SlideShare ist ein Scribd-Unternehmen logo
1 von 41
With Windows Server 2012 AD you can

Use GUI management for:
    The Recycle Bin
    Fine Grain Password Policies
Perform simplified and more robust DC installations
Safely virtualize DCs
Clone DCs
Implement Kerberos claims identity
Control access to files and folders with Dynamic Access Control
Protect the RID pool
Use PowerShell for everything
And more…
Make sure PowerShell is your best friend




PowerShell 3.0 with over 2000 cmdlets
   Allows creation scripts with workflow
   AD PowerShell history helps you get started
   Comprehensive cmdlets for replication management
   Newest help files download on demand: Update-Help
Installing Domain Controllers
Dcpromo RIP




              Can be run remotely
Create IFM seed with NTDSUTIL
IFM seed generation no longer requires offline
            defrag (on by default)
Adprep can still be run manually if required




                                               Checks are performed at each stage of the Wizard and
                                                  any issues highlighted before the final validation
DC virtualization
Restoring from an image

 One DC fails
  We can restore an image backup




                                    Any problems?
USN rollback…
                                                                  snapshot
     DSA-GUID = A                     DSA-GUID = B
     InvocationID = E                 InvocationID = M
     highestCommitedUSN =1000         highestCommitedUSN = 3000
 HW vector M,3000                HW vector E,1000


     DSA-GUID = A                     DSA-GUID = B




                                                                             Time
     InvocationID = E                 InvocationID = M
     highestCommitedUSN =4567         highestCommitedUSN = 5679
 HW vector M,5679                HW vector E,4567


     DSA-GUID = A                     DSA-GUID = B
                                                                  Restore
     InvocationID = E                 InvocationID = M
     highestCommitedUSN = 4567        highestCommitedUSN = 3000
 HW vector M,5679                HW vector E,1000
What happens next?

                                                         Add users

 DC1                                      DC2
            DSA-GUID = A                                 DSA-GUID = B
            InvocationID = E                             InvocationID = M
            highestCommitedUSN = 4567                    highestCommitedUSN = 3000
                                                                                     3050
       HW vector M,5679                         HW vector E,1000

                       Send me your changes from 1000
  Checks UTD vectors from
  DC2 and sends changes
                                       Replication OK

              Send me your changes from 5679
                                                                                     It gets worse!
                                                   There aren’t any!
Post Server 2003 SP1 quarantining
                    DSA-GUID = A                    DSA-GUID = B
                    InvocationID = E                InvocationID = M
                    highestCommitedUSN = 4567       highestCommitedUSN = 3050
                HW vector M,5679                HW vector E,1000

                     Send me your changes from 5679
                                                 There aren’t any!


                    Appears more up to date than me, that’s not right!

      Replication               Write event log messages
         log

                        Disable inbound and outbound replication


                                   Stop Netlogon service
Windows Server 2012 solution

 The hypervisor creates an identifier VM-Generation ID (128 bits)
  Exposed to the guest OS via the BIOS ACPI namespace
  Stored by the DC on promotion in the msDS-GenerationID attribute
    An attribute of the DC computer object
 The VM-Generation ID is set during a VM import, copy or
 application of a snapshot
 When the DC boots, if the VM-Generation ID and the
 msDS-GenerationID are not the same
  The DC assumes an AD restore
    InvocationID Changes
      Seen as a new replication source
    RID pool discarded
    Non-authoritative restore of SYSVOL
Hypervisor support
22 January 2013
 Windows Server 2012 Standard Edition (Hyper-V)
 Windows Server 2012 Enterprise Edition (Hyper-V)
 Hyper-V Server 2012 (Hyper-V)
 Windows 8 Professional (Hyper-V)
 Windows 8 Enterprise (Hyper-V)
 VMware Workstation 9.0
 VMware vSphere 5.0 with Update 4
 VMware vSphere 5.1
DC cloning
Cloning steps                Source DC          CloneableDomainControllers


                                                 Check for incompatible components
             PDCE
                                                 Get-ADDCCloningExcludedApplicationList
             W2012

                                                 Remove incompatible components
                                                 or declare them as safe



                                                                               Cloned DC
                                           Create new VM
      XML
DCCloneConfig.XML
Deploy XML to source DC             If ID has changed
or mounted vhd/vhdx copy            cloning starts if XML
(can be on removable media)         exists
Start the copied DC and…
DefaultDCCloneAllowList.XML

