70-742: Identity With Windows Server 2016 (In Development)
70-742: Identity With Windows Server 2016 (In Development)
alojukwu@
Joe Lurie
Senior Consultant - Microsoft
[email protected]
Approver
1. Users have separate admin accounts
PRIV AD
2. As admin, puts in request to have
Domain Admin rights for 60 minutes
3. Approver approves the request
4. Admin added to “Domain Admins”
shadow group for limited time
5. The separate admin account used to
login to complete tasks
6. Privileged admin right expires and
shadow group membership removed
Admin PAM Portal
These accounts are not used for email, and do not stay “Domain Admin” indefinitely.
Way to join a computer to the domain
• System Control Panel
• System added to default container unless pre-staged
• Windows PowerShell
• Add-Computer -ComputerName ‘Server1' -DomainName
‘amer.corp.contoso.com' -Credential Get-Credential –Restart
• System added to default container unless pre-staged
You logon to the server and open an elevated PowerShell window, and
enter your credentials.
• Account Policies
• Password policy
• Account lockout policy
• Kerberos Policy
Exam Tip: Watch for scenarios where a deleted object comes back into Active Directory
Additional active directory maintenance tasks
Perform object- and container-level recovery
Ntdsutil or Restore-ADObject (need Recycle Bin to get the link-valued attributes)
Enable-ADOptionalFeature ‘Recycle Bin Feature’ -scope ForestOrConfigurationSet -target DomainName -server
DomainControllerName
Clean up metadata
Deletion of DC from default OU results in automatic metadata cleanup (same as Server 2008/2012)
Deletion of DC’s NTDS Settings from Sites & Services also results in automatic metadata cleanup
Otherwise – ntdsutil, metadata cleanup, remove selected server <DN of DC>
Types of Trusts
• Forest: Transitive. Can be used to share resources between forests
• Shortcut: Transitive. Used to reduce the number of hops between domains
• External: Non-transitive. Access to resources in external (separate) forest
• Realm: Non-transitive. Used to access resources in a non-Windows Kerberos environment
Additional trust information
Trust authentication
• Domain wide: Grants access to all users in the domain
• Selective: Administrators control access to individual resources
• Forest wide: Grants access to all users in the forest
SID Filtering
• Prevents administrators in Trusted forest from granting themselves (or others) rights in the trusting forest
• SID Filtering Quarantining can be disabled.
Types of Trusts
• Forest: Transitive. Can be used to share resources between forests
• Shortcut: Transitive. Used to reduce the number of hops between domains
• External: Non-transitive. Access to resources in external (separate) forest
• Realm: Non-transitive. Used to access resources in a non-Windows Kerberos environment
New to server 2016: jit forest
• Create new Server 2016 forest Existing JIT
• No need to change existing forest Forest Forest
• Create new ‘PIM’ trust to existing forest
• Add shadow principals in new forest
• Shadow group which is new object class PIM Forest Trust
created in config NC. Unlike security group,
the security identifier (SID) with a domain in
another forest TTL group
membership
• Add shadow admin user
• Remove admins from existing groups
PIM
• PIM system manages TTL groups
• Workflow to add shadow user to shadow
admin group
Configuring sites and site links
Sites
• Configured in Active Directory Sites and Services
• Logically represent the physical network
• Associated to other sites by IP Subnets
• Logically connected to other sites using Site Links
Site Links
• Used for active directory replication between domain controllers in different sites
• Each site link has a cost associated to it, making one more preferable than another
• Includes replication schedules and protocols used
Exam Tip: Watch for scenarios where logon times or other authentication traffic is slow Check for
correct IP Subnets being linked to the correct sites, that a domain controller is placed in the site, etc…
Practice Question
You are the administrator for corp.contoso.com. Your company password policy states that users must change their
passwords every 60 days. However, a new security policy states that members of the Legal Department should be
required to change their passwords every 30 days.
You need to ensure users of the Legal department are required to change their passwords every 30 days.
