Download - Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

Transcript
Page 1: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

Lesson 11: Configuring and Maintaining Network Security

MOAC 70-687: Configuring Windows 8.1

Page 2: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

Overview• Exam Objective 3.3: Configure and

maintain network securityo Configure Windows Firewallo Configure Windows Firewall with Advanced

Securityo Configure connection security rules (IPsec)o Configure authenticated exceptionso Configure network discovery

Page 3: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

WPA-Enterprise WPA-Personal Defending

Against MalwareLesson 11: Configuring and Maintaining Network

Security

Page 4: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

© 2013 John Wiley & Sons, Inc. 4

Malware• Malicious software infiltrates or damages a

computer system without the user’s knowledge or consent.

• Malicious software includes viruses, Trojan horses, worms, spyware, and adware.

• The term most commonly used to collectively refer to these malicious software technologies is malware.

Page 5: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

© 2013 John Wiley & Sons, Inc. 5

Windows 8.1 Action Center

• The Action Center is a centralized console that enables users and administrators to access, monitor, and configure the various Windows 8.1 security mechanisms.

• Action Center is a service that starts automatically and runs continuously on Windows 8.1 computers, by default.

• The service constantly monitors the different security mechanisms running on the computer.

Page 6: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

© 2013 John Wiley & Sons, Inc. 6

Windows 8.1 Action Center

The Action Center menu in the notification area

Page 7: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

© 2013 John Wiley & Sons, Inc. 7

Accessing Action Center

• To open Action Center:o Click the notification area icono Open from Control Panel

• Action Center displays information about the problems it has discovered, and links to possible solutions.

Page 8: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

Accessing Action Center

The Action Center window

© 2013 John Wiley & Sons, Inc. 8

Page 9: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

© 2013 John Wiley & Sons, Inc. 9

Understanding Firewalls

• A firewall is a software program or hardware device that protects a computer by allowing certain types of network traffic in and out of the system while blocking others.

• To filter traffic, firewalls use rules, which specify which packets are allowed to pass through the firewall and which are blocked.

Page 10: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

© 2013 John Wiley & Sons, Inc. 10

Understanding Firewalls

• Firewalls typically base their filtering on the TCP/IP characteristics at the network, transport, and application layers of the Open Systems Interconnection (OSI) reference model.o IP addresses – Represent specific computers

on the network. o Protocol numbers – Identify the transport

layer protocol being used by the packets.o Port numbers – Identify specific applications

running on the computer.

Page 11: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

© 2013 John Wiley & Sons, Inc. 11

Monitoring Windows Firewall

• Windows Firewall is one of the programs monitored by the Action Center service.

• When you open the Windows Control Panel and click System and Security > Windows Firewall, a Windows Firewall window appears.

• Each of the headings contains the following information:o Whether the computer is connected to a domain, private,

or public networko Whether the Windows Firewall service is currently turned

on or offo Whether inbound and outbound connections are blockedo Whether users are notified when a program is blocked

Page 12: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

Monitoring Windows Firewall

The Windows Firewall window

© 2013 John Wiley & Sons, Inc. 12

Page 13: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

© 2013 John Wiley & Sons, Inc. 13

Using the Windows Firewall Control Panel

• On the left side of the Windows Firewall window is a series of links that enable you to configure Windows Firewall to allow a specific app or feature through its barrier, change the firewall notification settings, turn Windows Firewall on and off, restore the default firewall settings, and configure advanced firewall settings.

• Clicking Change notification settings or Turn Windows firewall on or off displays the Customize settings for each type of network dialog box.

Page 14: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

Using the Windows Firewall Control Panel

The Customize settings for each type of network page

© 2013 John Wiley & Sons, Inc. 14

Page 15: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

© 2013 John Wiley & Sons, Inc. 15

Blocking Incoming Connections

• Select the Block all incoming connections, including those in the list of allowed apps checkbox to block all unsolicited attempts to connect to your computer.

• This does not prevent you from performing common networking tasks, like accessing web sites and sending or receiving emails.

Page 16: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

© 2013 John Wiley & Sons, Inc. 16

Allowing Programs through the Firewall

• Click Allow an app or feature through Windows Firewall to open the Allow programs to communicate through Windows Firewall dialog box.

• In this dialog box, you can open a port through the firewall for specific programs and features installed on the computer.

• Opening a port in your firewall is inherently dangerous. The more holes you make in a wall, the greater the likelihood that intruders will get in.

Page 17: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

Allowing Programs through the Firewall

The Allow programs to communicate through Windows Firewall page

© 2013 John Wiley & Sons, Inc. 17

Page 18: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

© 2013 John Wiley & Sons, Inc. 18

Using the Windows Firewall with Advanced Security

Console• The Windows Firewall with Advanced

Security snap-in for Microsoft Management Console (MMC) provides direct access to the rules that control the behavior of Windows Firewall.

