SlideShare a Scribd company logo
Understanding the Five Layers of
     SharePoint Security

          Michael Noel
         @MichaelTNoel
Michael Noel
•   Author of SAMS Publishing titles “SharePoint 2007 Unleashed,” the upcoming
    “SharePoint 2010 Unleashed,” “SharePoint 2003 Unleashed”, “Teach Yourself
    SharePoint 2003 in 10 Minutes,” “Windows Server 2008 R2 Unleashed,” “Exchange
    Server 2010 Unleashed”, “ISA Server 2006 Unleashed”, and many other titles .
•   Partner at Convergent Computing (www.cco.com / +1(510)444-5700) – San
    Francisco, U.S.A. based Infrastructure/Security specialists for SharePoint, AD,
    Exchange, Security
SharePoint Security
              Layers of Security in a SharePoint Environment
•   1: Infrastructure Security
     –   Physical Security
     –   Best Practice Service Account Setup
     –   Kerberos Authentication
•   2: Data Security
     –   Role Based Access Control (RBAC)
     –   Transparent Data Encryption (TDE) of SQL Databases
     –   Antivirus
•   3: Transport Security
     –   Secure Sockets Layer (SSL) from Client to Server
     –   IPSec from Server to Server
•   4: Edge Security
     –   Inbound Internet Security (Forefront UAG/TMG)
•   5: Rights Management
Infrastructure Security

       Layer
Layer 1: Infrastructure Security
                               Sample List of Service Accounts
Service Account Name          Role of Service Account                       Special Permissions
COMPANYABCSRV-SP-Setup       SharePoint Installation Account               Local Admin on all SP Servers (for installs)

COMPANYABCSRV-SP-SQL         SQL Service Account(s) – Should be separate   Local Admin on Database Server(s)
                              admin accounts from SP accounts.              (Generally, some exceptions apply)

COMPANYABCSRV-SP-Farm        SharePoint Farm Account(s) – Can also be      N/A
                              standard admin accounts. RBAC principles
                              apply ideally.
COMPANYABCSRV-SP-Search      Search Account                                N/A
COMPANYABCSRV-SP-Content     Default Content Access Account                Read rights to any external data sources
                                                                            to be crawled
COMPANYABCSRV-SP-Prof        Default Profiles Access Account               Member of Domain Users (to be able to
                                                                            read attributes from users in domain) and
                                                                            ‘Replicate Directory Changes’ rights in AD.
COMPANYABCSRV-SP-AP-SPCA Application Pool Identity account for             DBCreator and Security Admin on SQL.
                          SharePoint Central Admin.                         Create and Modify contacts rights in OU
                                                                            used for mail.
COMPANYABCSRV-SP-AP-Data     Application Pool Identity account for the     N/A
                              Content related App Pool (Portal, MySites,
                              etc.) Additional as needed for security.
Layer 1: Infrastructure Security
                       Enable Kerberos

• When creating any Web Applications in Classic-mode, USE
  KERBEROS. It is much more secure and also faster with heavy
  loads as the SP server doesn’t have to keep asking for auth
  requests from AD.
• Kerberos auth does require extra steps, which makes people
  shy away from it, but once configured, it improves security
  considerably and can improve performance on high-load sites.
• Should also be configured on SPCA Site! (Best Practice =
  Configure SPCA for NLB, SSL, and Kerberos (i.e.
  https://spca.companyabc.com)
Layer 1: Infrastructure Security
      Kerberos Step 1: Create the Service Principal Names
• Use the setspn utility to create Service Principle Names in
  AD, the following syntax for example:
   – Setspn.exe -A HTTP/mysite.companyabc.com
     DOMAINNAMEMYSiteAppAccount
   – Setspn.exe -A HTTP/mysite DOMAINNAMEMYSITEAppAccount
   – Setspn.exe -A HTTP/home.companyabc.com
     DOMAINNAMEHOMEAppAccount
   – Setspn.exe -A HTTP/sp DOMAINNAMEHOMEAppAccount
Layer 1: Infrastructure Security
      Kerberos Step 2: Enable Kerberos between SP and SQL
• Use setspn to create SPNs for SQL Service Account
• SPNs need to match the name that SharePoint uses to
  connect to SQL (Ideally SQL Alias, more on this later)
• Syntax similar to following:
   – Setspn.exe -A MSSQLSvc/spsql:1433 COMPANYABCSRV-SQL-DB
   – Setspn.exe –A MSSQLSvc/spsql.companyabc.com:1433
     COMPANYABCSRV-SQL-DB
• MSSQLSvc = Default instance, if named instance, specify the name
  instead
• In this example, SRV-SQL-DB is the SQL Admin account
Layer 1: Infrastructure Security
       Kerberos Step 3: Allow Accounts to Delegate (Optional)
• Required only for Excel
  Services and other
  impersonation applications.
• On all SP Computer accounts
  and on the Application
  Identity accounts, check the
  box in ADUC to allow for
  delegation.
   – In ADUC, navigate to the
     computer or user account,
     right-click and choose
     Properties.
   – Go to the Delegation tab
   – Choose Trust this
     user/computer for delegation
     to any service (Kerberos)
Layer 1: Infrastructure Security
        Kerberos Step 4: Enable Kerberos on Web Application

• Go to Application Management – Authentication Providers
• Choose the appropriate Web Application
• Click on the link for ‘Default’ under Zone
• Change to Integrated Windows Authentication - Kerberos
  (Negotiate)
• Run iisreset /noforce from the command prompt
• If creating Web App from scratch, this step may be unnecessary
  if you choose Negotiate from the beginning
DATA SECURITY

     Layer
Layer 2: Data Security
                 Role Based Access Control (RBAC)

• Role Groups defined within Active Directory (Universal
  Groups) – i.e. ‘Marketing,’ ‘Sales,’ ‘IT,’ etc.
• Role Groups added directly into SharePoint ‘Access Groups’
  such as ‘Contributors,’ ‘Authors,’ etc.
• Simply by adding a user account into the associated Role
  Group, they gain access to whatever rights their role
  requires.

