Sneak Preview To Windows 2008: Sneak Preview To Windows 2008
Sneak Preview To Windows 2008: Sneak Preview To Windows 2008
Sneak Preview To Windows 2008: Sneak Preview To Windows 2008
Dynamic Partitioning
Self--Healing NTFS
Self
In the past, NTFS corruptions required running
Chkdsk (which often could only be done on the
next reboot)
In Windows Server 2008, an NTFS worker thread
pe
o s background
bac g ou d C
ds -type co
ect o s
performs
ChkdskChkdsk
corrections
when NTFS detects a corrupt file or directory
Minor disk errors are transparent to the user
Only corrupted files/folder inaccessible during repairs
unlike lock of the entire volume
No need to reboot to repair corruptions
SMB2
SMB is the original Windows remote file
system protocol
Cant adapt to new NTFS features
Not designed for todays large data sizes
Hypervisor
Windows Server 2008 is the
basis for Microsofts new
virtualization offering
(codename Viridian)
Hypervisor to control low level
access to system resources
Processors,, Local APICs,,
physical memory
Kernel enlightenments for
improved performance and
scalability
Root
Partition
Child
Partition
Child
Partition
Apps
Apps
Apps
Server
Core
OS 1
OS 2
Windows hypervisor
Hardware
Windows Vista /
Windows Server 2008
Account
Services
Account
Services
LocalSystem
Wireless Configuration
System Event
Notification
Network Connections
(netman)
COM+ Event System
NLA
Rasauto
Shell Hardware
Detection
Themes
Telephony
Windows Audio
Error Reporting
Workstation
ICS
LocalSystem
App Management
Wireless Configuration
LocalSystem
BITS
Themes
R
Rasman
TrkWks
Error Reporting
6to4
Task scheduler
R
RemoteAccess
t A
Rasauto
WMI
Network Service
DNS Client
ICS
DHCP Client
browser
Server
W32time
Cryptographic Services
Telephony
PolicyAgent
Nlasvc
Windows Audio
TCP/IP NetBIOS helper
WebClient
SSDP
Event Log
Workstation
Remote registry
Network
Service
DNS Client
Local Service
SSDP
WebClient
TCP/IP NetBIOS helper
Remote registry
RemoteAccess
DHCP Client
W32time
Rasman
browser
6to4
Help and support
Task scheduler
TrkWks
Cryptographic Services
Removable Storage
WMI Perf Adapter
Automatic updates
WMI
App Management
Secondary Logon
BITS
Firewall Restricted
Fully Restricted
Network Service
Network Restricted
Local Service
No Network
Access
Local Service
Fully Restricted
Active Directory
Wireless Controller
Wireless Access Points
Certificate Authority
(Optional)
The Recipient
Terminal Services
TS Remote Programs
Central Location
New features
TS Gateway
TS Remote Programs
SSO for managed clients
Branch Office
New in RDP 6
Spanning multiple monitors (mstsc.exe /span)
Going beyond 1,600 x 1,200 resolution limit (8,192k video
memory) to 4,096 x 2,048
Introducing 32 bpp color mode
New performance counters added in conjunction with support for
32 bpp color depth
Support of ClearType fonts
Support of AeroAero-Glass via RDP
Shortcuts published to
Desktop
Start menu
Add/remove programs
Mobile or
Home Office
TS Remote Programs
TS Remote Programs
Push GP-published
applications
Active Directory
Publish
Windows 2008
RDP Client
Publish
manually
Windows 2008
Terminal Server
Terminal Services
License Server
TS Web Access
AD Mode
HTTPs
Active Directory
TS
Web Access
RDP
Windows 2008
RDP Client
Load
Balancer
Windows 2008
Terminal Servers
Session
Directory
TS Web Access
TS Gateway
Allows secure seamless connection without VPN
Tunnels RDP over HTTPS
Place TS behind multiple firewalls without opening multiple
firewall ports other than 443
Uses same infrastructure as Outlook over RPC/HTTPS
Allows access to
Terminal Server Remote Desktops & Programs
Client Remote Desktop
Server Remote Desktop
Active Directory
TSWA
SSL
Windows 2008
RDP Client
TS
Gateway
Load
Balancer
Windows 2008
Terminal Servers
Session
Directory
Policy--driven access
Policy
Policy Servers
e.g. MSFT Security
Center, SMS, Antigen
or 3rd party
Windows
Vista Client
Not policy
compliant
DHCP, VPN
Switch/ Route
Organizational
Benefits
MSFT
Network
Policy
Server
Policy Validation
Determines whether the computers are compliant with the companys security policy.
