SlideShare a Scribd company logo
Module 3 Windows Server 2008  Branch Office Scenario
Clinic Outline Branch Office Server Deployment and Administration Branch Office Security Branch Corp RODC
Branch Office Server Deployment and Administration
Domain Name System (DNS) Server Role Background zone loading Read-only domain controller support Global Names zone DNS client changes Link-Local multicast name resolution (LLMNR) Domain controller location
AD Domain Services New AD MMC Snap-In Features Find Command New Options for Unattended Installs
Restartable AD Domain Services (AD DS) 3 Possible States: AD DS Started AD DS Stopped Active Directory Restore Mode
Demonstration: Branch Office Server Deployment and Administration AD DS Installation Wizard Stopping and restarting AD DS
AD Domain Services Auditing What changes have been made to AD DS auditing?
AD Domain Services Backup and Recovery Considerations What’s New? General Requirements
Improved Server Deployment (Windows Server Virtualization) Addresses the following challenges: Server Consolidation Development and Testing Business Continuity/Disaster Recovery 64-bit Next Generation technology Server Core as a host system
File Services DFS Names Spaces Replication SYSVOL Server Message Block (SMB) 2.0
Next Generation TCP/IP Stack Receive Windows Auto-Tuning Compound TCP Throughput Optimization in High-Loss Environments Neighbor Unreachability Detection Changes in Dead Gateway Detection Changes in PTMU Black Hole Router Detection Routing Compartments ESTATS Support Network Diagnostics Framework Support New Packet Filtering Model with Windows Filtering Platform
Read-Only Domain Controller (RODC) New Functionality AD Database Unidirectional Replication Credential Caching Password Replication Policy Administrator Role Separation Read-Only DNS Requirements/Special Considerations RODC
Read-only DC, RODC 管理員的處置方式 入侵者看到的資訊
Implementation/Usage Scenarios Maintain physical security of data at the branch office Maintain physical security of servers at the branch office Provide secure IP-based communications with the branch office Control which computers can communicate on the branch office network
Recommendations Implement a Password Replication Policy Deploy a Read-Only Domain Controller at the branch office Implement administrator role separation Implement BitLocker Drive Encryption; do not require a PIN or USB device if no local admin Implement Network Access Protection Use IPSec for network communications
Module 4 Security and Policy Enforcement in Windows Server 2008
Overview Methods of Security and Policy Enforcement Network Location Awareness Network Access Protection Windows Firewall with Advanced Security (WFAS) Internet Protocol Security (IPSec) Windows Server Hardening Server and Domain Isolation Active Directory Domain Services Auditing Read-Only Domain Controller (RODC) BitLocker Drive Encryption Removable Device Installation Control Enterprise PKI
Technical Background Windows Firewall with Advanced Security Internet Security Protocol (IPSec) Active Directory Domain Services Auditing Read-Only Domain Controller (RODC) Enterprise PKI BitLocker Drive Encryption
Windows Firewall with Advanced Security
Demonstration: Windows Firewall with Advanced Security Creating Inbound and Outbound Rules Creating a Firewall Rule Limiting a Service
IPSec Integrated with WFAS IPSec Improvements Simplified IPSec Policy Configuration Client-to-DC IPSec Protection Improved Load Balancing and Clustering Server Support Improved IPSec Authentication Integration with NAP Multiple Authentication Methods New Cryptographic Support Integrated IPv4 and IPv6 Support Extended Events and Performance Monitor Counters Network Diagnostics Framework Support
BitLocker Drive Encryption (BDE) Data Protection Drive Encryption Integrity Checking BDE Hardware and Software Requirements
Implementation/Usage Scenarios Enforce Security Policy Improve Domain Security Improve System Security Improve Network Communications Security
Recommendations Implement Network Access Protection Use Windows Firewall and Advanced Security to implement IPSec Deploy Read-Only Domain Controllers, where appropriate Implement BitLocker Drive Encryption Carefully test and plan all security policies Take advantage of PKI improvements
Network Access Protection in Windows Server 2008
Overview Network Access Protection Net work Access Protection Network Access Quarantine Control Internal, VPN and Remote Access Client Only VPN and Remote Access Clients IPSec, 802.1X, DHCP and VPN DHCP and VPN NAP NPS and Client included in Windows Server 2008 ; NAP client included in Vista Installed from Windows Server 2003 Resource Kit
NAP Infrastructure Health Policy Validation Health Policy Compliance Automatic Remediation Limited Access
NAP Enforcement Client 802.1X VPN IPSec DHCP NPS RADIUS
Demonstration: Network Access Protection Create a NAP Policy Using the MMC to Create NAP Configuration settings Create a new RADIUS Client Create a new System Health Validator for Windows Vista and Windows XP SP2
Implementation/Usage Scenarios Ensuring the Health of Corporate Desktops Checking the Health and Status of Roaming Laptops Determining the Health of Visiting Laptops Verify the Compliance of Home Computers
Recommendations Carefully test and verify all IPSec Policies Use Quality of Service to improve bandwidth When using IPSec – employ ESP with encryption Plan to Prioritize traffic on the network Apply Network Access Protection to secure client computers  Consider Using Domain Isolation
Ad