         User1

                         Role                       SharePoint
                        Group                         Group

         User2
Layer 2: Data Security
          SQL Transparent Data Encryption (TDE)

• SQL Server 2008 and 2008 R2 Enterprise
  Edition Feature
• Encrypts SQL Databases Transparently,
  SharePoint is unaware of the encryption and
  does not need a key
• Encrypts the backups of the database as well
Layer 2: Data Security
               TDE vs. Cell Level Encryption

• Available with either SQL 2005 or SQL 2008
• Encrypts individual cells in a database
• Requires a password to access the cell
• Requires that columns be changed from their
  original data type to varbinary
• Advantage is that only specific info is encrypted
• Disadvantage is that you cannot use this for
  SharePoint Databases
Layer 2: Data Security
              TDE vs. File Level Encryption

• Two forms, older Encrypting File System (EFS)
  and Bitlocker
• EFS encrypts data at the File Level
• Bitlocker encrypts data at the Volume Level
• Bitlocker Encrypts every file on the disk, not
  just database files
• Could be used together with TDE
Layer 2: Data Security
      SQL Transparent Data Encryption (TDE) Limitations

• Does not encrypt the Communication Channel (IPSec
  can be added)
• Does not protect data in memory (DBAs could access)
• Cannot take advantage of SQL 2008 Backup
  Compression
• TempDB is encrypted for the entire instance, even if
  only one DB is enabled for TDE, which can have a
  performance effect for other DBs
• Replication or FILESTREAM data is not encrypted when
  TDE is enabled (i.e. RBS BLOBs not encrypted)
Key Windows OS Level Hierarchy
    and Cert             Data Protection API (DPAPI)
                                   DPAPI Encrypts SMK


     SQL Instance Level           Service Master Key
                          SMK encrypts the DMK for master DB


      master DB Level             Database Master Key
                             DMK creates Cert in master DB


      master DB Level                Certificate
                          Certificate Encrypts DEK in Content DB


      Content DB Level            Database Encryption Key
                             DEK used to encrypt Content DB
Layer 2: Data Security
   SQL TDE Step 1: Creating the Database Master Key (DMK)

• Symmetric key used to protect private keys and
  asymmetric keys
• Protected itself by Service Master Key (SMK),
  which is created by SQL Server setup
• Use syntax as follows:
  – USE master;
  – GO
  – CREATE MASTER KEY ENCRYPTION BY PASSWORD =
    'CrypticTDEpw4CompanyABC';
  – GO
Layer 2: Data Security
        SQL TDE Step 2: Creating the TDE Certificate

• Protected by the DMK
• Used to protect the database encryption key
• Use syntax as follows:
  USE master;
  GO
  CREATE CERTIFICATE CompanyABCtdeCert WITH
  SUBJECT = 'CompanyABC TDE Certificate' ;
  GO
Layer 2: Data Security
              SQL TDE Step 3: Backup the Master Key

• Without a backup, data can be lost
• Backup creates two files, the Cert backup and the Private Key File
• Use following syntax:
    USE master;
    GO
    BACKUP CERTIFICATE CompanyABCtdeCert TO FILE =
    'c:BackupCompanyABCtdeCERT.cer'
    WITH PRIVATE KEY (
    FILE = 'c:BackupCompanyABCtdeDECert.pvk',
    ENCRYPTION BY PASSWORD = 'CrypticTDEpw4CompanyABC!' );
    GO
Layer 2: Data Security
      SQL TDE Step 4: Creating the Database Encryption Key (DEK)

•   DEK is used to encrypt specific database
•   One created for each database
•   Encryption method can be chosen for each DEK
•   Use following syntax:
    USE SharePointContentDB;
    GO
    CREATE DATABASE ENCRYPTION KEY
    WITH ALGORITHM = AES_256
    ENCRYPTION BY SERVER CERTIFICATE CompanyABCtdeCert
    GO
Layer 2: Data Security
        SQL TDE Step 5: Enable TDE on the Database(s)

• Data encryption will begin after running
  command
• Size of DB will determine time it will take, can be
  lengthy and could cause user blocking
• Use following syntax:
   USE SharePointContentDB
   GO
   ALTER DATABASE SharePointContentDB
   SET ENCRYPTION ON
   GO
Layer 2: Data Security
       SQL TDE Step 6: Monitor the TDE Encryption Progress

•   State is Returned
•   State of 2 = Encryption Begun
•   State of 3 = Encryption Complete
•   Use following syntax:
    USE SharePointContentDB
    GO
    SELECT *
    FROM sys.dm_database_encryption_keys
    WHERE encryption_state = 3;
    GO
Layer 2: Data Security
       SQL TDE: Restoring a TDE Database to Another Server
• Step 1: Create new Master Key on Target Server (Does not need to match
  source master key)
• Step 2: Backup Cert and Private Key from Source
• Step 3: Restore Cert and Private Key onto Target (No need to export the
  DEK as it is part of the backup)
    USE master;
    GO
    CREATE CERTIFICATE CompanyABCtdeCert
    FROM FILE = 'C:RestoreCompanyABCtdeCert.cer'
    WITH PRIVATE KEY (
    FILE = 'C:RestoreCompanyABCtdeCert.pvk'
    , DECRYPTION BY PASSWORD = 'CrypticTDEpw4CompanyABC!'
    )
• Step 4: Restore DB
Layer 2: Data Security
     SharePoint Antivirus
SPTechCon SFO 2012 - Understanding the Five Layers of SharePoint Security
Layer 2: Data Security
                SharePoint Antivirus VSAPI

• Realtime scanning only uses the VSAPI
• Realtime Scan Settings are Administered
  through the SharePoint Central Admin Tool
  – Realtime Options are grayed out in the ForeFront
    Admin Console
Layer 2: Data Security
        SharePoint Antivirus: FPS Keyword and File Filtering

• Look for specific
  keywords (sensitive
  company info,
  profanity, etc.)
   – Block
   – Simply detect and
     notify
• Create Filter List
   – Add Keywords, either
     manually or bulk as
     lines in a text file
Layer 2: Data Security
               SharePoint Antivirus: FPS Profanity Filters
• New Profanity lists in 11 languages
  available in SP2
    – (Run KeywordInstaller.msi to install)
    – Import the lists into FF from Program
      FilesMicrosoft Forefront
      SecuritySharePointDataExample
      Keywords
SPTechCon SFO 2012 - Understanding the Five Layers of SharePoint Security
TRANSPORT SECURITY

      Layer
Layer 3: Transport Security
  Client to Server: Using Secure Sockets Layer (SSL) Encryption


• External or Internal Certs highly
  recommended
• Protects Transport of content
• 20% overhead on Web Servers
• Can be offloaded via SSL offloaders if
  needed
• Don’t forget for SPCA as well!
Layer 3: Transport Security
       Server to Server: Using IPSec to encrypt traffic


• By default, traffic between SharePoint
  Servers (i.e. Web and SQL) is unencrypted
• IPSec encrypts all packets sent between
  servers in a farm
• For very high security scenarios when all
  possible data breaches must be addressed
EDGE SECURITY

      Layer
Layer 4: Edge Security
Forefront Unified Access Gateway (UAG) 2010
Layer 4: Edge Security
                          UAG Comparison with Forefront TMG

