Lab 13 - Implementación de AD RMS
Lab 13 - Implementación de AD RMS
Lab 13 - Implementación de AD RMS
AVANZADO
LABORATORIO N° 13
Implementación de AD RMS
Alumno(s): Nota
Grupo: Ciclo:
Requiere No
Excelente Bueno Puntaje
Criterios de Evaluación (4pts) (3pts)
Mejora Acept.
Logrado
(2pts) (0pts)
Identifica correctamente los requerimientos
para la creación de un dominio con diferentes
sitios.
Prepara correctamente el entorno para la
instalación de AD DS complejo
Instala, configura un dominio con múltiples
sitios.
Redacta correctamente los pasos principales
de la implementación y conclusiones.
Se comunica de manera efectiva, trabaja con
orden, limpieza y puntualidad.
Seguridad:
Ubicar maletines y/o mochilas en el gabinete al final de aula de Laboratorio o en los casilleros
asignados al estudiante.
No ingresar con líquidos, ni comida al aula de Laboratorio.
Al culminar la sesión de laboratorio apagar correctamente la computadora y la pantalla, y ordenar
las sillas utilizadas.
Equipos y Materiales:
Máquinas virtuales:
DVD:
De Windows Server 2012
Procedimiento:
Escenario
Como uno de los administradores, necesita planear e implementar una solución AD RMS que proveerá
el nivel de protección requerida por el equipo de seguridad. La solución AD RMS debería proporcionar
muchas opciones diferentes que pueden ser adaptados por una variedad de negocios y requerimientos
de seguridad.
Lab Setup
1. Abrir VMware Workstation y crear un “snapshot” de las máquinas virtuales: LON-DC1, LON-SVR1,
LON-CL1, TREY-DC1 y TREY-CL1.
2. Encender las máquinas virtuales e iniciar sesión con la cuenta Administrador y la contraseña
Pa$$w0rd.
Escenario
7. Right-click the Users container, click New, and then click Group.
8. In the Create Group dialog box, enter the following details, and then click OK:
Group name: ADRMS_SuperUsers
E-mail: [email protected]
9. Right-click the Users container, click New, and then click Group.
10. In the Create Group dialog box, enter the following details, and then click OK.
Group name: Executives
E-mail: [email protected]
12. Press and hold the Ctrl key, and click the following users:
Aidan Delaney
Bill Malone
13. In the tasks pane, click Add to group.
14. In the Select Groups dialog box, type Executives, and then click OK.
5. In the Add Roles and Features dialog box, click Add Features, and then click Next four times.
6. Click Install, and then click Close.
15. On the Cryptographic Mode page, click Cryptographic Mode 2, and then click Next.
16. On the Cluster Key Storage page, click Use AD RMS centrally managed key storage, and
then click Next.
17. On the Cluster Key Password page, enter the password Pa$$w0rd twice, and then click Next.
18. On the Cluster Web Site page, verify that Default Web Site is selected, and then click Next.
19. On the Cluster Address page, provide the following information, and then click Next:
Connection Type: Use an unencrypted connection (http://)
Fully Qualified Domain Name: adrms.adatum.com
Port: 80 (Note that in production, we would use an encrypted, that is, https connection)
20. On the Licensor Certificate page, type Adatum AD RMS, and then click Next.
21. On the SCP Registration page, click Register the SCP now, and then click Next.
22. Click Install, close All Servers Task Details dialog box and then click Close.
Note: You must sign out before you can manage AD RMS.
Entregable 1. Capture la pantalla que muestre que el grupo Super User ha sido habilitado.
Escenario
Después de implementar el servidor AD RMS, debe configurar las plantillas de directivas de derechos
y las directivas de exclusión para la organización.
6. Click Next.
7. On the Add User Rights page, click Add.
8. On the Add User or Group page, type [email protected], and then click OK.
9. When [email protected] is selected, under Rights, click View. Verify that Grant owner
(author) full control right with no expiration is selected, and then click Next.