More Related Content

What's hot (20)

Barracuda WAF Deployment in Microsoft Azure
Barracuda WAF Deployment in Microsoft AzureBarracuda WAF Deployment in Microsoft Azure
Barracuda WAF Deployment in Microsoft Azure
Aravindan A
 
W982 05092004
W982 05092004W982 05092004
W982 05092004
Sumit Tambe
 
Datasheet Kerio Control
Datasheet Kerio ControlDatasheet Kerio Control
Datasheet Kerio Control
rkoscak
 
Kerio Connect 7 Features and Benefits
Kerio Connect 7 Features and BenefitsKerio Connect 7 Features and Benefits
Kerio Connect 7 Features and Benefits
Kerio Technologies
 
F5 TMOS v13.0
F5 TMOS v13.0F5 TMOS v13.0
F5 TMOS v13.0
MarketingArrowECS_CZ
 
Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6
Sarah Isaacs
 
Windows 7 by microsoft
Windows 7 by microsoft Windows 7 by microsoft
Windows 7 by microsoft
Kenneth Endfinger
 
Exchange 2007 Overview Son Vu
Exchange 2007 Overview Son VuExchange 2007 Overview Son Vu
Exchange 2007 Overview Son Vu
vncson
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
ali raza
 
OSSIM User Training: Get Improved Security Visibility with OSSIM
OSSIM User Training: Get Improved Security Visibility with OSSIMOSSIM User Training: Get Improved Security Visibility with OSSIM
OSSIM User Training: Get Improved Security Visibility with OSSIM
AlienVault
 
Install Salsa Windows 2012 Three Servers
Install Salsa  Windows 2012 Three ServersInstall Salsa  Windows 2012 Three Servers
Install Salsa Windows 2012 Three Servers
Oscar OLVERA-IRIGOYEN, Ph.D
 
Oracle security 08-oracle network security
Oracle security 08-oracle network securityOracle security 08-oracle network security
Oracle security 08-oracle network security
Zhaoyang Wang
 
6421 b Module-07
6421 b Module-076421 b Module-07
6421 b Module-07
Bibekananada Jena
 
Oracle security 02-administering user security
Oracle security 02-administering user securityOracle security 02-administering user security
Oracle security 02-administering user security
Zhaoyang Wang
 
Mitigating Rapid Cyberattacks
Mitigating Rapid CyberattacksMitigating Rapid Cyberattacks
Mitigating Rapid Cyberattacks
Erdem Erdogan
 
Continuous monitoring with OSSIM
Continuous monitoring with OSSIMContinuous monitoring with OSSIM
Continuous monitoring with OSSIM
Eguardian Global Services
 
Understanding Informix Network Performance Features
Understanding Informix Network Performance FeaturesUnderstanding Informix Network Performance Features
Understanding Informix Network Performance Features
John Miller
 
Trusted extensions-gdansk-v1 0
Trusted extensions-gdansk-v1 0Trusted extensions-gdansk-v1 0
Trusted extensions-gdansk-v1 0
Kevin Mayo
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide
Lauren Bell
 
ActiveManage product brief 2002
ActiveManage product brief 2002ActiveManage product brief 2002
ActiveManage product brief 2002
Vinny Pasceri
 
Barracuda WAF Deployment in Microsoft Azure
Barracuda WAF Deployment in Microsoft AzureBarracuda WAF Deployment in Microsoft Azure
Barracuda WAF Deployment in Microsoft Azure
Aravindan A
 
Datasheet Kerio Control
Datasheet Kerio ControlDatasheet Kerio Control
Datasheet Kerio Control
rkoscak
 
Kerio Connect 7 Features and Benefits
Kerio Connect 7 Features and BenefitsKerio Connect 7 Features and Benefits
Kerio Connect 7 Features and Benefits
Kerio Technologies
 
Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6Symantec Endpoint Protection 12.1 RU6 MP6
Symantec Endpoint Protection 12.1 RU6 MP6
Sarah Isaacs
 