Capability                                                                      TMG 2010   UAG
                                                                                           2010
Publish Web applications using HTTPS                                            X          X
Publish internal mobile applications to roaming mobile devices                  X          X
Layer 3 firewall                                                                X          X*
Outbound scenarios support                                                      X          X*
Array support                                                                   X
Globalization and administration console localization                           X
Wizards and predefined settings to publish SharePoint sites and Exchange        X          X
Wizards and predefined settings to publish various applications                            X
Active Directory Federation Services (ADFS) support                                        X
Rich authentication (for example, one-time password, forms-based, smart card)   X          X

Application protection (Web application firewall)                               Basic      Full
Endpoint health detection                                                                  X
Information leakage prevention                                                             X
Granular access policy                                                                     X
Unified Portal                                                                             X
RIGHTS MANAGEMENT

     Layer
Layer 5: Rights Management
     Active Directory Rights Management Services (AD RMS)

• AD RMS is a form of Digital Rights Management (DRM)
  technology, used in various forms to protect content
• Used to restrict activities on files AFTER they have
  been accessed:
   – Cut/Paste
   – Print
   – Save As…
• Directly integrates with SharePoint DocLibs
Layer 5: Rights Management
                            How AD RMS Works
1.   On first use, authors
     receive client licensor
     certificate from RMS server
2.   Author creates content and
     assigns rights
3.   File is distributed to
     recipient(s)
4.   Recipient opens file, and
     their RMS client contacts
     server for user validation
     and to obtain a license
5.   Application opens the file
     and enforces the
     restrictions
Layer 5: Rights Management
            Installing AD RMS – Key Storage




• Select Cluster Key Storage
• CSP used for advanced scenarios
Layer 5: Rights Management
 Installing AD RMS – Creating the Cluster Name
Layer 5: Rights Management
Installing AD RMS – Using an SSL Cert for Transport Encryption
Layer 5: Rights Management
                    Allowing SharePoint to use AD RMS
•   By default, RMS server is configured to
    only allow the local system account of the
    RMS server or the Web Application
    Identity accounts to access the certificate
    pipeline directly
•   SharePoint web servers and/or Web
    Application Service Accounts need to be
    added to this security list
•   Add the RMS Service Group, the machine
    account(s) of the SharePoint Server and
    the Web App Identity accountswith Read
    and Excecute permissions to the
    ServerCertification.asmx file in the
    %systemroot%inetpubwwwroot_wmcs
    Certification folder on the RMS server
Layer 5: Rights Management
           Client Accessing AD RMS Documents

• RMS-enabled client, when accessing
  document in doclib, will access RMS server to
  validate credentials
Layer 5: Rights Management
           Client Accessing AD RMS Documents

• Effective
  permissions can be
  viewed from the
  document
• The RMS client will
  enforce the
  restrictions
Session Summary
• Determine Security Risk for your SharePoint
  Environment
• Identify any Regulatory Compliance Requirements for
  SharePoint
• Determine which aspects of SharePoint need to be
  secured, touching on all five layers of SharePoint
  Security
Your Feedback is Important
Please fill out a session evaluation form drop it
     off at the conference registration desk.

                  Thank you!
Michael Noel
        Twitter: @MichaelTNoel
               www.cco.com
   Slides: slideshare.net/michaeltnoel
Travel blog: http://sharingtheglobe.com

More Related Content

What's hot (20)

SharePoint 2010 High Availability and Disaster Recovery - SharePoint Connecti...
SharePoint 2010 High Availability and Disaster Recovery - SharePoint Connecti...SharePoint 2010 High Availability and Disaster Recovery - SharePoint Connecti...
SharePoint 2010 High Availability and Disaster Recovery - SharePoint Connecti...
Michael Noel
 
Weblogic 11g admin basic with screencast
Weblogic 11g admin basic with screencastWeblogic 11g admin basic with screencast
Weblogic 11g admin basic with screencast
Rajiv Gupta
 
New File Server Features Of Windows Server 2008
New File Server Features Of Windows Server 2008New File Server Features Of Windows Server 2008
New File Server Features Of Windows Server 2008
Microsoft TechNet
 
12.2 secure configureconsole_adop_changes_aioug_appsdba_nov17
12.2 secure configureconsole_adop_changes_aioug_appsdba_nov1712.2 secure configureconsole_adop_changes_aioug_appsdba_nov17
12.2 secure configureconsole_adop_changes_aioug_appsdba_nov17
pasalapudi
 
SharePoint 2010 High Availability - TechEd Brasil 2010
SharePoint 2010 High Availability - TechEd Brasil 2010SharePoint 2010 High Availability - TechEd Brasil 2010
SharePoint 2010 High Availability - TechEd Brasil 2010
Michael Noel
 
Spring 2007 SharePoint Connections Oleson Advanced Administration and Plannin...
Spring 2007 SharePoint Connections Oleson Advanced Administration and Plannin...Spring 2007 SharePoint Connections Oleson Advanced Administration and Plannin...
Spring 2007 SharePoint Connections Oleson Advanced Administration and Plannin...
Joel Oleson
 
Multiple ldap implementation with ebs using oid
Multiple ldap implementation with ebs using oidMultiple ldap implementation with ebs using oid
Multiple ldap implementation with ebs using oid
pasalapudi
 
Obia with odi
Obia with odiObia with odi
Obia with odi
onlinetrainingplacements
 
Online patching ebs122_aioug_appsdba_nov2017
Online patching ebs122_aioug_appsdba_nov2017Online patching ebs122_aioug_appsdba_nov2017
Online patching ebs122_aioug_appsdba_nov2017
pasalapudi
 
Weblogic server administration
Weblogic server administrationWeblogic server administration
Weblogic server administration
bispsolutions
 
Learn Oracle WebLogic Server 12c Administration
Learn Oracle WebLogic Server 12c AdministrationLearn Oracle WebLogic Server 12c Administration
Learn Oracle WebLogic Server 12c Administration
Revelation Technologies
 
Writing simple web services in java using eclipse editor
Writing simple web services in java using eclipse editorWriting simple web services in java using eclipse editor
Writing simple web services in java using eclipse editor
Santosh Kumar Kar
 
MCITP
MCITPMCITP
MCITP
Naqib Khan
 
Directory Synchronization Single Sign-On in Office 365
Directory Synchronization Single Sign-On in Office 365Directory Synchronization Single Sign-On in Office 365
Directory Synchronization Single Sign-On in Office 365
InnoTech
 
Architecture and tools
Architecture and toolsArchitecture and tools
Architecture and tools
sanjay_jha
 
weblogic training | oracle weblogic online training | weblogic server course
weblogic training | oracle weblogic online training | weblogic server courseweblogic training | oracle weblogic online training | weblogic server course
weblogic training | oracle weblogic online training | weblogic server course
Nancy Thomas
 
Dinesh Wp Siebel Crm To Fusion Crm
Dinesh Wp  Siebel Crm To Fusion CrmDinesh Wp  Siebel Crm To Fusion Crm
Dinesh Wp Siebel Crm To Fusion Crm
Dr.Dinesh Chandrasekar PhD(hc)
 
