Secure a Network Infrastructure Flashcards
Windows Firewall Software Defined Firewall IPSec DNSSEC SMB Message Analyzer
In which version of the Windows was the Windows (Defender) Firewall with Advanced Security MMC introduced?
Windows Vista / Server 2008 R1
What is the difference between the Windows Firewall M MC and the Windows Firewall control panel applet?
The MMC extension is far more configurable and intended for administrative use.
The Control Panel Applet allows for easier management of the more basic features. It is geared towards consumer use.
When configured through Windows Firewall, what functionality does IPSec offer?
IPSec enables the requiring of authentication from any device attempting to communicate with your device.
IPSec also can require that specific network traffic be encrypted.
What is the purpose of an isolation policy?
Domain isolation policies prevent devices joined to the domain from receiving unsolicited network traffic from devices that are not domain joined.
What is a boundary zone?
Boundary zones are for devices that must be able to receive requests from devices that are not isolated devices.
What is an encryption zone?
Encryption zones are for devices that store sensitive data and must be protected during network transmission.
What is a Connection Security Rule?
A rule in Windows Defender Firewall that contains a set of conditions and an action to be applied to network packets that match the condition. Can be configured to allow, block, or even require the packet to be protected by IPSec. Formerly referred to as an IPSec rule.
What is Certificate-based Isolation?
Certificate-based Isolation allows for adding devices that do not support Kerberos v5 into an isolated domain. Every device in the isolated domain that is unable to use Kerb v5 are given a device certificate that can allow them to authenticate with one another.
What are reasons to have a Host-Based Firewall?
Host-based firewalls secure devices by dropping all network traffic that does not match the administrator-designated rule set for permitted network traffic.
What are the benefits of using a Basic Firewall Policy Design doctrine?
- Network traffic that is a reply to a request from the local device is permitted.
- Network traffic that is unsolicited and matches a rule for allowed traffic is permitted
- Outbound traffic not specifically blocked is permitted
What mechanism of Windows Firewall can be used to restrict access to only trusted devices?
Connection Security Rules
In general, how do you secure a network from untrusted devices?
Authenticate traffic. This way only authenticated traffic is permitted to core resources.
In general, how do you obtain isolation using Windows Firewall?
Use Connection Security Rules to restrict traffic to be authenticated either with certificates or with Kerberos v5 in the AD domain
What are the benefits of domain isolation using Windows Firewall?
- Devices in the isolated domain accept unsolicited inbound traffic only when it can be authenticated as coming from another device in the domain. Exemption rules can be configured to allow inbound traffic from computers unable to utilize IPSec.
- Devices in the isolated domain can still send outbound traffic to untrusted devices and receive responses to the outbound requests.
How would you equip devices in a boundary zone to communicate with both protected internal devices and unprotected external devices?
Boundary zones would be configured to use connection security rules that request and do not require authentication.
What are the benefits of using Windows Defender Firewall?
Reducing the risk of network security threats.
Safeguard sensitive data and intellectual property
Extend value of existing investments
Does Windows Firewall encrypt traffic by default?
No. Windows Firewall makes no attempt to encrypt traffic by default. However, this can be enabled.
What does requiring authentication for connections not protect against?
Eavesdropping on the network traffic shared between two hosts if the traffic is unencrypted.
What are the benefits of encrypting traffic with Windows Firewall?
- Devices in the encryption zone require authentication to communicate with other devices
- Devices in the encryption zone require all inbound and outbound traffic to be encrypted
- Devices in the encryption zone are good candidates for isolation.
What are Network Access Groups (NAGs)?
Groups authorized to access a device that has its access restricted using Windows Defender Firewall.
How do you create a virtual “secure zone” within a domain isolation zone?
Configure Windows Firewall to restrict access to members of certain groups using Network Access groups.
What are the features of restricting access to servers to specific users and groups?
- Isolated services accept unsolicited inbound traffic only from devices that are members of the NAG
- Isolated servers can be implemented as part of an isolated domain and treated as another zone
- Server isolation can be configured independently of an isolated domain
- Server isolation zone can be simultaneously configured as an encryption zone
Why is AD Group Policy recommended as the configuration point of all Connection Security Rules?
AD Group Policy supports centralized management of all connection security rules. These rules can be applied, via GPO, to target servers or server groups (OUs).
You have configured server isolation using connection security rules. You need to configure those servers to be part of your encryption zone. What else would need to be configured?
Configure the devices with rules that force encryption along with restricting access to NAG members.