Exchange 2007 Overview Son Vu
Exchange 2007 Overview Son VuExchange 2007 Overview Son Vu
Exchange 2007 Overview Son Vu
vncson
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
ali raza
 
OSSIM User Training: Get Improved Security Visibility with OSSIM
OSSIM User Training: Get Improved Security Visibility with OSSIMOSSIM User Training: Get Improved Security Visibility with OSSIM
OSSIM User Training: Get Improved Security Visibility with OSSIM
AlienVault
 
Oracle security 08-oracle network security
Oracle security 08-oracle network securityOracle security 08-oracle network security
Oracle security 08-oracle network security
Zhaoyang Wang
 
Oracle security 02-administering user security
Oracle security 02-administering user securityOracle security 02-administering user security
Oracle security 02-administering user security
Zhaoyang Wang
 
Mitigating Rapid Cyberattacks
Mitigating Rapid CyberattacksMitigating Rapid Cyberattacks
Mitigating Rapid Cyberattacks
Erdem Erdogan
 
Understanding Informix Network Performance Features
Understanding Informix Network Performance FeaturesUnderstanding Informix Network Performance Features
Understanding Informix Network Performance Features
John Miller
 
Trusted extensions-gdansk-v1 0
Trusted extensions-gdansk-v1 0Trusted extensions-gdansk-v1 0
Trusted extensions-gdansk-v1 0
Kevin Mayo
 
CIS Control Solution Guide
CIS Control Solution Guide CIS Control Solution Guide
CIS Control Solution Guide
Lauren Bell
 
ActiveManage product brief 2002
ActiveManage product brief 2002ActiveManage product brief 2002
ActiveManage product brief 2002
Vinny Pasceri
 

Viewers also liked (7)

Windows Server Administration Fundamentals Certificate
Windows Server Administration Fundamentals CertificateWindows Server Administration Fundamentals Certificate
Windows Server Administration Fundamentals Certificate
Mubashir Baig
 
Certificate of Windows Server Administration Fundamental
Certificate of Windows Server Administration FundamentalCertificate of Windows Server Administration Fundamental
Certificate of Windows Server Administration Fundamental
Abdulmoiz Lakdawala
 
Installation of Windows Server 2003 Domain Controller and DNS Server Setup
Installation of Windows Server 2003 Domain Controller and DNS Server SetupInstallation of Windows Server 2003 Domain Controller and DNS Server Setup
Installation of Windows Server 2003 Domain Controller and DNS Server Setup
► Supreme Mandal ◄
 
Chapter10 Server Administration
Chapter10     Server  AdministrationChapter10     Server  Administration
Chapter10 Server Administration
Raja Waseem Akhtar
 
Windows Server 2003 Administration
Windows Server 2003 AdministrationWindows Server 2003 Administration
Windows Server 2003 Administration
LearnItFirst.com
 
Chapter01 Introduction To Windows Server 2003
Chapter01     Introduction To  Windows  Server 2003Chapter01     Introduction To  Windows  Server 2003
Chapter01 Introduction To Windows Server 2003
Raja Waseem Akhtar
 
Microsoft windows server 2003
Microsoft windows server 2003Microsoft windows server 2003
Microsoft windows server 2003
bishal mahat
 
Windows Server Administration Fundamentals Certificate
Windows Server Administration Fundamentals CertificateWindows Server Administration Fundamentals Certificate
Windows Server Administration Fundamentals Certificate
Mubashir Baig
 
Certificate of Windows Server Administration Fundamental
Certificate of Windows Server Administration FundamentalCertificate of Windows Server Administration Fundamental
Certificate of Windows Server Administration Fundamental
Abdulmoiz Lakdawala
 
Installation of Windows Server 2003 Domain Controller and DNS Server Setup
Installation of Windows Server 2003 Domain Controller and DNS Server SetupInstallation of Windows Server 2003 Domain Controller and DNS Server Setup
Installation of Windows Server 2003 Domain Controller and DNS Server Setup
► Supreme Mandal ◄
 
Chapter10 Server Administration
Chapter10     Server  AdministrationChapter10     Server  Administration
Chapter10 Server Administration
Raja Waseem Akhtar
 
Windows Server 2003 Administration
Windows Server 2003 AdministrationWindows Server 2003 Administration
Windows Server 2003 Administration
LearnItFirst.com
 
Chapter01 Introduction To Windows Server 2003
Chapter01     Introduction To  Windows  Server 2003Chapter01     Introduction To  Windows  Server 2003
Chapter01 Introduction To Windows Server 2003
Raja Waseem Akhtar
 
Microsoft windows server 2003
Microsoft windows server 2003Microsoft windows server 2003
Microsoft windows server 2003
bishal mahat
 