Ebs 12.2 con9021_pdf_9021_0001
Ebs 12.2 con9021_pdf_9021_0001Ebs 12.2 con9021_pdf_9021_0001
Ebs 12.2 con9021_pdf_9021_0001
jucaab
 
DAC
DACDAC
DAC
Ram Reddy
 
Mcitp course details
Mcitp course detailsMcitp course details
Mcitp course details
cisco training
 
SharePoint 2010 High Availability and Disaster Recovery - SharePoint Connecti...
SharePoint 2010 High Availability and Disaster Recovery - SharePoint Connecti...SharePoint 2010 High Availability and Disaster Recovery - SharePoint Connecti...
SharePoint 2010 High Availability and Disaster Recovery - SharePoint Connecti...
Michael Noel
 
Weblogic 11g admin basic with screencast
Weblogic 11g admin basic with screencastWeblogic 11g admin basic with screencast
Weblogic 11g admin basic with screencast
Rajiv Gupta
 
New File Server Features Of Windows Server 2008
New File Server Features Of Windows Server 2008New File Server Features Of Windows Server 2008
New File Server Features Of Windows Server 2008
Microsoft TechNet
 
12.2 secure configureconsole_adop_changes_aioug_appsdba_nov17
12.2 secure configureconsole_adop_changes_aioug_appsdba_nov1712.2 secure configureconsole_adop_changes_aioug_appsdba_nov17
12.2 secure configureconsole_adop_changes_aioug_appsdba_nov17
pasalapudi
 
SharePoint 2010 High Availability - TechEd Brasil 2010
SharePoint 2010 High Availability - TechEd Brasil 2010SharePoint 2010 High Availability - TechEd Brasil 2010
SharePoint 2010 High Availability - TechEd Brasil 2010
Michael Noel
 
Spring 2007 SharePoint Connections Oleson Advanced Administration and Plannin...
Spring 2007 SharePoint Connections Oleson Advanced Administration and Plannin...Spring 2007 SharePoint Connections Oleson Advanced Administration and Plannin...
Spring 2007 SharePoint Connections Oleson Advanced Administration and Plannin...
Joel Oleson
 
Multiple ldap implementation with ebs using oid
Multiple ldap implementation with ebs using oidMultiple ldap implementation with ebs using oid
Multiple ldap implementation with ebs using oid
pasalapudi
 
Online patching ebs122_aioug_appsdba_nov2017
Online patching ebs122_aioug_appsdba_nov2017Online patching ebs122_aioug_appsdba_nov2017
Online patching ebs122_aioug_appsdba_nov2017
pasalapudi
 
Weblogic server administration
Weblogic server administrationWeblogic server administration
Weblogic server administration
bispsolutions
 
Learn Oracle WebLogic Server 12c Administration
Learn Oracle WebLogic Server 12c AdministrationLearn Oracle WebLogic Server 12c Administration
Learn Oracle WebLogic Server 12c Administration
Revelation Technologies
 
Writing simple web services in java using eclipse editor
Writing simple web services in java using eclipse editorWriting simple web services in java using eclipse editor
Writing simple web services in java using eclipse editor
Santosh Kumar Kar
 
Directory Synchronization Single Sign-On in Office 365
Directory Synchronization Single Sign-On in Office 365Directory Synchronization Single Sign-On in Office 365
Directory Synchronization Single Sign-On in Office 365
InnoTech
 
Architecture and tools
Architecture and toolsArchitecture and tools
Architecture and tools
sanjay_jha
 
weblogic training | oracle weblogic online training | weblogic server course
weblogic training | oracle weblogic online training | weblogic server courseweblogic training | oracle weblogic online training | weblogic server course
weblogic training | oracle weblogic online training | weblogic server course
Nancy Thomas
 
Ebs 12.2 con9021_pdf_9021_0001
Ebs 12.2 con9021_pdf_9021_0001Ebs 12.2 con9021_pdf_9021_0001
Ebs 12.2 con9021_pdf_9021_0001
jucaab
 

Similar to SPTechCon SFO 2012 - Understanding the Five Layers of SharePoint Security (20)

Day2
Day2Day2
Day2
madamewoolf
 
Sql Server 2008 Security Enhanments
Sql Server 2008 Security EnhanmentsSql Server 2008 Security Enhanments
Sql Server 2008 Security Enhanments
Eduardo Castro
 
SharePoint 2010 best practices for infrastructure deployments SharePoint Sat...
SharePoint 2010 best practices for infrastructure deployments  SharePoint Sat...SharePoint 2010 best practices for infrastructure deployments  SharePoint Sat...
SharePoint 2010 best practices for infrastructure deployments SharePoint Sat...
Knowledge Cue
 
SQL Server 2008 Security Overview
SQL Server 2008 Security OverviewSQL Server 2008 Security Overview
SQL Server 2008 Security Overview
ukdpe
 
Where should I be encrypting my data?
Where should I be encrypting my data? Where should I be encrypting my data?
Where should I be encrypting my data?
Information Technology Society Nepal
 
SQLCAT - Data and Admin Security
SQLCAT - Data and Admin SecuritySQLCAT - Data and Admin Security
SQLCAT - Data and Admin Security
Denny Lee
 
SQLSaturday#290_Kiev_WindowsAzureDatabaseForBeginners
SQLSaturday#290_Kiev_WindowsAzureDatabaseForBeginnersSQLSaturday#290_Kiev_WindowsAzureDatabaseForBeginners
SQLSaturday#290_Kiev_WindowsAzureDatabaseForBeginners
Tobias Koprowski
 
springb security.pptxdsdsgfdsgsdgsdgsdgdsgdsgds
springb security.pptxdsdsgfdsgsdgsdgsdgdsgdsgdsspringb security.pptxdsdsgfdsgsdgsdgsdgdsgdsgds
springb security.pptxdsdsgfdsgsdgsdgsdgdsgdsgds
zmulani8
 
A to z for sql azure databases
A to z for sql azure databasesA to z for sql azure databases
A to z for sql azure databases
Antonios Chatzipavlis
 
Protecting Your SharePoint Content Databases using SQL Transparent Data Encry...
Protecting Your SharePoint Content Databases using SQL Transparent Data Encry...Protecting Your SharePoint Content Databases using SQL Transparent Data Encry...
Protecting Your SharePoint Content Databases using SQL Transparent Data Encry...
Michael Noel
 
Tackle Containerization Advisor (TCA) for Legacy Applications
Tackle Containerization Advisor (TCA) for Legacy ApplicationsTackle Containerization Advisor (TCA) for Legacy Applications
Tackle Containerization Advisor (TCA) for Legacy Applications
Konveyor Community
 