10. On the Specify Expiration Policy page, choose the following settings, and then click Next:
Content Expiration: Expires after the following duration (days): 7
Use license expiration: Expires after the following duration (days): 7
11. On the Specify Extended Policy page, click Require a new use license every time content is
consumed (disable client-side caching), click Next, and then click Finish.
8. Click the Rights Policy Templates node, and in the Distributed Rights Policy Templates area,
click Change distributed rights policy templates file location.
9. In the Rights Policy Templates dialog box click Enable export.
10. In the Specify Templates File Location (UNC) text box, type \\LON-SVR1\RMSTEMPLATES,
and then click OK.
Results: After completing this exercise, you should have configured AD RMS templates.
Escenario
Como parte de la implementación AD RMS, usted necesita asegurarse que la funcionalidad AD RMS
está extendida a la implementación de AD RMS de Trey Research. Configurará las directivas de
confianza requeridas y entonces validar que el contenido compartido entre ambas empresas está
protegido.
6. In the Export Trusted Publishing Domain dialog box, enter the password Pa$$w0rd twice, and
then click Finish.
7. Switch to TREY-DC1.
8. In the Active Directory Rights Management Services console, under the Trust Policies node,
click the Trusted Publishing Domains node.
9. In the Actions pane, click Export Trusted Publishing Domains.
10. In the Export Trusted Publishing Domain dialog box, click Save As.
11. In the Export Trusted Publishing Domain File As dialog box, navigate to \\LON-SVR1\export,
set the file name to TREYRESEARCH-TPD.xml, and then click Save.
12. In the Export Trusted Publishing Domain dialog box, enter the password Pa$$w0rd twice, and
then click Finish.
► Task 3: Import the Trusted User Domain policy from the partner domain
1. Switch to LON-SVR1.
2. In the Active Directory Rights Management Services console, under the Trust Policies node,
click the Trusted User Domains node.
3. In the Actions pane, click Import Trusted User Domain.
4. In the Import Trusted User Domain dialog box, enter the following details, and then click Finish:
Trusted user domain file: \\LON-SVR1\Export\TREYRESEARCH-TUD.bin
Display Name: Trey Research
5. Switch to TREY-DC1.
6. In the Active Directory Rights Management Services console, under the Trust Policies node,
click the Trusted User Domains node.
7. In the Actions pane, click Import Trusted User Domain.
8. In the Import Trusted User Domain dialog box, enter the following details, and then click Finish:
Trusted user domain file: \\LON-SVR1\Export\ADATUM-TUD.bin
Display Name: Adatum
► Task 4: Import the Trusted Publishing Domains policy from the partner domain
1. Switch to LON-SVR1.
2. In the Active Directory Rights Management Services console, under the Trust policies node,
click the Trusted Publishing Domains node.
3. In the Actions pane, click Import Trusted Publishing Domain.
4. In the Import Trusted Publishing Domain dialog box, enter the following information, and then
click Finish:
Trusted publishing domain file: \\LON-SVR1\export\TREYRESEARCH-TPD.xml
Password: Pa$$w0rd
Display Name: Trey Research
5. Switch to TREY-DC1.
6. In the Active Directory Rights Management Services console, under the Trust policies node,
click the Trusted Publishing Domains node.
7. In the Actions pane, click Import Trusted Publishing Domain.
8. In the Import Trusted Publishing Domain dialog box, provide the following information, and
then click Finish:
Trusted publishing domain file: \\LON-SVR1\export\adatum-tpd.xml
Password: Pa$$w0rd
Display Name: Adatum
Results: After completing this exercise, you should have implemented the AD RMS trust policies.
Escenario
Como paso final en la implementación, debe validar que la configuración está trabajando
correctamente.
15. Click the Gear icon in the far upper right of Internet Explorer.
16. Select Internet Options.
17. Select the Security tab.
18. In the Select a zone to view or change security settings, click the Local intranet icon, and then
click the Sites button.
19. Click the Advanced button.
20. Click the Add button, click Close, and then click OK twice.
27. A Microsoft Word dialog box informing you it is connecting to the server will display.
28. After the dialog box closes, click Protect Document and Restrict Access, and then click
Restricted Access.