Ad

Similar to 0505 Windows Server 2008 一日精華營 Part II (20)

Windowsserver2003twpppt
Windowsserver2003twppptWindowsserver2003twpppt
Windowsserver2003twpppt
Mizuhashi Yuki
 
W7 for IT Professionals
W7 for IT ProfessionalsW7 for IT Professionals
W7 for IT Professionals
guest632c73
 
W7 Enterprise
W7 EnterpriseW7 Enterprise
W7 Enterprise
aralves
 
Win08 R2 It Pro Overview
Win08 R2 It Pro OverviewWin08 R2 It Pro Overview
Win08 R2 It Pro Overview
guest092b9a8
 
Windows Server 2008 R2
Windows Server 2008 R2Windows Server 2008 R2
Windows Server 2008 R2
Rishu Mehra
 
Windows 2008 R2 Overview
Windows 2008 R2 OverviewWindows 2008 R2 Overview
Windows 2008 R2 Overview
Amit Gatenyo
 
0505 Windows Server 2008 一日精華營 PartI
0505 Windows Server 2008 一日精華營 PartI0505 Windows Server 2008 一日精華營 PartI
0505 Windows Server 2008 一日精華營 PartI
Timothy Chen
 
Windows Server 2008 (Active Directory Yenilikleri)
Windows Server 2008 (Active Directory Yenilikleri)Windows Server 2008 (Active Directory Yenilikleri)
Windows Server 2008 (Active Directory Yenilikleri)
ÇözümPARK
 
Windows Server 2008 Security Overview Short
Windows  Server 2008  Security  Overview  ShortWindows  Server 2008  Security  Overview  Short
Windows Server 2008 Security Overview Short
Eduardo Castro
 
Windows Server 2008 Security Overview Short
Windows Server 2008 Security Overview ShortWindows Server 2008 Security Overview Short
Windows Server 2008 Security Overview Short
Eduardo Castro
 
newCV_ahmad2
newCV_ahmad2newCV_ahmad2
newCV_ahmad2
ahmad talat
 
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys LimitedScoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Wes Moskal-Fitzpatrick
 
SharePoint Server and Windows 2008 And SQL 2008 with Joel Oleson and Todd Klindt
SharePoint Server and Windows 2008 And SQL 2008 with Joel Oleson and Todd KlindtSharePoint Server and Windows 2008 And SQL 2008 with Joel Oleson and Todd Klindt
SharePoint Server and Windows 2008 And SQL 2008 with Joel Oleson and Todd Klindt
Joel Oleson
 
Windows Server 2008 R2 Overview
Windows Server 2008 R2 OverviewWindows Server 2008 R2 Overview
Windows Server 2008 R2 Overview
Alexander Schek
 
Windows Server 2008 R2 Overview
Windows Server 2008 R2 OverviewWindows Server 2008 R2 Overview
Windows Server 2008 R2 Overview
jjalea
 
200308 Active Directory Security
200308 Active Directory Security200308 Active Directory Security
200308 Active Directory Security
Armando Leon
 
Windows 2008 R2 Security
Windows 2008 R2 SecurityWindows 2008 R2 Security
Windows 2008 R2 Security
Amit Gatenyo
 
Creating Secure Applications
Creating Secure Applications Creating Secure Applications
Creating Secure Applications
guest879f38
 
Q1 Southern California Session Slides
Q1 Southern California Session SlidesQ1 Southern California Session Slides
Q1 Southern California Session Slides
Harold Wong
 
Ws08 R2 Itpro Session 2 Technical Overview Part2
Ws08 R2 Itpro Session 2 Technical Overview Part2Ws08 R2 Itpro Session 2 Technical Overview Part2
Ws08 R2 Itpro Session 2 Technical Overview Part2
chenley
 
Windowsserver2003twpppt
Windowsserver2003twppptWindowsserver2003twpppt
Windowsserver2003twpppt
Mizuhashi Yuki
 
W7 for IT Professionals
W7 for IT ProfessionalsW7 for IT Professionals
W7 for IT Professionals
guest632c73
 
W7 Enterprise
W7 EnterpriseW7 Enterprise
W7 Enterprise
aralves
 
Win08 R2 It Pro Overview
Win08 R2 It Pro OverviewWin08 R2 It Pro Overview
Win08 R2 It Pro Overview
guest092b9a8
 
Windows Server 2008 R2
Windows Server 2008 R2Windows Server 2008 R2
Windows Server 2008 R2
Rishu Mehra
 
Windows 2008 R2 Overview
Windows 2008 R2 OverviewWindows 2008 R2 Overview
Windows 2008 R2 Overview
Amit Gatenyo
 