Dealing with SQL Security from ADO.NET
Dealing with SQL Security from ADO.NETDealing with SQL Security from ADO.NET
Dealing with SQL Security from ADO.NET
Fernando G. Guerrero
 
Enterprise-class security with PostgreSQL - 1
Enterprise-class security with PostgreSQL - 1Enterprise-class security with PostgreSQL - 1
Enterprise-class security with PostgreSQL - 1
Ashnikbiz
 
Transparent Data Encryption for SharePoint Content Databases
Transparent Data Encryption for SharePoint Content DatabasesTransparent Data Encryption for SharePoint Content Databases
Transparent Data Encryption for SharePoint Content Databases
Michael Noel
 
TROOPERS 20 - SQL Server Hacking Tips for Active Directory Environments
TROOPERS 20 - SQL Server Hacking Tips for Active Directory EnvironmentsTROOPERS 20 - SQL Server Hacking Tips for Active Directory Environments
TROOPERS 20 - SQL Server Hacking Tips for Active Directory Environments
Scott Sutherland
 
Best Practice SharePoint Architecture
Best Practice SharePoint ArchitectureBest Practice SharePoint Architecture
Best Practice SharePoint Architecture
Michael Noel
 
SQL Server 2016: Just a Few of Our DBA's Favorite Things
SQL Server 2016: Just a Few of Our DBA's Favorite ThingsSQL Server 2016: Just a Few of Our DBA's Favorite Things
SQL Server 2016: Just a Few of Our DBA's Favorite Things
Hostway|HOSTING
 
24 HOP edición Español -Diferentes técnicas de administración de logins y usu...
24 HOP edición Español -Diferentes técnicas de administración de logins y usu...24 HOP edición Español -Diferentes técnicas de administración de logins y usu...
24 HOP edición Español -Diferentes técnicas de administración de logins y usu...
SpanishPASSVC
 
20180605 sso with apex and adfs the weblogic way
20180605 sso with apex and adfs the weblogic way20180605 sso with apex and adfs the weblogic way
20180605 sso with apex and adfs the weblogic way
makker_nl
 
Blue Green Sitecore Deployments on Azure
Blue Green Sitecore Deployments on AzureBlue Green Sitecore Deployments on Azure
Blue Green Sitecore Deployments on Azure
Rob Habraken
 
Sql Server 2008 Security Enhanments
Sql Server 2008 Security EnhanmentsSql Server 2008 Security Enhanments
Sql Server 2008 Security Enhanments
Eduardo Castro
 
SharePoint 2010 best practices for infrastructure deployments SharePoint Sat...
SharePoint 2010 best practices for infrastructure deployments  SharePoint Sat...SharePoint 2010 best practices for infrastructure deployments  SharePoint Sat...
SharePoint 2010 best practices for infrastructure deployments SharePoint Sat...
Knowledge Cue
 
SQL Server 2008 Security Overview
SQL Server 2008 Security OverviewSQL Server 2008 Security Overview
SQL Server 2008 Security Overview
ukdpe
 
SQLCAT - Data and Admin Security
SQLCAT - Data and Admin SecuritySQLCAT - Data and Admin Security
SQLCAT - Data and Admin Security
Denny Lee
 
SQLSaturday#290_Kiev_WindowsAzureDatabaseForBeginners
SQLSaturday#290_Kiev_WindowsAzureDatabaseForBeginnersSQLSaturday#290_Kiev_WindowsAzureDatabaseForBeginners
SQLSaturday#290_Kiev_WindowsAzureDatabaseForBeginners
Tobias Koprowski
 
springb security.pptxdsdsgfdsgsdgsdgsdgdsgdsgds
springb security.pptxdsdsgfdsgsdgsdgsdgdsgdsgdsspringb security.pptxdsdsgfdsgsdgsdgsdgdsgdsgds
springb security.pptxdsdsgfdsgsdgsdgsdgdsgdsgds
zmulani8
 
Protecting Your SharePoint Content Databases using SQL Transparent Data Encry...
Protecting Your SharePoint Content Databases using SQL Transparent Data Encry...Protecting Your SharePoint Content Databases using SQL Transparent Data Encry...
Protecting Your SharePoint Content Databases using SQL Transparent Data Encry...
Michael Noel
 
Tackle Containerization Advisor (TCA) for Legacy Applications
Tackle Containerization Advisor (TCA) for Legacy ApplicationsTackle Containerization Advisor (TCA) for Legacy Applications
Tackle Containerization Advisor (TCA) for Legacy Applications
Konveyor Community
 
Dealing with SQL Security from ADO.NET
Dealing with SQL Security from ADO.NETDealing with SQL Security from ADO.NET
Dealing with SQL Security from ADO.NET
Fernando G. Guerrero
 
Enterprise-class security with PostgreSQL - 1
Enterprise-class security with PostgreSQL - 1Enterprise-class security with PostgreSQL - 1
Enterprise-class security with PostgreSQL - 1
Ashnikbiz
 
Transparent Data Encryption for SharePoint Content Databases
Transparent Data Encryption for SharePoint Content DatabasesTransparent Data Encryption for SharePoint Content Databases
Transparent Data Encryption for SharePoint Content Databases
Michael Noel
 
TROOPERS 20 - SQL Server Hacking Tips for Active Directory Environments
TROOPERS 20 - SQL Server Hacking Tips for Active Directory EnvironmentsTROOPERS 20 - SQL Server Hacking Tips for Active Directory Environments
TROOPERS 20 - SQL Server Hacking Tips for Active Directory Environments
Scott Sutherland
 
Best Practice SharePoint Architecture
Best Practice SharePoint ArchitectureBest Practice SharePoint Architecture
Best Practice SharePoint Architecture
Michael Noel
 
SQL Server 2016: Just a Few of Our DBA's Favorite Things
SQL Server 2016: Just a Few of Our DBA's Favorite ThingsSQL Server 2016: Just a Few of Our DBA's Favorite Things
SQL Server 2016: Just a Few of Our DBA's Favorite Things
Hostway|HOSTING
 
24 HOP edición Español -Diferentes técnicas de administración de logins y usu...
24 HOP edición Español -Diferentes técnicas de administración de logins y usu...24 HOP edición Español -Diferentes técnicas de administración de logins y usu...
24 HOP edición Español -Diferentes técnicas de administración de logins y usu...
SpanishPASSVC
 
20180605 sso with apex and adfs the weblogic way
20180605 sso with apex and adfs the weblogic way20180605 sso with apex and adfs the weblogic way
20180605 sso with apex and adfs the weblogic way
makker_nl
 
Blue Green Sitecore Deployments on Azure
Blue Green Sitecore Deployments on AzureBlue Green Sitecore Deployments on Azure
Blue Green Sitecore Deployments on Azure
Rob Habraken
 