Get-ADDCCloningExcludedApplicationList displays any services or
applications that are running that are NOT included in the XML

These applications or services must either be removed or if considered
safe added to CustomDCCloneAllowList.XML

Generate XML using:
 Get-ADDCCloningExcludedApplicationList -GenerateXML
   Xml added to %windir%NTDS
DCCloneConfig.XML

    New-ADDCCloneConfigFile –Static -IPv4Address "192.168.137.202"
    -IPv4DNSResolver "192.168.137.200" -IPv4SubnetMask "255.255.255.0"
    -CloneComputerName "AD-DC3" -IPv4DefaultGateway "192.168.137.1"
    -SiteName "London"
                                           <?xml version="1.0"?>
                                           <d3c:DCCloneConfig xmlns:d3c="uri:microsoft.com:schemas:DCCloneConfig
Create using New-ADDCCloneConfigFile        <ComputerName>rootdc4</ComputerName>
                                            <SiteName>London</SiteName>
or create from sample:                      <IPSettings>
..windowssystem32SampleDCCloneConfig.XML <IPv4Settings>
                                               <StaticSettings>
                                                <Address>192.168.137.202</Address>
DCCloneConfig.xml placed in …windowsNTDS      <SubnetMask>255.255.255.0</SubnetMask>
Alternate locations are available               <DefaultGateway>192.168.137.1</DefaultGateway>
                                                <DNSResolver>192.168.137.200</DNSResolver>
                                               </StaticSettings>
                                             </IPv4Settings>
                                            </IPSettings>
                                           </d3c:DCCloneConfig>
Kerberos enhancements
Kerberos changes

There are a number of other changes to Kerberos to enhance day to day
operations
   Increase to the maximum Kerberos SSPI context buffer size
   PAC group compression
   Warning events for large token sizes
   Increased logging
Major changes
 New Kerberos constrained delegation support
 Claims support
Block cross forest delegation
Delegation                                       by setting netdom trust to “no”
                                                 for /EnableTGTDelegation




     Protect backend services by setting services account parameter –
     PrincipalsAllowedToDelegateToAccount



   Prior to Windows Server 2012, constrained delegation required the
   front- and back-end service accounts to be in the same domain
   2012 allows delegation across domains and forest trusts
Adding claims to the Kerberos token
      Pre-Windows 8                           Windows 8 & Server 2012


                                                                         Compound ID

                                                                     PAC contains a user’s
                           User’s Kerberos             Groups          group and claims
                               Token          User                        information
                                                       Claims
                                                                               +
                                PAC                    Groups         Device information
                                              Device
                                                       Claims
User’s group memberships added to
PAC                                          Authorization can be based on group
Authorization based on group                 membership, user and device claims
membership
Dynamic Access Control

Files can be classified (tagged) and access and audit policies
           applied based on the files classification


       Expression based access control and auditing


Expressions can contain groups, users, and user and device
                          claims


              Access based on compound ID
                  user and device claims
Enabling Kerberos for claims

Enable the KDC administrative template for Support for Dynamic Access
Control and Kerberos armoring
Kerberos armoring also referred to as Flexible Authentication Secure
Tunneling (FAST) provides:
 A protected channel between the Kerberos client and the KDC
    Protection against offline dictionary attacks
 Signs Kerberos error messages
    Prevent spoofing
 Compound identity
Exhaustible resources
DNTs

Each DC keeps track of object written to its database using a
Distinguished Name Tag (DNT)
 The DNT is held in a 2^31 bit number (~ 2 billion)
 The DNT is incremented as each new object is written
 A DNT value is never reused even if an object is deleted
When you run out of DNTs the DC must be demoted and then
repromoted
The DNT value is now exposed through a constructed attribute of
RootDSE
 approximateHighestInternalObjectID
SIDs

    S-1-5-21-1539329446-2123584859-1544097757-5023
          Domain
        subauthority                             RID




SIDs must be unique throughout and across forests
The RID is incremented by one each time a new SID is generated
    This is simple to implement in a single-master environment
    A RID master is required in a multi-master domain controller environment
RID management attributes
                                        RID Master
                            rIDAvailablePool                                  Replicates
                           Holds start of next            7500                                  7500
                          pool to be allocated
Applies for a new pool                                                             No replication

                                                                                        X
when 50% of the current          rIDPreviousAllocationPool             6500                            7000
pool has been consumed
                                     rIDAllocationPool                 6500                            7000