0505 Windows Server 2008 一日精華營 PartI
0505 Windows Server 2008 一日精華營 PartI0505 Windows Server 2008 一日精華營 PartI
0505 Windows Server 2008 一日精華營 PartI
Timothy Chen
 
Windows Server 2008 (Active Directory Yenilikleri)
Windows Server 2008 (Active Directory Yenilikleri)Windows Server 2008 (Active Directory Yenilikleri)
Windows Server 2008 (Active Directory Yenilikleri)
ÇözümPARK
 
Windows Server 2008 Security Overview Short
Windows  Server 2008  Security  Overview  ShortWindows  Server 2008  Security  Overview  Short
Windows Server 2008 Security Overview Short
Eduardo Castro
 
Windows Server 2008 Security Overview Short
Windows Server 2008 Security Overview ShortWindows Server 2008 Security Overview Short
Windows Server 2008 Security Overview Short
Eduardo Castro
 
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys LimitedScoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Wes Moskal-Fitzpatrick
 
SharePoint Server and Windows 2008 And SQL 2008 with Joel Oleson and Todd Klindt
SharePoint Server and Windows 2008 And SQL 2008 with Joel Oleson and Todd KlindtSharePoint Server and Windows 2008 And SQL 2008 with Joel Oleson and Todd Klindt
SharePoint Server and Windows 2008 And SQL 2008 with Joel Oleson and Todd Klindt
Joel Oleson
 
Windows Server 2008 R2 Overview
Windows Server 2008 R2 OverviewWindows Server 2008 R2 Overview
Windows Server 2008 R2 Overview
Alexander Schek
 
Windows Server 2008 R2 Overview
Windows Server 2008 R2 OverviewWindows Server 2008 R2 Overview
Windows Server 2008 R2 Overview
jjalea
 
200308 Active Directory Security
200308 Active Directory Security200308 Active Directory Security
200308 Active Directory Security
Armando Leon
 
Windows 2008 R2 Security
Windows 2008 R2 SecurityWindows 2008 R2 Security
Windows 2008 R2 Security
Amit Gatenyo
 
Creating Secure Applications
Creating Secure Applications Creating Secure Applications
Creating Secure Applications
guest879f38
 
Q1 Southern California Session Slides
Q1 Southern California Session SlidesQ1 Southern California Session Slides
Q1 Southern California Session Slides
Harold Wong
 
Ws08 R2 Itpro Session 2 Technical Overview Part2
Ws08 R2 Itpro Session 2 Technical Overview Part2Ws08 R2 Itpro Session 2 Technical Overview Part2
Ws08 R2 Itpro Session 2 Technical Overview Part2
chenley
 
Ad

More from Timothy Chen (20)

Google Q3 2008 Quarterly Earnings Summary
Google Q3 2008 Quarterly Earnings SummaryGoogle Q3 2008 Quarterly Earnings Summary
Google Q3 2008 Quarterly Earnings Summary
Timothy Chen
 
Windows Server 2008 伺服器虛擬化解決方案
Windows Server 2008 伺服器虛擬化解決方案Windows Server 2008 伺服器虛擬化解決方案
Windows Server 2008 伺服器虛擬化解決方案
Timothy Chen
 
Windows Server 2008 伺服器虛擬化解決方案
Windows Server 2008 伺服器虛擬化解決方案Windows Server 2008 伺服器虛擬化解決方案
Windows Server 2008 伺服器虛擬化解決方案
Timothy Chen
 
0514 Windows Server 2008 事件管理機制
0514 Windows Server 2008 事件管理機制0514 Windows Server 2008 事件管理機制
0514 Windows Server 2008 事件管理機制
Timothy Chen
 
0514 Windows Server 2008 事件管理機制
0514 Windows Server 2008 事件管理機制0514 Windows Server 2008 事件管理機制
0514 Windows Server 2008 事件管理機制
Timothy Chen
 
0513 深入Windows Server 2008 系統核心
0513 深入Windows Server 2008  系統核心0513 深入Windows Server 2008  系統核心
0513 深入Windows Server 2008 系統核心
Timothy Chen
 
0509 Windows Serevr 2008 新世代網路應用程式
0509 Windows Serevr 2008 新世代網路應用程式0509 Windows Serevr 2008 新世代網路應用程式
0509 Windows Serevr 2008 新世代網路應用程式
Timothy Chen
 
0506 Windows Server 2008 終端機服務
0506 Windows Server 2008 終端機服務0506 Windows Server 2008 終端機服務
0506 Windows Server 2008 終端機服務
Timothy Chen
 