More from Michael Noel (20)

AI is Hacking You - Digital Workplace Conference Australia 2024
AI is Hacking You - Digital Workplace Conference Australia 2024AI is Hacking You - Digital Workplace Conference Australia 2024
AI is Hacking You - Digital Workplace Conference Australia 2024
Michael Noel
 
AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
Michael Noel
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
Michael Noel
 
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Michael Noel
 
IT Insecurity - ST Digital Brazzaville
IT Insecurity - ST Digital BrazzavilleIT Insecurity - ST Digital Brazzaville
IT Insecurity - ST Digital Brazzaville
Michael Noel
 
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Michael Noel
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
Michael Noel
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Michael Noel
 
Understanding the Tools and Features of Office 365 : DWT Africa 2018
Understanding the Tools and Features of Office 365 : DWT Africa 2018Understanding the Tools and Features of Office 365 : DWT Africa 2018
Understanding the Tools and Features of Office 365 : DWT Africa 2018
Michael Noel
 
SPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
SPS Lisbon 2018 - Azure AD Connect Technical Deep DiveSPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
SPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
Michael Noel
 
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 MelbourneAzure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
Michael Noel
 
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
Michael Noel
 
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
Michael Noel
 
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
Michael Noel
 
Office 365; A Detailed Analysis - SPS Kampala 2017
Office 365; A Detailed Analysis - SPS Kampala 2017Office 365; A Detailed Analysis - SPS Kampala 2017
Office 365; A Detailed Analysis - SPS Kampala 2017
Michael Noel
 
Office 365; une Analyse Détaillée
Office 365; une Analyse Détaillée Office 365; une Analyse Détaillée
Office 365; une Analyse Détaillée
Michael Noel
 
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
Michael Noel
 
Breaking Down and Understanding Office 365 - SPSJHB 2015
Breaking Down and Understanding Office 365 - SPSJHB 2015Breaking Down and Understanding Office 365 - SPSJHB 2015
Breaking Down and Understanding Office 365 - SPSJHB 2015
Michael Noel
 
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
Michael Noel
 
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
Michael Noel
 
AI is Hacking You - Digital Workplace Conference Australia 2024
AI is Hacking You - Digital Workplace Conference Australia 2024AI is Hacking You - Digital Workplace Conference Australia 2024
AI is Hacking You - Digital Workplace Conference Australia 2024
Michael Noel
 
AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
AI is Hacking You - How Cybercriminals Leveral Artificial Intelligence - DWCN...
Michael Noel
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
Michael Noel
 
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Combatting Cyberthreats with Microsoft Defender 365 - CollabDays Finland 2023
Michael Noel
 
IT Insecurity - ST Digital Brazzaville
IT Insecurity - ST Digital BrazzavilleIT Insecurity - ST Digital Brazzaville
IT Insecurity - ST Digital Brazzaville
Michael Noel
 
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Securing IT Against Modern Threats with Microsoft Cloud Tools - #EUCloudSummi...
Michael Noel
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
Michael Noel
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Michael Noel
 
Understanding the Tools and Features of Office 365 : DWT Africa 2018
Understanding the Tools and Features of Office 365 : DWT Africa 2018Understanding the Tools and Features of Office 365 : DWT Africa 2018
Understanding the Tools and Features of Office 365 : DWT Africa 2018
Michael Noel
 
SPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
SPS Lisbon 2018 - Azure AD Connect Technical Deep DiveSPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
SPS Lisbon 2018 - Azure AD Connect Technical Deep Dive
Michael Noel
 
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 MelbourneAzure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
Azure Active Directory Connect: Technical Deep Dive - DWCAU 2018 Melbourne
Michael Noel
 
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
Azure Active Directory Connect: Technical Deep Dive - EU Collab Summit 2018
Michael Noel
 
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
Breaking Down the Tools and Features in Office 365 - EU Collab Summit 2018
Michael Noel
 
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
Understanding the Tools and Features of Office 365 - New Zealand Digital Work...
Michael Noel
 
Office 365; A Detailed Analysis - SPS Kampala 2017
Office 365; A Detailed Analysis - SPS Kampala 2017Office 365; A Detailed Analysis - SPS Kampala 2017
Office 365; A Detailed Analysis - SPS Kampala 2017
Michael Noel
 
Office 365; une Analyse Détaillée
Office 365; une Analyse Détaillée Office 365; une Analyse Détaillée
Office 365; une Analyse Détaillée
Michael Noel
 
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
AUDWC 2016 - Using SQL Server 20146 AlwaysOn Availability Groups for SharePoi...
Michael Noel
 
Breaking Down and Understanding Office 365 - SPSJHB 2015
Breaking Down and Understanding Office 365 - SPSJHB 2015Breaking Down and Understanding Office 365 - SPSJHB 2015
Breaking Down and Understanding Office 365 - SPSJHB 2015
Michael Noel
 
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
Understanding Office 365 Service Offerings - O365 Saturday Sydney 2015
Michael Noel
 
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
Ultimate SharePoint Infrastructure Best Practises Session - Isle of Man Share...
Michael Noel
 

Recently uploaded (20)

TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
TrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business ConsultingTrsLabs - Fintech Product & Business Consulting
TrsLabs - Fintech Product & Business Consulting
Trs Labs
 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 

