriction policies should be used with standard access control permissions.

• The Disallowed Default Security Level should be used cautiously, because all applications are restricted unless explicitly allowed.

• If you accidentally create policies that cause undesirable restrictions on a workstation, reboot the computer in Safe Mode to troubleshoot and make changes, because software restriction policies cannot be applied in Safe Mode.

• When editing software restriction policies, you should disable them first so that a partially complete policy does not cause undesirable results on a computer.

• Creating a separate GPO for software restriction policies enables you to disable or remove them without affecting other policy settings.

• Test all policies before deploying them to the users.

Page 51: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 51

AppLocker• AppLocker, also known as application

control policies, is a Windows feature that is an updated version of the concept implemented in software restriction policies.

• Uses rules, which you must manage, using a wizard-based interface.

• More flexible than software restriction policies

Page 52: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 52

Creating Rules Manually

• You can also create rules manually, by using a wizard-based interface.

• The wizard prompts you for the following:o Action: Specifies whether you want to allow or deny the user

or group access to the resource. In AppLocker, explicit deny rules always override allow rules.

o User or group: Specifies the name of the user or group to which the policy should apply.

o Conditions: Specifies whether you want to create a publisher, path, or file hash rule. The wizard generates an additional page for whichever option you select, enabling you to configure its parameters.

o Exceptions: Enables you to specify exceptions to the rule you create, using any of the three conditions: publisher, path, or file hash.

Page 53: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

Objective 6.4: Configuring Windows

Firewall

Page 54: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 54

Building a Firewall• A firewall is a software program that

protects a computer or a network by allowing certain types of network traffic in and out of the system while blocking others.

• A firewall is essentially a series of filters that examine the contents of packets and the traffic patterns to and from the network to determine which packets they should allow to pass through the filter.

Page 55: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 55

Firewalls Protect Against:

• Network scanner applications that probe systems for unguarded ports, which are essentially unlocked doors that attackers can use to gain access to the system.

• Trojan horse applications that open a connection to a computer on the Internet, enabling an attacker on the outside to run programs or store data on the system.

• Attackers that obtain passwords by illicit means, such as social engineering, and then use remote access technologies to log on to a computer from another location and compromise its data and programming.

• Denial of service attacks that use authorized access points to bombard a system with traffic, preventing legitimate traffic from reaching the computer.

Page 56: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 56

Firewall SettingsThe three most important criteria that firewalls can use in

their rules are:• IP addresses: Identify specific hosts on the network. You

can use IP addresses to configure a firewall to allow only traffic from specific computers or networks in and out.

• Protocol numbers: Specify whether the packet contains TCP or UDP (User Datagram Protocol) traffic. You can filter protocol numbers to block packets containing certain types of traffic.

• Port numbers: Identify specific applications running on the computer. The most common firewall rules use port numbers to specify the types of application traffic the computer is allowed to send and receive.

Page 57: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 57

Firewall SettingsFirewall rules can function in two ways:• Admit all traffic, except that which

conforms to the applied rules• Block all traffic, except that which

conforms to the applied rules

Page 58: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 58

Working with Windows Firewall

• The Windows Firewall control panel provides a simplified interface that enables you to avoid the details of rules and port numbers.

• For full access to firewall rules and more sophisticated functions, you must use the Windows Firewall with Advanced Security console.

• Many of the roles and features included in Windows Server 2012 automatically open the appropriate firewall ports when you install them.

• The system warns you of firewall issues.

Page 59: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 59

Configuring Profile Settings

• The default Windows Firewall configuration calls for the same basic settings for all three profiles: o The firewall is turned on.o Incoming traffic is blocked unless it matches a

rule.o Outgoing traffic is allowed unless it matches a

rule.

Page 60: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 60

Importing and Exporting Rules

• The process of creating and modifying rules in the Windows Firewall with Advanced Security console can be time consuming.

• The console makes it possible for you to save the rules and settings you create by exporting them to a policy file.

• A policy file is a file with a .wfw extension that contains all the property settings in a Windows Firewall installation, as well as all of its rules, including the preconfigured rules and the ones you created or modified.

Page 61: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 61

Creating Rules Using Group Policy

• Windows Firewall is an application designed to protect a single computer from intrusion

• Administrators can distribute firewall settings to computers throughout the network by using Group Policy.

Page 62: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 62

Using Filters• The filter feature enables you to display

inbound or outbound rules according to:o The profile they apply too Their current stateo The group to which they belong

Page 63: 70-410: Installing and Configuring Windows Server 2012 Chapter 6 Creating and Managing Group Policy.

© 2013 John Wiley & Sons, Inc. 63

Creating Connection Security Rules

• The IP Security (IPsec) standards are a collection of documents that define a method for securing data while it is in transit over a TCP/IP network.

• IPsec includes a connection establishment routine, during which computers authenticate each other before transmitting data, and a technique called tunneling, in which data packets are encapsulated within other packets, for their protection.

• Windows Server 2012 also includes a feature that incorporates IPsec data protection into the Windows Firewall.


Recommended