0502 Windwos Server 2008 Card Space 新一代身份驗證機制
0502 Windwos Server 2008 Card Space 新一代身份驗證機制0502 Windwos Server 2008 Card Space 新一代身份驗證機制
0502 Windwos Server 2008 Card Space 新一代身份驗證機制
Timothy Chen
 
1204 Windows Server 2008 檔案儲存與分行管理技術
1204 Windows Server 2008 檔案儲存與分行管理技術1204 Windows Server 2008 檔案儲存與分行管理技術
1204 Windows Server 2008 檔案儲存與分行管理技術
Timothy Chen
 
0425 Windows Server 2008 與 WSS下之表單工作與工作流程的整合
0425 Windows Server 2008 與 WSS下之表單工作與工作流程的整合0425 Windows Server 2008 與 WSS下之表單工作與工作流程的整合
0425 Windows Server 2008 與 WSS下之表單工作與工作流程的整合
Timothy Chen
 
0416 Windows Server 2008 Native IPv6 新功能介紹
0416 Windows Server 2008 Native IPv6 新功能介紹0416 Windows Server 2008 Native IPv6 新功能介紹
0416 Windows Server 2008 Native IPv6 新功能介紹
Timothy Chen
 
0328 Windows Server 2008 應用程式相容性
0328 Windows Server 2008 應用程式相容性0328 Windows Server 2008 應用程式相容性
0328 Windows Server 2008 應用程式相容性
Timothy Chen
 
1130 Windows server 2008 - IIS 7.0 伺服器效能管理
1130 Windows server 2008 - IIS 7.0 伺服器效能管理1130 Windows server 2008 - IIS 7.0 伺服器效能管理
1130 Windows server 2008 - IIS 7.0 伺服器效能管理
Timothy Chen
 
1116 Windows server 2008 - 使用 IIS 7.0 建置安全站台
1116 Windows server 2008 - 使用 IIS 7.0 建置安全站台1116 Windows server 2008 - 使用 IIS 7.0 建置安全站台
1116 Windows server 2008 - 使用 IIS 7.0 建置安全站台
Timothy Chen
 
Tech Net Taiwan Resources Intro
Tech Net Taiwan Resources IntroTech Net Taiwan Resources Intro
Tech Net Taiwan Resources Intro
Timothy Chen
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
Timothy Chen
 
1026 Windows Server 2008 Active Directory 版權管理服務
1026 Windows Server 2008 Active Directory 版權管理服務1026 Windows Server 2008 Active Directory 版權管理服務
1026 Windows Server 2008 Active Directory 版權管理服務
Timothy Chen
 
1107 Windows server 2008 - IIS 7.0 架構與建置
1107 Windows server 2008 - IIS 7.0 架構與建置1107 Windows server 2008 - IIS 7.0 架構與建置
1107 Windows server 2008 - IIS 7.0 架構與建置
Timothy Chen
 
1214 使用 Windows Server 2008 架構 Media Service
1214 使用 Windows Server 2008 架構 Media Service1214 使用 Windows Server 2008 架構 Media Service
1214 使用 Windows Server 2008 架構 Media Service
Timothy Chen
 
Google Q3 2008 Quarterly Earnings Summary
Google Q3 2008 Quarterly Earnings SummaryGoogle Q3 2008 Quarterly Earnings Summary
Google Q3 2008 Quarterly Earnings Summary
Timothy Chen
 
Windows Server 2008 伺服器虛擬化解決方案
Windows Server 2008 伺服器虛擬化解決方案Windows Server 2008 伺服器虛擬化解決方案
Windows Server 2008 伺服器虛擬化解決方案
Timothy Chen
 
Windows Server 2008 伺服器虛擬化解決方案
Windows Server 2008 伺服器虛擬化解決方案Windows Server 2008 伺服器虛擬化解決方案
Windows Server 2008 伺服器虛擬化解決方案
Timothy Chen
 
0514 Windows Server 2008 事件管理機制
0514 Windows Server 2008 事件管理機制0514 Windows Server 2008 事件管理機制
0514 Windows Server 2008 事件管理機制
Timothy Chen
 
0514 Windows Server 2008 事件管理機制
0514 Windows Server 2008 事件管理機制0514 Windows Server 2008 事件管理機制
0514 Windows Server 2008 事件管理機制
Timothy Chen
 
0513 深入Windows Server 2008 系統核心
0513 深入Windows Server 2008  系統核心0513 深入Windows Server 2008  系統核心
0513 深入Windows Server 2008 系統核心
Timothy Chen
 