SPTechCon SFO 2012 - Understanding the Five Layers of SharePoint Security

  • 1. Understanding the Five Layers of SharePoint Security Michael Noel @MichaelTNoel
  • 2. Michael Noel • Author of SAMS Publishing titles “SharePoint 2007 Unleashed,” the upcoming “SharePoint 2010 Unleashed,” “SharePoint 2003 Unleashed”, “Teach Yourself SharePoint 2003 in 10 Minutes,” “Windows Server 2008 R2 Unleashed,” “Exchange Server 2010 Unleashed”, “ISA Server 2006 Unleashed”, and many other titles . • Partner at Convergent Computing (www.cco.com / +1(510)444-5700) – San Francisco, U.S.A. based Infrastructure/Security specialists for SharePoint, AD, Exchange, Security
  • 3. SharePoint Security Layers of Security in a SharePoint Environment • 1: Infrastructure Security – Physical Security – Best Practice Service Account Setup – Kerberos Authentication • 2: Data Security – Role Based Access Control (RBAC) – Transparent Data Encryption (TDE) of SQL Databases – Antivirus • 3: Transport Security – Secure Sockets Layer (SSL) from Client to Server – IPSec from Server to Server • 4: Edge Security – Inbound Internet Security (Forefront UAG/TMG) • 5: Rights Management
  • 5. Layer 1: Infrastructure Security Sample List of Service Accounts Service Account Name Role of Service Account Special Permissions COMPANYABCSRV-SP-Setup SharePoint Installation Account Local Admin on all SP Servers (for installs) COMPANYABCSRV-SP-SQL SQL Service Account(s) – Should be separate Local Admin on Database Server(s) admin accounts from SP accounts. (Generally, some exceptions apply) COMPANYABCSRV-SP-Farm SharePoint Farm Account(s) – Can also be N/A standard admin accounts. RBAC principles apply ideally. COMPANYABCSRV-SP-Search Search Account N/A COMPANYABCSRV-SP-Content Default Content Access Account Read rights to any external data sources to be crawled COMPANYABCSRV-SP-Prof Default Profiles Access Account Member of Domain Users (to be able to read attributes from users in domain) and ‘Replicate Directory Changes’ rights in AD. COMPANYABCSRV-SP-AP-SPCA Application Pool Identity account for DBCreator and Security Admin on SQL. SharePoint Central Admin. Create and Modify contacts rights in OU used for mail. COMPANYABCSRV-SP-AP-Data Application Pool Identity account for the N/A Content related App Pool (Portal, MySites, etc.) Additional as needed for security.
  • 6. Layer 1: Infrastructure Security Enable Kerberos • When creating any Web Applications in Classic-mode, USE KERBEROS. It is much more secure and also faster with heavy loads as the SP server doesn’t have to keep asking for auth requests from AD. • Kerberos auth does require extra steps, which makes people shy away from it, but once configured, it improves security considerably and can improve performance on high-load sites. • Should also be configured on SPCA Site! (Best Practice = Configure SPCA for NLB, SSL, and Kerberos (i.e. https://spca.companyabc.com)
  • 7. Layer 1: Infrastructure Security Kerberos Step 1: Create the Service Principal Names • Use the setspn utility to create Service Principle Names in AD, the following syntax for example: – Setspn.exe -A HTTP/mysite.companyabc.com DOMAINNAMEMYSiteAppAccount – Setspn.exe -A HTTP/mysite DOMAINNAMEMYSITEAppAccount – Setspn.exe -A HTTP/home.companyabc.com DOMAINNAMEHOMEAppAccount – Setspn.exe -A HTTP/sp DOMAINNAMEHOMEAppAccount
  • 8. Layer 1: Infrastructure Security Kerberos Step 2: Enable Kerberos between SP and SQL • Use setspn to create SPNs for SQL Service Account • SPNs need to match the name that SharePoint uses to connect to SQL (Ideally SQL Alias, more on this later) • Syntax similar to following: – Setspn.exe -A MSSQLSvc/spsql:1433 COMPANYABCSRV-SQL-DB – Setspn.exe –A MSSQLSvc/spsql.companyabc.com:1433 COMPANYABCSRV-SQL-DB • MSSQLSvc = Default instance, if named instance, specify the name instead • In this example, SRV-SQL-DB is the SQL Admin account
  • 9. Layer 1: Infrastructure Security Kerberos Step 3: Allow Accounts to Delegate (Optional) • Required only for Excel Services and other impersonation applications. • On all SP Computer accounts and on the Application Identity accounts, check the box in ADUC to allow for delegation. – In ADUC, navigate to the computer or user account, right-click and choose Properties. – Go to the Delegation tab – Choose Trust this user/computer for delegation to any service (Kerberos)
  • 10. Layer 1: Infrastructure Security Kerberos Step 4: Enable Kerberos on Web Application • Go to Application Management – Authentication Providers • Choose the appropriate Web Application • Click on the link for ‘Default’ under Zone • Change to Integrated Windows Authentication - Kerberos (Negotiate) • Run iisreset /noforce from the command prompt • If creating Web App from scratch, this step may be unnecessary if you choose Negotiate from the beginning
  • 11. DATA SECURITY Layer
  • 12. Layer 2: Data Security Role Based Access Control (RBAC) • Role Groups defined within Active Directory (Universal Groups) – i.e. ‘Marketing,’ ‘Sales,’ ‘IT,’ etc. • Role Groups added directly into SharePoint ‘Access Groups’ such as ‘Contributors,’ ‘Authors,’ etc. • Simply by adding a user account into the associated Role Group, they gain access to whatever rights their role requires. User1 Role SharePoint Group Group User2
  • 13. Layer 2: Data Security SQL Transparent Data Encryption (TDE) • SQL Server 2008 and 2008 R2 Enterprise Edition Feature • Encrypts SQL Databases Transparently, SharePoint is unaware of the encryption and does not need a key • Encrypts the backups of the database as well
  • 14. Layer 2: Data Security TDE vs. Cell Level Encryption • Available with either SQL 2005 or SQL 2008 • Encrypts individual cells in a database • Requires a password to access the cell • Requires that columns be changed from their original data type to varbinary • Advantage is that only specific info is encrypted • Disadvantage is that you cannot use this for SharePoint Databases
  • 15. Layer 2: Data Security TDE vs. File Level Encryption • Two forms, older Encrypting File System (EFS) and Bitlocker • EFS encrypts data at the File Level • Bitlocker encrypts data at the Volume Level • Bitlocker Encrypts every file on the disk, not just database files • Could be used together with TDE
  • 16. Layer 2: Data Security SQL Transparent Data Encryption (TDE) Limitations • Does not encrypt the Communication Channel (IPSec can be added) • Does not protect data in memory (DBAs could access) • Cannot take advantage of SQL 2008 Backup Compression • TempDB is encrypted for the entire instance, even if only one DB is enabled for TDE, which can have a performance effect for other DBs • Replication or FILESTREAM data is not encrypted when TDE is enabled (i.e. RBS BLOBs not encrypted)
  • 17. Key Windows OS Level Hierarchy and Cert Data Protection API (DPAPI) DPAPI Encrypts SMK SQL Instance Level Service Master Key SMK encrypts the DMK for master DB master DB Level Database Master Key DMK creates Cert in master DB master DB Level Certificate Certificate Encrypts DEK in Content DB Content DB Level Database Encryption Key DEK used to encrypt Content DB