                                                 RID Set used for SID generation

                                 rIDPreviousAllocationPool         Current pool on DC
                                     rIDAllocationPool             Next pool to be used on DC
RID Manager Attributes
            cn=RID Manager$,cn=System,dc=example,dc=com
                                       fSMORoleOwner
                      Distinguished name of the NTDS Settings object

                           rIDAvailablePool (large integer 64-bits)

                       High value                             Low value
           Total number of RIDs that can be     Start of Next RID pool to be allocated
                 created in the domain



 The RID Manager object is replicated to all DCs in the domain
  The rIDAvailablePool attribute is used by the RID Master when allocating the
   next RID pool to a DC
RID problems

 The maximum available RID is held as a 30 bit number
  1073,741,824
    10,000 RIDs/day for the next 294 years
  So why is it an issue?
      Rogue script creating millions of security principles
      Very large RID Block size set
      Incorrect values entered when elevating the RID pool during recovery
      Large numbers of domain controllers removed and re-added
      Bug – new RID pool requested every 30 seconds can occur under certain rare circumstances
        See KB 2618669 for Windows 2008 R2 hotfix
Windows Server 2012

 Warnings at 10% usage of remaining pool size
  After warning recalculates the 10% marker and repeats
  First event at 100 million
    If you receive this you probably have a problem
 Ceiling at 90% usage – intervention required to issue more RIDs
 Max RID block size capped at 15K
  HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesNTDSRID
   ValuesRID Block Size
 Global RID Space Size Unlock
  Global space can use 31 bit number doubling the RIDs available
    2003 & 2008 DCs cannot use the 31 bit RID values
Lots of other improvements

Support for deferred index creation
Off-premises domain join
 Supports DirectAccess clients
Enhanced LDAP logging
New LDAP behaviours
Active Directory Based Activation (AD BA)
 Automatic activation for Windows 8 and Windows Server 2012 machines
 You still require KMS to support downlevel volume-licensing
Lots of other improvements (continued)

Group Managed Service Accounts (gMSA)
 gMSA accounts can run a service across multiple servers
   Services running gMSA accounts only supported on Windows 8 and Windows Server 2012
PowerShell Cmdlets for replication support
So what do we get?

Better GUI support
More robust deployment of DCs
Simplified Active Directory upgrade path
Virtualization safe
Quick deployment via cloning
Fast domain and forest recovery through cloning
Cross-domain and forest constrained delegation
Rich access control and auditing via Dynamic Access Control
Recovery from depleted RID pools
PowerShell everywhere…
TechEd 2013
I will be speaking a TechEd 2013
 Precon: Windows Server DirectAccess
 Other breakouts
Consulting services on request

                         John.craddock@xtseminars.co.uk
                John has designed and implemented computing systems ranging
                from high-speed industrial controllers through to distributed IT
                systems with a focus on security and high-availability. A key player
                in many IT projects for industry leaders including Microsoft, the UK
                Government and multi-nationals that require optimized IT systems.
                Developed technical training courses that have been published
                worldwide, co-authored a highly successful book on Microsoft
                Active Directory Internals, presents regularly at major international
                conferences including TechEd, IT Forum and European summits.
                John can be engaged as a consultant or booked for speaking
                engagements through XTSeminars. www.xtseminars.co.uk

Weitere ähnliche Inhalte

Andere mochten auch

20140727soifvol3 madrebonita
20140727soifvol3 madrebonita20140727soifvol3 madrebonita
20140727soifvol3 madrebonita
Maco Yoshioka
 
Minimum wage mon042514
Minimum wage mon042514Minimum wage mon042514
Minimum wage mon042514
Travis Klein
 
Germansk mytologi og_verdensanskuelse_nor
Germansk mytologi og_verdensanskuelse_norGermansk mytologi og_verdensanskuelse_nor
Germansk mytologi og_verdensanskuelse_nor
Sebastian Hübner
 
Fri lenin and trotsky
Fri lenin and trotskyFri lenin and trotsky
Fri lenin and trotsky
Travis Klein
 
Automatic Annotation in UniProtKB
Automatic Annotation in UniProtKBAutomatic Annotation in UniProtKB
Automatic Annotation in UniProtKB
EBI
 

Andere mochten auch (19)

Programa Electoral de IU Miranda de Ebro
Programa Electoral de IU Miranda de EbroPrograma Electoral de IU Miranda de Ebro
Programa Electoral de IU Miranda de Ebro
 
Active Directory en 2012 : les meilleures pratiques en design, sécurité et ad...
Active Directory en 2012 : les meilleures pratiques en design, sécurité et ad...Active Directory en 2012 : les meilleures pratiques en design, sécurité et ad...
Active Directory en 2012 : les meilleures pratiques en design, sécurité et ad...
 