29. In the Permission dialog box, enable Restrict Permission to this document.
30. In the Read text box, type [email protected], and then click OK.
5. Click the Gear icon in the far upper right of Internet Explorer.
6. Select Internet Options.
7. Select the Security tab.
8. In the Select a zone to view or change security settings, click the Local intranet icon, and then
click the Sites button.
9. Click the Advanced button.
10. Click the Add button, click Close, and then click OK twice.
15. In the First things first dialog box, select the Ask me later radio button, and then click Accept.
• In the Office dialog box, click the letter X in the far upper right.
16. When the document opens, verify that you are unable to modify or save the document.
17. Select a line of text in the document.
18. Right-click the text, and verify that you cannot make changes.
19. Click View Permission on the yellow bar, review the permissions, and then click OK.
20. Close Word.
21. Click to the Start screen, click the Bill Malone icon, and then click Sign out.
Entregable 6. Capture la pantalla que muestre los permisos sobre el documento protegido.
5. Click the Gear icon in the far upper right of Internet Explorer.
6. Select Internet Options.
7. Select the Security tab.
8. In the Select a zone to view or change security settings, click the Local intranet icon, and then
click the Sites button.
9. Click the Advanced button.
10. Click the Add button, click Close, and then click OK twice.
11. Close Internet Explorer.
12. On the taskbar, click the File Explorer icon.
13. In the File Explorer window, navigate to \\lon-svr1\docshare.
14. In the docshare folder, double-click the Executives Only document.
15. Verify that Carol is unable to open the document. You will receive a message with option to
Change User or request access.
► Task 4: Open and edit the rights-protected document as an authorized user at Trey Research
1. Sign in to LON-CL1 as Adatum\Aidan using the password Pa$$w0rd.
2. On the Start screen, type Word. In the Results area, click Word 2013.
3. In Word, click Blank document.
4. In the Word document, type the following text:
This document is for Trey Research only, it should not be modified.
5. Click File, click Protect Document, click Restrict Access, and then click Connect to Digital
Rights Management Servers and get templates.
6. In the Permission dialog box, enable Restrict Permission to this document.
7. In the Read text box, type [email protected], click OK, click Save, and then click Browse.
8. In the Save As dialog box, save the document to the \\lon-svr1\docshare location as
TreyResearch-Confidential.docx. Close Word.
9. Click to the Start screen, click the Aidan Delaney icon, and then click Sign Out.
10. Sign on to Trey-CL1 as TREYRESEARCH\administrator with a password of Pa$$w0rd.
11. On the Start screen, select the Desktop tile.
12. On the taskbar, click the File Explorer icon
13. In File Explorer, right-click This PC, and then select Properties
14. In the System window, in the console tree, select Remote settings.
15. Select the Select Users button.
16. Click the Add button.
17. In the Select Users and Groups, pop-up, in the Enter the object names to select text box, type
April, and then click OK three times.
24. Click the Gear icon in the far upper right of Internet Explorer.
25. Select Internet Options.
26. Select the Security tab.
27. In the Select a zone to view or change security settings, click the Local intranet icon, and then
click the Sites button.
28. Click the Advanced button.
29. Click the Add button, click Close, and then click OK twice.
30. Close Internet Explorer.
31. On the taskbar, click the File Explorer icon.
32. In the File Explorer window, navigate to \\lon-svr1\docshare.
33. In the Windows Security dialog box, enter the following credentials, and then click OK:
Username: Adatum\Administrator
Password: Pa$$w0rd
37. If the First things first page opens, click the Use recommend settings radio button and then
click Accept.
38. When the document opens, verify that you are unable to modify or save the document.
39. Select a line of text in the document and verify that you cannot make any changes.
40. Right-click the text, and verify that you cannot make changes.
41. Click View Permission, review the permissions, and then click OK.
Results: After completing this exercise, you should have verified that the AD RMS deployment is
successful
1. Volver el estado de las máquinas virtuales al “snapshot” creado antes de iniciar el laboratorio.
Conclusiones:
Indicar las conclusiones que llegó después de los temas tratados de manera práctica en este
laboratorio.