Upload
ghardash
View
213
Download
0
Embed Size (px)
Citation preview
8/22/2019 cis341_week10_ch10
1/12
CIS288 Security Design in a
Windows 2003 Environment
CIS288
Securing Network Clients
8/22/2019 cis341_week10_ch10
2/12
Objectives
When you complete this lesson you will be able to:
Design a strategy for securing client computers
Design a strategy for hardening client operating systems
Design a client authentication strategy
Analyze authentication requirements
Establish account and security requirements
Design a security strategy for client remote access
Design remote access policies
Design access to internal resources
Design an authentication provider and accounting strategy forremote network access by using Internet Authentication, or IAS
8/22/2019 cis341_week10_ch10
3/12
Securing Client Computers
Securing network clients is a critical
process.
Staying abreast of any new vulnerabilities
for your client computers and patching
those vulnerabilities in a timely and
efficient manner can mean the differencebetween a well-secured network and a Code
Red infestation waiting to happen.
8/22/2019 cis341_week10_ch10
4/12
Hardening Client Operating Systems
Hardening client operating systems is a criticalfirst step in safeguarding your client operatingsystems room internal or external intrusion and
attackers. The hardening process will also ensure that all
necessary security features have been activatedand configured correctly for any administrative or
nonadministrative user accounts used to gainaccess to the client system, rather than simplyproviding easy access to an Administratoraccount.
8/22/2019 cis341_week10_ch10
5/12
Enabling Patch Management
8/22/2019 cis341_week10_ch10
6/12
Restricting User Access to Operating
System Features Windows Server 2003 makes it a relatively
simple matter to lock down operating
system features using Group Policy Objects.You can restrict access to items such as the
command prompt, the run line, and Control
Panel.
8/22/2019 cis341_week10_ch10
7/12
Designing a Client Authentication
Strategy Any network security design needs a client logon
strategy that addresses the following three topics:
Authentication Authorization
Accounting
This AAA Model is an Internet standard for
controlling various types of network access by end
users
8/22/2019 cis341_week10_ch10
8/12
Designing a Secure Remote Access
Plan When designing a network, most modern
corporations will need to include some
means of remote access for traveling andtelecommuting members of their workforce.
There are two general options that you canchoose:
Direct-Dial Remote
VPN
8/22/2019 cis341_week10_ch10
9/12
Designing Remote Access Policies
When planning your remote access policy
strategy , you can use one of the following
three approaches: Common policy
Default policy
Custom policy
8/22/2019 cis341_week10_ch10
10/12
Providing Access to Internal
Network Resources The most convenient feature of remote
access in Windows Server 2003 is that your
clients, once granted access, will usestandard tools and interfaces to connect tointernal network resources. Any servicesthat are available to a user connected via the
LAN will be made available to RAS clientsby way of the RAS authentication and logonprocesses.
8/22/2019 cis341_week10_ch10
11/12
Using Internet Authentication
Service The release of IAS included in Windows Server
2003 expands and improves the existing IAS
functionality, and includes connection options forwireless clients, as well as authenticating network
switches and the ability to relay requests to remote
RADIUS servers.
The RADIUS support provided by the IAS serviceis a popular way to administer remote user access
to an enterprise network.
8/22/2019 cis341_week10_ch10
12/12
Summary
Strategy for securing client computers
Client authentication strategy
Strategy for client remote access