Compliant computers are deemed healthy
Restricted
N
Network
t
k
Policy
compliant
5
Fix Up
Servers
e.g. MSFT
WSUS, SMS &
3rd party
Corporate
Network
Enhanced Security
All communications are authenticated, authorized & healthy
Network Restriction
Restricts network access to computers based on their health
Remediation
Provides necessary updates to allow the computer to get healthy. Once healthy, the
network restrictions are removed
Ongoing Compliance
Changes to the companys security policy or to the computers health may dynamically
result in network restrictions
Defense--inDefense
in-depth on your terms with DHCP, VPN, IPsec
IPsec,, 802.1X
Policy--based access that IT Pros can set and control
Policy
Healthy Client
Unhealthy Client
DHCP
VPN (Microsoft
and 3rd Party)
Full access
Restricted VLAN
802.1X
Full access
Restricted VLAN
IPsec
Improvements in Directory
Services
Terminology
Server roles
Server functionalities like AD DS, AD LDS, DNS,
DHCP
Centrally managed through Server Manager
Server Core
Minimal server installation option
Reduces attack surface because fewer
components installed
Threat mitigation
Attacker perspective
Read
Only DC
Hub
RODC
Branch
1
6
1 User logs on and authenticates
2 RODC: Looks in DB: "I don't have the users secrets"
3 Forwards Request to Windows Server 2008 DC
4 Windows Server 2008 DC authenticates request
5 Returns authentication response and TGT back to the RODC
6 RODC gives TGT to User and RODC will cache credentials
Two--stage DC promotion
Two
First stage: domain administrator prepre-creates RODC computer
account
Second stage: machine administrator at branch promotes the
machine to RODC
Server Core
Active Directory
Dcpromo /unattend:Unattendfile
Dcpromo now installs Active Directory
Ocsetup not supported for Active Directory
IIS--WebServerManagementTools
IIS
IIS--IIS6ManagementCompatibility
IIS
IIS--ManagementScriptingTools
IIS
WAS--WindowsActivationService
WAS
WAS--ProcessModel
WAS
Not included:
IIS-FTPPublishingService
IISIIS--FTPServer
IIS
IIS--WebServer
IIS
IIS--ApplicationDevelopment
IIS
A li i D
l
IIS--CommonHttpFeatures
IIS
IIS--HealthAndDiagnostics
IIS
IIS--Performance
IIS
IIS--Security
IIS
Value Propositions
Improve the efficiency of remote office server
deployment
and administration
Mitigate physical security risks in remote offices
Improve the efficiency of WAN communications
Password Synchronization
Pluggable
Authentication
Module (pam)
Authentication integration
UNIX scripting and application migration tools
Password
Synchronization
Service
in
Windows Server
Single
Sign On
Daemon (ssod)
HP-UX
Solaris
AIX
Red Hat
Linux
LEGEND:
Windows Password Changed
UNIX Password Changed
Subordinate SubordinateSubordinate
Master
NIS Clients
Clustering Improvements
Networking Enhancements
New bestbest-of
of--both
both--worlds quorum model
Hybrid of legacy Majority Node Set (MNS) logic and
Shared Disk Quorum model
This model will replace both existing models
Majority of Nodes
Vote
Vote
Vote
Each node
counts as 1 vote
Vote
Vote
Vote
Shared Storage
Device gets 1 vote
Witness Disk
Single file server could serve as the Witness for multiple clusters
Improved from Windows Server 2003 to support greater than 2 nodes
Witness
File Share on an
independent server
Vote
Vote
Shared Storage
Device is master
Vote
Each node
counts as 1 vote
10
Secure HTTPS
Internet
Administrator
Shared
Config
Manage Remotely
XML
Site Owner
App
Web.config
Web Farm
Delegated Management
Management Improvements
Category sorting
for easy to find
features
Group Policy
Templates
ADM Templates now in
ADMX files (ADMX, ADML)
ADM
LGPOs
LGPO
Group Policy
Settings
Group Policy
Logging
Administrative log
Applications and Services log
XML based event logs
New Tools - GPOLogView
Admin
Group Policy
Enhancements
User
Network Location
Awareness (NLA)
ADMX
NLA
Windows Vista/Windows
Server 2008
SysVol
FRS/DFS--R
FRS/DFS
Policies
GUID
+
ADM
+
+ Policy Definations
ADMX, ADML Files
ADMX
ADML
11
ADM to ADMX/L
Before Windows Vista and 2008 when you created a GPO,
an ADM subdir is created in the GPO automatically ((Sysvol
Sysvol))
If you merely view a GPO which does not have the ADM
directory, it is recreated
The ADM subdirectory includes five ADM files, totaling about
3.5 MB
100 GPOs? Thats about 350 MB of data, replicated to all
DCs.
Thats
DC Th
t Sysvol
S
l Bloat!
Bl t!
The Central Store is a domain
domain--wide directory
In Sysvol at \Policies
Policies\\PolicyDefinitions
Stores ADMX files (normally one per component)
One subdirectory for each supported language (en_us
(en_us,, fr,
fr, etc.), each
storing ADML files
Windows
XP,
Windows
Server 2003
and
Windows
2000
Can manage
Windows XP
Windows 2000
1
2
WIM
3
WDS
Capture
Volume
Run Sysprep
Windows
Server 2003
Configure
Deployment Server
with images
Server Manager
WDS management
Create
transmission for
install images
Select install
image and deploy
Differs from existing Windows 2000 and Windows 2003 quota solution,
which is logical, volume, perper-user
user--based
Quota Management allows a physical size to be specified on a volume or
folder basis
Restricts the data to grow beyond the defined size for the volume or
folder. All files count toward quota
This means compression on files enables more data to be saved
Real--time checking. Can cancel a current I/O.
Real
Hard or soft mode
Auto Apply for automatic sub
sub--folder quota assignment
User data folders on file server common use
Nesting of quotas supported and most restrictive will always apply
Available only on NTFS volumes and only volumes with quotas are
monitored
Due to SMB 1.0 limitations free disk space is shown based on the root of
the share and not current folder. Addressed with SMB 2.0.
12
Backward Compatibility
Trigger on Event
Event Logs
Network Conditions
Synchronized Tasks
Random Delayed Start
Events
Password Resilience
Execution History
Event Forwarding
Failure Notification
Convergent Computing
Services
Next Seminar
Introduction to Microsoft PowerShell
Questions?
Free
To Register for this Seminar:
Email - [email protected]
--or-Call (510) 444-5700 x179 (Seminar Registrations)
--or-Write PowerShell (SC, SF, Sac) on todays seminar eval form
to register for the upcoming event
13