You must accomplish this with the least amount of administrative effort.
A. Create a child domain named legal.corp.contoso.com. Add the users to the new domain. Change the default
password policy to specify 30 days.
B. Create a new Organizational Unit (OU) named Legal. Add the users to the Legal OU. Create a new Group Policy
Object (GPO) that sets the password policy to 30 days.
C. Create a new Organizational Unit (OU) named Legal. Add the users to the Legal OU. Create a password Settings
Object (PSO) with the proper settings, and link it to the Legal OU
D. Create a new Security Group named Legal. Add the users to the Legal Security Group. Create a Password Settgins
Object (PSO) with the proper settings. Link it to the Legal Security Group
Manage and maintain active directory domain services
Tip #2 Tip #3
across systems
Starter GPO’s
• Functions like a template
• Can only contain settings found under Administrative Templates
• All GPO’s created from this will start with the same settings
• Once created, New-> GPO will list the Starter GPO’s as a selection to start from
Managing GPO’s
• Backup, Restore, Export, Import can all be done with PowerShell:
• backup-GPO, Import-GPO, CopyGPO, Restore-GPO commands
• Reset default GPOs: dcdiag can be used to reset the Default Domain or Default Domain Controllers GPO to its
default
Deploy to Computers
• Create a new, or edit an existing, GPO liked to the Site, Domain, or OU that contains the computer objects
• Under Computer Configuration, select Software Installation and create a new package
• Select Advanced to upgrade, point to an MST file, add a Category, etc…
• Automatically installed at next reboot after computer applies the policy
Deploy to Users
• Create a new, or edit an existing, GPO liked to the Site, Domain, or OU that contains the user objects
• Under User Configuration, select Software Installation and create a new package
• Select to Assign or Publish the application to the user
Exam Tip: Assigning creates a Start menu icon, and installs the software when the user clicks the icon.
Publishing makes it available in Control Panel\Programs
Common group policy settings
Folder redirection
• Redirects the user’s common profile folders to a network share or other location
Scripts
• Added to Computer Configuration as a Start up or Shut Down Script, or User Configuration as a Logon or Logoff
script
• Can be written in any scripting language the client understands
• Can only be run at startup, shutdown, logon, or logoff. Will not be run during a refresh cycle
Securedc.inf The same as the above only specifically for domain controllers
Compatws.inf Designed to resolve compatibility issues with legacy operating systems (see
below)
Administrative templates
Administrative templates settings
• Common settings that write and enforce a registry key or value
• Found under Computer Configuration (HKLM hive) or User Configuration (HKCU hive)
• Tattoos the registry: If you set a setting to Enabled, the registry is reflected by this. If you later change that setting to
Not Configured, the registry is not changed. You must set it to Disabled to automatically back-out the registry
setting
You have been asked to create a new GPO that applies to all of the Windows 7 systems in your company.
You need to accomplish this with the least amount of administrative effort.
A. Create a new GPO with the required settings. Create a WMI filter for Windows 7 systems. Link the WMI filter to the
GPO. Link the GPO to the Workstations OU.
B. Create a new GPO with the required settings. Create a WMI filter for Windows 10 systems. Link the WMI filter to the
GPO. Link the GPO to the Workstations OU.
C. Create a new GPO with the required settings. Create a child OU under Workstations named Windows 10. Move the
Windows 10 computers into the new OU. Link the GPO to the Workstations OU.
D. Create a new GPO with the required settings. Create a child OU under Workstations named Windows 7. Move the
Windows 7 computers into the new OU. Link the GPO to the Windows 7 OU.