0509 Windows Serevr 2008 新世代網路應用程式
0509 Windows Serevr 2008 新世代網路應用程式0509 Windows Serevr 2008 新世代網路應用程式
0509 Windows Serevr 2008 新世代網路應用程式
Timothy Chen
 
0506 Windows Server 2008 終端機服務
0506 Windows Server 2008 終端機服務0506 Windows Server 2008 終端機服務
0506 Windows Server 2008 終端機服務
Timothy Chen
 
0502 Windwos Server 2008 Card Space 新一代身份驗證機制
0502 Windwos Server 2008 Card Space 新一代身份驗證機制0502 Windwos Server 2008 Card Space 新一代身份驗證機制
0502 Windwos Server 2008 Card Space 新一代身份驗證機制
Timothy Chen
 
1204 Windows Server 2008 檔案儲存與分行管理技術
1204 Windows Server 2008 檔案儲存與分行管理技術1204 Windows Server 2008 檔案儲存與分行管理技術
1204 Windows Server 2008 檔案儲存與分行管理技術
Timothy Chen
 
0425 Windows Server 2008 與 WSS下之表單工作與工作流程的整合
0425 Windows Server 2008 與 WSS下之表單工作與工作流程的整合0425 Windows Server 2008 與 WSS下之表單工作與工作流程的整合
0425 Windows Server 2008 與 WSS下之表單工作與工作流程的整合
Timothy Chen
 
0416 Windows Server 2008 Native IPv6 新功能介紹
0416 Windows Server 2008 Native IPv6 新功能介紹0416 Windows Server 2008 Native IPv6 新功能介紹
0416 Windows Server 2008 Native IPv6 新功能介紹
Timothy Chen
 
0328 Windows Server 2008 應用程式相容性
0328 Windows Server 2008 應用程式相容性0328 Windows Server 2008 應用程式相容性
0328 Windows Server 2008 應用程式相容性
Timothy Chen
 
1130 Windows server 2008 - IIS 7.0 伺服器效能管理
1130 Windows server 2008 - IIS 7.0 伺服器效能管理1130 Windows server 2008 - IIS 7.0 伺服器效能管理
1130 Windows server 2008 - IIS 7.0 伺服器效能管理
Timothy Chen
 
1116 Windows server 2008 - 使用 IIS 7.0 建置安全站台
1116 Windows server 2008 - 使用 IIS 7.0 建置安全站台1116 Windows server 2008 - 使用 IIS 7.0 建置安全站台
1116 Windows server 2008 - 使用 IIS 7.0 建置安全站台
Timothy Chen
 
Tech Net Taiwan Resources Intro
Tech Net Taiwan Resources IntroTech Net Taiwan Resources Intro
Tech Net Taiwan Resources Intro
Timothy Chen
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
Timothy Chen
 
1026 Windows Server 2008 Active Directory 版權管理服務
1026 Windows Server 2008 Active Directory 版權管理服務1026 Windows Server 2008 Active Directory 版權管理服務
1026 Windows Server 2008 Active Directory 版權管理服務
Timothy Chen
 
1107 Windows server 2008 - IIS 7.0 架構與建置
1107 Windows server 2008 - IIS 7.0 架構與建置1107 Windows server 2008 - IIS 7.0 架構與建置
1107 Windows server 2008 - IIS 7.0 架構與建置
Timothy Chen
 
1214 使用 Windows Server 2008 架構 Media Service
1214 使用 Windows Server 2008 架構 Media Service1214 使用 Windows Server 2008 架構 Media Service
1214 使用 Windows Server 2008 架構 Media Service
Timothy Chen
 

Recently uploaded (20)

Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
IEDM 2024 Tutorial2_Advances in CMOS Technologies and Future Directions for C...
organizerofv
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 