  • 18. Layer 2: Data Security SQL TDE Step 1: Creating the Database Master Key (DMK) • Symmetric key used to protect private keys and asymmetric keys • Protected itself by Service Master Key (SMK), which is created by SQL Server setup • Use syntax as follows: – USE master; – GO – CREATE MASTER KEY ENCRYPTION BY PASSWORD = 'CrypticTDEpw4CompanyABC'; – GO
  • 19. Layer 2: Data Security SQL TDE Step 2: Creating the TDE Certificate • Protected by the DMK • Used to protect the database encryption key • Use syntax as follows: USE master; GO CREATE CERTIFICATE CompanyABCtdeCert WITH SUBJECT = 'CompanyABC TDE Certificate' ; GO
  • 20. Layer 2: Data Security SQL TDE Step 3: Backup the Master Key • Without a backup, data can be lost • Backup creates two files, the Cert backup and the Private Key File • Use following syntax: USE master; GO BACKUP CERTIFICATE CompanyABCtdeCert TO FILE = 'c:BackupCompanyABCtdeCERT.cer' WITH PRIVATE KEY ( FILE = 'c:BackupCompanyABCtdeDECert.pvk', ENCRYPTION BY PASSWORD = 'CrypticTDEpw4CompanyABC!' ); GO
  • 21. Layer 2: Data Security SQL TDE Step 4: Creating the Database Encryption Key (DEK) • DEK is used to encrypt specific database • One created for each database • Encryption method can be chosen for each DEK • Use following syntax: USE SharePointContentDB; GO CREATE DATABASE ENCRYPTION KEY WITH ALGORITHM = AES_256 ENCRYPTION BY SERVER CERTIFICATE CompanyABCtdeCert GO
  • 22. Layer 2: Data Security SQL TDE Step 5: Enable TDE on the Database(s) • Data encryption will begin after running command • Size of DB will determine time it will take, can be lengthy and could cause user blocking • Use following syntax: USE SharePointContentDB GO ALTER DATABASE SharePointContentDB SET ENCRYPTION ON GO
  • 23. Layer 2: Data Security SQL TDE Step 6: Monitor the TDE Encryption Progress • State is Returned • State of 2 = Encryption Begun • State of 3 = Encryption Complete • Use following syntax: USE SharePointContentDB GO SELECT * FROM sys.dm_database_encryption_keys WHERE encryption_state = 3; GO
  • 24. Layer 2: Data Security SQL TDE: Restoring a TDE Database to Another Server • Step 1: Create new Master Key on Target Server (Does not need to match source master key) • Step 2: Backup Cert and Private Key from Source • Step 3: Restore Cert and Private Key onto Target (No need to export the DEK as it is part of the backup) USE master; GO CREATE CERTIFICATE CompanyABCtdeCert FROM FILE = 'C:RestoreCompanyABCtdeCert.cer' WITH PRIVATE KEY ( FILE = 'C:RestoreCompanyABCtdeCert.pvk' , DECRYPTION BY PASSWORD = 'CrypticTDEpw4CompanyABC!' ) • Step 4: Restore DB
  • 25. Layer 2: Data Security SharePoint Antivirus
  • 27. Layer 2: Data Security SharePoint Antivirus VSAPI • Realtime scanning only uses the VSAPI • Realtime Scan Settings are Administered through the SharePoint Central Admin Tool – Realtime Options are grayed out in the ForeFront Admin Console
  • 28. Layer 2: Data Security SharePoint Antivirus: FPS Keyword and File Filtering • Look for specific keywords (sensitive company info, profanity, etc.) – Block – Simply detect and notify • Create Filter List – Add Keywords, either manually or bulk as lines in a text file
  • 29. Layer 2: Data Security SharePoint Antivirus: FPS Profanity Filters • New Profanity lists in 11 languages available in SP2 – (Run KeywordInstaller.msi to install) – Import the lists into FF from Program FilesMicrosoft Forefront SecuritySharePointDataExample Keywords
  • 32. Layer 3: Transport Security Client to Server: Using Secure Sockets Layer (SSL) Encryption • External or Internal Certs highly recommended • Protects Transport of content • 20% overhead on Web Servers • Can be offloaded via SSL offloaders if needed • Don’t forget for SPCA as well!
  • 33. Layer 3: Transport Security Server to Server: Using IPSec to encrypt traffic • By default, traffic between SharePoint Servers (i.e. Web and SQL) is unencrypted • IPSec encrypts all packets sent between servers in a farm • For very high security scenarios when all possible data breaches must be addressed
  • 34. EDGE SECURITY Layer
  • 35. Layer 4: Edge Security Forefront Unified Access Gateway (UAG) 2010
  • 36. Layer 4: Edge Security UAG Comparison with Forefront TMG Capability TMG 2010 UAG 2010 Publish Web applications using HTTPS X X Publish internal mobile applications to roaming mobile devices X X Layer 3 firewall X X* Outbound scenarios support X X* Array support X Globalization and administration console localization X Wizards and predefined settings to publish SharePoint sites and Exchange X X Wizards and predefined settings to publish various applications X Active Directory Federation Services (ADFS) support X Rich authentication (for example, one-time password, forms-based, smart card) X X Application protection (Web application firewall) Basic Full Endpoint health detection X Information leakage prevention X Granular access policy X Unified Portal X
  • 38. Layer 5: Rights Management Active Directory Rights Management Services (AD RMS) • AD RMS is a form of Digital Rights Management (DRM) technology, used in various forms to protect content • Used to restrict activities on files AFTER they have been accessed: – Cut/Paste – Print – Save As… • Directly integrates with SharePoint DocLibs
  • 39. Layer 5: Rights Management How AD RMS Works 1. On first use, authors receive client licensor certificate from RMS server 2. Author creates content and assigns rights 3. File is distributed to recipient(s) 4. Recipient opens file, and their RMS client contacts server for user validation and to obtain a license 5. Application opens the file and enforces the restrictions
  • 40. Layer 5: Rights Management Installing AD RMS – Key Storage • Select Cluster Key Storage • CSP used for advanced scenarios
  • 41. Layer 5: Rights Management Installing AD RMS – Creating the Cluster Name
  • 42. Layer 5: Rights Management Installing AD RMS – Using an SSL Cert for Transport Encryption
  • 43. Layer 5: Rights Management Allowing SharePoint to use AD RMS • By default, RMS server is configured to only allow the local system account of the RMS server or the Web Application Identity accounts to access the certificate pipeline directly • SharePoint web servers and/or Web Application Service Accounts need to be added to this security list • Add the RMS Service Group, the machine account(s) of the SharePoint Server and the Web App Identity accountswith Read and Excecute permissions to the ServerCertification.asmx file in the %systemroot%inetpubwwwroot_wmcs Certification folder on the RMS server
  • 44. Layer 5: Rights Management Client Accessing AD RMS Documents • RMS-enabled client, when accessing document in doclib, will access RMS server to validate credentials
  • 45. Layer 5: Rights Management Client Accessing AD RMS Documents • Effective permissions can be viewed from the document • The RMS client will enforce the restrictions
  • 46. Session Summary • Determine Security Risk for your SharePoint Environment • Identify any Regulatory Compliance Requirements for SharePoint • Determine which aspects of SharePoint need to be secured, touching on all five layers of SharePoint Security
  • 47. Your Feedback is Important Please fill out a session evaluation form drop it off at the conference registration desk. Thank you!
  • 48. Michael Noel Twitter: @MichaelTNoel www.cco.com Slides: slideshare.net/michaeltnoel Travel blog: http://sharingtheglobe.com