• To access the console from the Windows Control Panel, click System and Security > Administrative Tools > Windows Firewall with Advanced Security.

Page 19: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

Using the Windows Firewall with Advanced Security

Console

The Windows Firewall with Advanced Security snap-in

© 2013 John Wiley & Sons, Inc. 19

Page 20: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

© 2013 John Wiley & Sons, Inc. 20

Configuring Profile Settings

• You can change default behavior by clicking the Windows Firewall Properties link.

• The Windows Firewall with Advanced Security on Local Computer Properties sheet is configurable.

Page 21: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

Configuring Profile Settings

The Windows Firewall with Advanced Security on Local Computer Properties sheet

© 2013 John Wiley & Sons, Inc. 21

Page 22: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

© 2013 John Wiley & Sons, Inc. 22

Creating Rules• In the Windows Firewall with Advanced

Security console, you can work with the rules in their raw form.

• Selecting either Inbound Rules or Outbound Rules in the left pane displays a list of all the rules operating in that direction.

• The rules that are currently operational have a checkmark in a green circle, while the rules not in force are grayed out.

Page 23: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

Creating Rules

The Inbound Rules list in the Windows Firewall with Advanced Security console

© 2013 John Wiley & Sons, Inc. 23

Page 24: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

© 2013 John Wiley & Sons, Inc. 24

Default Windows Firewall Rules

Settings  Private Public Domain

Core Networking Enabled Enabled Enabled

File and Printer Sharing

Enabled Disabled Disabled

Homegroup Disabled N/A N/A

Network Discovery Enabled Disabled Disabled

Remote Desktop Disabled Disabled Disabled

Page 25: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

© 2013 John Wiley & Sons, Inc. 25

The New Rule Wizard• The New Rule Wizard takes you through

the process of configuring the following sets of parameters:o Rule Type o Programo Protocol and Ports o Scopeo Actiono Profileo Name

Page 26: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

© 2013 John Wiley & Sons, Inc. 26

Importing and Exporting Rules

• After creating and modifying rules in the Windows Firewall with Advanced Security console, you can export them to a policy file.

• To create a policy file, select Export Policy from the Action menu in the Windows Firewall with Advanced Security console, and specify a name and location for the file.

Page 27: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

© 2013 John Wiley & Sons, Inc. 27

Using Filters• The term filter refers to a feature that

enables you to display rules according to:o The profile they apply too Their current stateo The group to which they belong

Page 28: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

© 2013 John Wiley & Sons, Inc. 28

IP Security (IPsec)• The IPsec standards are a collection of

documents that define a method for securing data while it is in transit over a TCP/IP network.

• IPsec includes a connection establishment routine, during which computers authenticate each other before transmitting data, and a technique called tunneling, in which data packets are encapsulated within other packets for their protection.

Page 29: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

© 2013 John Wiley & Sons, Inc. 29

Configuring Connection Security

Rules • When you right-click the Connection Security

Rules node and select New Rule from the context menu, the New Connection Security Rule Wizard takes you through the process of configuring the following these parameters:o Rule Type o Endpointso Requirements o Authentication Method o Profile o Name

Page 30: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

© 2013 John Wiley & Sons, Inc. 30

Configuring Windows Firewall with Group

Policy• When you browse to the Computer Configuration\

Policies\Windows Settings\Security Settings\Windows Firewall with Advanced Security node in a GPO, you see the interface, which is similar to that of the Windows Firewall with Advanced Security console.

• Clicking Windows Firewall Properties opens a dialog box with the same controls as the Windows Firewall with Advanced Security on Local Computer Properties sheet and clicking Inbound Rules and Outbound Rules launches the same wizards as the console.

Page 31: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

Configuring Windows Firewall with Group Policy

The Windows Firewall with Advanced Security node in a GPO

© 2013 John Wiley & Sons, Inc. 31

Page 32: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

Lesson Summary• Malware is malicious software created specifically for the

purpose of infiltrating or damaging a computer system without the user’s knowledge or consent. This type of software includes a variety of technologies, including viruses, Trojan horses, worms, spyware, and adware.

• Action Center is a centralized console that enables users and administrators to access, monitor, and configure the various Windows 8.1 security mechanisms.

• Windows Firewall is a software program that protects a computer by allowing certain types of network traffic in and out of the system while blocking others.

• You configure Windows Firewall by creating rules that specify what types of traffic to block and/or allow.

Page 33: Lesson 11: Configuring and Maintaining Network Security MOAC 70-687: Configuring Windows 8.1.

Copyright 2013 John Wiley & Sons, Inc.. All rights reserved. Reproduction or translation of this work beyond that named in Section 117 of the 1976 United States Copyright Act without the express written consent of the copyright owner is unlawful. Requests for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc.. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.