0505 Windows Server 2008 一日精華營 Part II

  • 1. Module 3 Windows Server 2008 Branch Office Scenario
  • 2. Clinic Outline Branch Office Server Deployment and Administration Branch Office Security Branch Corp RODC
  • 3. Branch Office Server Deployment and Administration
  • 4. Domain Name System (DNS) Server Role Background zone loading Read-only domain controller support Global Names zone DNS client changes Link-Local multicast name resolution (LLMNR) Domain controller location
  • 5. AD Domain Services New AD MMC Snap-In Features Find Command New Options for Unattended Installs
  • 6. Restartable AD Domain Services (AD DS) 3 Possible States: AD DS Started AD DS Stopped Active Directory Restore Mode
  • 7. Demonstration: Branch Office Server Deployment and Administration AD DS Installation Wizard Stopping and restarting AD DS
  • 8. AD Domain Services Auditing What changes have been made to AD DS auditing?
  • 9. AD Domain Services Backup and Recovery Considerations What’s New? General Requirements
  • 10. Improved Server Deployment (Windows Server Virtualization) Addresses the following challenges: Server Consolidation Development and Testing Business Continuity/Disaster Recovery 64-bit Next Generation technology Server Core as a host system
  • 11. File Services DFS Names Spaces Replication SYSVOL Server Message Block (SMB) 2.0
  • 12. Next Generation TCP/IP Stack Receive Windows Auto-Tuning Compound TCP Throughput Optimization in High-Loss Environments Neighbor Unreachability Detection Changes in Dead Gateway Detection Changes in PTMU Black Hole Router Detection Routing Compartments ESTATS Support Network Diagnostics Framework Support New Packet Filtering Model with Windows Filtering Platform
  • 13. Read-Only Domain Controller (RODC) New Functionality AD Database Unidirectional Replication Credential Caching Password Replication Policy Administrator Role Separation Read-Only DNS Requirements/Special Considerations RODC
  • 14. Read-only DC, RODC 管理員的處置方式 入侵者看到的資訊
  • 15. Implementation/Usage Scenarios Maintain physical security of data at the branch office Maintain physical security of servers at the branch office Provide secure IP-based communications with the branch office Control which computers can communicate on the branch office network
  • 16. Recommendations Implement a Password Replication Policy Deploy a Read-Only Domain Controller at the branch office Implement administrator role separation Implement BitLocker Drive Encryption; do not require a PIN or USB device if no local admin Implement Network Access Protection Use IPSec for network communications
  • 17. Module 4 Security and Policy Enforcement in Windows Server 2008
  • 18. Overview Methods of Security and Policy Enforcement Network Location Awareness Network Access Protection Windows Firewall with Advanced Security (WFAS) Internet Protocol Security (IPSec) Windows Server Hardening Server and Domain Isolation Active Directory Domain Services Auditing Read-Only Domain Controller (RODC) BitLocker Drive Encryption Removable Device Installation Control Enterprise PKI
  • 19. Technical Background Windows Firewall with Advanced Security Internet Security Protocol (IPSec) Active Directory Domain Services Auditing Read-Only Domain Controller (RODC) Enterprise PKI BitLocker Drive Encryption
  • 20. Windows Firewall with Advanced Security
  • 21. Demonstration: Windows Firewall with Advanced Security Creating Inbound and Outbound Rules Creating a Firewall Rule Limiting a Service
  • 22. IPSec Integrated with WFAS IPSec Improvements Simplified IPSec Policy Configuration Client-to-DC IPSec Protection Improved Load Balancing and Clustering Server Support Improved IPSec Authentication Integration with NAP Multiple Authentication Methods New Cryptographic Support Integrated IPv4 and IPv6 Support Extended Events and Performance Monitor Counters Network Diagnostics Framework Support
  • 23. BitLocker Drive Encryption (BDE) Data Protection Drive Encryption Integrity Checking BDE Hardware and Software Requirements
  • 24. Implementation/Usage Scenarios Enforce Security Policy Improve Domain Security Improve System Security Improve Network Communications Security
  • 25. Recommendations Implement Network Access Protection Use Windows Firewall and Advanced Security to implement IPSec Deploy Read-Only Domain Controllers, where appropriate Implement BitLocker Drive Encryption Carefully test and plan all security policies Take advantage of PKI improvements
  • 26. Network Access Protection in Windows Server 2008
  • 27. Overview Network Access Protection Net work Access Protection Network Access Quarantine Control Internal, VPN and Remote Access Client Only VPN and Remote Access Clients IPSec, 802.1X, DHCP and VPN DHCP and VPN NAP NPS and Client included in Windows Server 2008 ; NAP client included in Vista Installed from Windows Server 2003 Resource Kit
  • 28. NAP Infrastructure Health Policy Validation Health Policy Compliance Automatic Remediation Limited Access
  • 29. NAP Enforcement Client 802.1X VPN IPSec DHCP NPS RADIUS
  • 30. Demonstration: Network Access Protection Create a NAP Policy Using the MMC to Create NAP Configuration settings Create a new RADIUS Client Create a new System Health Validator for Windows Vista and Windows XP SP2
  • 31. Implementation/Usage Scenarios Ensuring the Health of Corporate Desktops Checking the Health and Status of Roaming Laptops Determining the Health of Visiting Laptops Verify the Compliance of Home Computers
  • 32. Recommendations Carefully test and verify all IPSec Policies Use Quality of Service to improve bandwidth When using IPSec – employ ESP with encryption Plan to Prioritize traffic on the network Apply Network Access Protection to secure client computers Consider Using Domain Isolation