Create and manage group policy
Tip #2 Tip #3
Group Policy can be used Use Group Policy
for Software Installation. Management Console to
Know the difference check the status of the
between Assigning and underlying infrastructure
Publishing Software
04-Implement Active Directory Certificate Services
(AD CS)
Install and configure AD
certificate services
• Install Active Directory Integrated Enterprise
Certificate Authority (CA)
• Install offline root and subordinate Cas
• Install standalone Cas
• Configure Certificate Revocation List (CRL)
distribution points
• Install and configure Online Responder
• Implement administrative role separation
• Configure CA backup and recovery
Active directory certificate services
Enterprise Certificate Authority (CA)
• Requires access to Active Directory
• Can be installed on any version of Server 2016, including Server Core, but excluding Nano Server (at this time)
• Root CA’s are the top level of the hierarchy and can send certs to Subordinate CA’s which then issue certs that have
been validated by the root CA
• Offline CA’s can send a cert to a removeable device, which can then be transported to the requesting server
Online Responder
• Receives and responds to requests for a certificate
• Responds about individual certificates instead of downloading full CRL
Certificate Autoenrollment
• Group Policy in User Configuration\Windows Settings\Security Settings\Public Key Policies
• Renew expired certificates, update pending, and remove revoked options
• Update certificates that use certificate templates
• Auto-enrollment eases administrative overhead
Key Recovery
• Key recovery agent account (must be registered with CA)
• Configure certificate template for key archival (enroll users based on new template)
• Not protected until certificate has key recovery enabled
Practice Question
You are security administrator for contoso.com. Contoso has an Enterprise Certificate Authority (CA) named CA1.
Tip #2 Tip #3
Know how to create a CRL Active Directory
Distribution Point in IIS Certificate Services can be
installed on Server Core
but cannot be installed on
Nano Server (at this time)
05-Implement Identity Federation and Access
Solutions
Install and configure active
directory federation services
(AD FS)
• Upgrade and migrate previous AD FS workloads
to Windows Server 2016
• Implement claims-based authentication, including
Relying Party Trusts
• Configure authentication policies
• Configure multi-factor authentication implement
and configure device registration
• Integrate AD FS with Microsoft Passport
• Configure for use with Microsoft Azure and Office
365configure AD FS to enable authentication of
users stored in LDAP directories
Active directory federation services
What’s new to 2016?
• Farm Behavior Level (FBL) has been changed to
an integer, not a string. Current is Windows
Server 2016 TP5
Claim Rules
• Rules include to permit or deny all users, or to
pass-through or filter an incoming claim
• Created in AD FS console in Relying Party Trusts
node
Device registration
• After registering device, default user gets 90 days authentication, providing he uses AD FS once every 14 days
• If not, on day 15 he’ll be asked for authentication
More information
• AD FS Server 2016 landing page:
https://technet.microsoft.com/en-us/windows-server-docs/identity/active-directory-federation-services
Implement web application
proxy (WAP)
• Install and configure WAP
• Implement WAP in pass-through mode
• Implement WAP as AD FS proxy
• Integrate WAP with AD FS
• Configure AD FS requirements
• Publish web apps via WAP
• Publish Remote Desktop Gateway applications
• Configure HTTP to HTTPS redirects
• Configure internal and external Fully Qualified
Domain Names (FQDNs)
Web application proxy (WAP)
What is it?
• Remote access role service that is used to help secure remote success to web-based applications
• Isolates web apps from direct contact with the internet
• Pre-authenticates internet users to AD FS
How to install
• Server Manager
• PowerShell: Install-WindowsFeature Web-Application-Proxy
How to configure
• Launch remote access management
• Select Run web application proxy configuration wizard
Web application proxy authentication methods
Authentication methods
• Pass-through preauthentication
• AD FS preauthentication
Pass-through preauthentication
• No preauthentication is performed
• Valid requests sent to web-based apps on the intranet
• User authenticated only after connecting to the web-app
AD FS preauthentication
• AD FS preauthenticates the user vefore passing it to the web-app
• Configure the claims-aware application in AD FS as a relying party
Publishing web apps
What can be published?
• SharePoint services
• Exchange services
• Remote desktop gateway servcies
• Custom line-of-business apps
One of the relying parties has mandated that all Contoso users are authenticate using both certificate authentication and
Windows authentication.