Network Security:
This is the most recent part of my computer technology life. It has been a logical progression from tinkering to repairing, to programming, to configuring. Once I mastered the PCs, I moved on to servers. I had a great job at a software development company where I progressed into the server world. I started with NT4 and was introduced to Windows 2000. I had become a Novell Netware Engineer in 1994, but hired into a Microsoft centric company in 1995 to not really ever look back.
I found a job as a network administrator, and began getting the network environment into shape. Since mid-2006, I have focused my efforts to ‘security'. That is really a broad term, but in general I am talking about restricting a domain environment to limit user abilities on a network, capabilities of a user account on a specific computer, and network devices. There are other items, such as backups, that are only important when something goes terribly wrong. Then, it is the difference between lost intellectual property and jobs, possibly even the ability for a company to remain viable. Read on…
Firewalls & Routers
Depending on the size of your environment, these may be the same device. Home and Small Office users are familiar with those name brand routers… Linksys/Cisco, Netgear, D-Link and Belkin. Because they add Network Address Translation (NAT), a different internal (Local Area Network or LAN) IP address scheme than what is on the outside (Wide Area Network or WAN), their function inherently provides basic firewall capabilities. The important thing is that they keep outsiders from probing into your network of devices and possibly gaining access to them.
Firewalls are designed for the point where your network accesses the Internet. Larger ones provide filtering for such things as restricting access to bad sites (also called Unified Threat Management or UTM) and filtering things that need to come into your network (i.e. – mail or web server). Some offer VPN tunnel connectivity, for remotely connecting back into the internal network from the outside. These features range from very basic and insecure to complex with multiple authentication protocols for enhanced security.
Routers, in general, are designed for interconnecting multiple sites, either through a direct connection or secured route through an Internet connection. These can be wired or wireless, and should include an encryption protocol to mask the data being transferred such that it will not be intercepted. VPN tunnels are usually utilized, and Network Address Translation protocols, which create at least a basic firewall connection.
Smart Network Switches
Not all network switches are the same. There are capabilities categories, called “Layers”, based on the OSI model for network communications.. A “Level 1” network switch just routes traffic, and usually has multi-path channels for multiple simultaneous paths. Other than that, these switches do not log or control anything.
“Smart” switches are “Layer 2” or “Layer 3”, and inclusive of the lower layers. These switches provide levels of control and reporting that can segment and isolate traffic (Virtual Local Area Network or VLAN), and allow exceptions for limited connectivity between them. I personally use Enterasys network switches which add profile management. This level of functionality is similar to having a firewall on every network switch port, with profile definitions and network switch port groupings.
Traffic modeling is a major form of network security that occurs before taking into account workstation or server settings.
Windows Active Directory & Group Policy
The crux of a Windows Domain Environment… A Windows Network Administrator lives in these two environments. Active Directory defines every ‘object’ that exists in the Domain.
Active Directory Users and Computers is the place to start. Learn how to create users, computers, and groups. In each Object, specific settings can be assigned, including unique logon scripts and network permissions for User objects. Groups are ways to organize objects to apply permissions. The most popular use is to determine the level of access, if any, to directories and network resources. The second is email distribution groups. This is the foundation of creating a secure network. You can start by searching through Microsoft’s immense array of material. To get you started, here is a Tech-Net link…
http://technet.microsoft.com/en-us/library/bb727067.aspx .
Group Policy Management takes the Active Directory assignments and assigns functionality to Active Directory Organizational Units (OU). There is a difference between a Group and an OU. The graphical difference in Active Directory is that the OU folder icon will have an image of a document on it while the Group folder will not. To start, make sure that an Organizational Unit folder is created in Active Directory for objects intended for Group Policy Management. Just about every Windows operating system control is customizable. Printers can be assigned, functions (i.e. – Remote Desktop and custom scripts) can be assigned or denied. To get you going, here is another Tech-Net link -
http://technet.microsoft.com/en-us/library/cc753298.aspx .
Windows Event Logs
If you are going any direction towards Network Administration for Windows environments, become familiar with the Event Logs. They look like a mystery to the uninitiated, but the Windows operating system logs important information, here. The primary logs are Application, Security and System. By far, the majority of these events are benign notations of things just doing what they should. The ones to look for are the ones showing issues. These can include services failing, credential issues, application problems, and attempts to do unwanted things (i.e. - log into a network device, either remotely, directly or through an IP port).
To be sure, some alerts may be difficult to read. And, one may not even know what to be looking for. Doing various searches on your favorite search engine and Microsoft’s, a number of links can be found with at least the first several hundred basics to be looking for. To get you started on finding events of interest for your environment, here is a link from Microsoft for Server 2008R2 and Windows 7 - http://www.microsoft.com/en-us/download/details.aspx?id=21561. Don't stop with just these Microsoft alerts. There are plenty more. Try logging into a server and logging off, both from a console or remote session. Many applications add event log entries that are instrumental in identifying issues with them.
Automating the review of Event logs is paramount, these days. No one really has time to perform daily reviews of the server logs. Luckily, many companies have software for sale. These include (hyperlinked to vendor site for you to review): GFI LAN Guard, Solar Winds Log & Event Manager, and Manage Engine Event Log Analyzer, just for a few. These applications are not inexpensive. But, they can be configured to generate near real time alerts for email and page, as well as scheduled reporting for audit.
. Manage Engine allows their version to be run monitoring 5 devices for no cost, and it happens to be the software I chose for my office environment. I initially ran the free version, until I was approved to purchase the Professional version and enough licenses for my environment. Today, I have over 300 alerts programmed.
Sys Logs
Other non-Windows network devices (such as Layer 2/3 network switches, routers and firewalls) can be set to send Sys Log information to a logging server. These are similar to Windows Event Logs, and may supply important information regarding network traffic passing through them (or not). The level of data being sent depends on the particular device and what setting levels it may have. I have Enterasys network switches that allow me to monitor things such as: reboots, firmware updates, logging on or off of a device, and attempts to connect with improper SNMP credentials. I am able to monitor Sys Log with Manage Engine’s Event Log Analyzer.
Patch Management
Keeping a system updated is paramount, any more. Just about every popular operating system and application is being exploited in an attempt to gain access to systems that access the Internet. Just going to web sites deemed as ‘safe’ no longer apply. Many web servers use applications that can be compromised (i.e. – Apache database, MySQL, SQL, and Java). Sometimes, exploits are discovered in active use (called “zero day”) and patches often just take time to be created. One user accessing a compromised web site can cause grief across an entire network.
. For Windows environments, newer server versions have the option of installing Windows Server Update Services, also called WSUS. This is a non-added cost to a network environment that also updates workstations.It does have limitations, but any small office of under 100 computers needs to consider implementing this server Role. Aftermarket applications are available that can do this, as well as patch the major third party applications. The same three companies mentioned in the “Windows Event Log” paragraph also sell patch management products. Those would be; GFI LAN Guard, Solar Winds Patch Manager,
and Manage Engine Desktop Central.These are linked for your easy review, and be aware that these applications get pricey… especially for larger networks. I personally had issues with GFI LAN Guard not working with my network security settings, and the network security part wasn't as good as I expected it to be. Manage Engine allows the Desktop Central application to run without cost on a network of 25 or fewer devices. My network has more, and I am using that application. Desktop Central has a number of added features that are indispensable to me, now that I am using it.
.