Франшиза хостела Достоевский
Франшиза хостела ДостоевскийФраншиза хостела Достоевский
Франшиза хостела Достоевский
 
DOWNLOAD
DOWNLOADDOWNLOAD
DOWNLOAD
 
Livre blanc : Guide des bonnes relations banques startups
Livre blanc : Guide des bonnes relations banques startupsLivre blanc : Guide des bonnes relations banques startups
Livre blanc : Guide des bonnes relations banques startups
 
Programme colloque eco conception 26 mars 2015 à Begles
Programme colloque eco conception 26 mars 2015 à BeglesProgramme colloque eco conception 26 mars 2015 à Begles
Programme colloque eco conception 26 mars 2015 à Begles
 
Active Directory
Active Directory Active Directory
Active Directory
 
Defeating public exploit protections (EMET v5.2 and more)
Defeating public exploit protections (EMET v5.2 and more)Defeating public exploit protections (EMET v5.2 and more)
Defeating public exploit protections (EMET v5.2 and more)
 
Whitepaper : Why Third-Party Archiving is Still Necessary in Exchange 2010
Whitepaper : Why Third-Party Archiving is Still Necessary in Exchange 2010 Whitepaper : Why Third-Party Archiving is Still Necessary in Exchange 2010
Whitepaper : Why Third-Party Archiving is Still Necessary in Exchange 2010
 
20140727soifvol3 madrebonita
20140727soifvol3 madrebonita20140727soifvol3 madrebonita
20140727soifvol3 madrebonita
 
Jump start your application monitoring with APM
Jump start your application monitoring with APMJump start your application monitoring with APM
Jump start your application monitoring with APM
 
Swipp Plus Quick Start Guide
Swipp Plus Quick Start GuideSwipp Plus Quick Start Guide
Swipp Plus Quick Start Guide
 
Gambia23
Gambia23Gambia23
Gambia23
 
Minimum wage mon042514
Minimum wage mon042514Minimum wage mon042514
Minimum wage mon042514
 
Personality test
Personality testPersonality test
Personality test
 
Germansk mytologi og_verdensanskuelse_nor
Germansk mytologi og_verdensanskuelse_norGermansk mytologi og_verdensanskuelse_nor
Germansk mytologi og_verdensanskuelse_nor
 
Fri lenin and trotsky
Fri lenin and trotskyFri lenin and trotsky
Fri lenin and trotsky
 
Private Cloud Day Session 1: Building your Private Cloud Infrastructure
Private Cloud Day Session 1: Building your Private Cloud InfrastructurePrivate Cloud Day Session 1: Building your Private Cloud Infrastructure
Private Cloud Day Session 1: Building your Private Cloud Infrastructure
 
Automatic Annotation in UniProtKB
Automatic Annotation in UniProtKBAutomatic Annotation in UniProtKB
Automatic Annotation in UniProtKB
 

Ähnlich wie What’s new in Windows Server 2012 Active Directory?

Ultan Kinahan Business Continuity & Dr With Virtualization And Doubletake
Ultan Kinahan   Business Continuity & Dr With Virtualization And DoubletakeUltan Kinahan   Business Continuity & Dr With Virtualization And Doubletake
Ultan Kinahan Business Continuity & Dr With Virtualization And Doubletake
Nathan Winters
 
3 2--power-aware-cloud
3 2--power-aware-cloud3 2--power-aware-cloud
3 2--power-aware-cloud
BHUVIJAYAVELU
 
Mens jan piet_dnssec-in-practice
Mens jan piet_dnssec-in-practiceMens jan piet_dnssec-in-practice
Mens jan piet_dnssec-in-practice
kuchinskaya
 

Ähnlich wie What’s new in Windows Server 2012 Active Directory? (20)

Automating Azure VMs with PowerShell
Automating Azure VMs with PowerShellAutomating Azure VMs with PowerShell
Automating Azure VMs with PowerShell
 
VMworld 2013: vCloud Powered HPC is Better and Outperforming Physical
VMworld 2013: vCloud Powered HPC is Better and Outperforming PhysicalVMworld 2013: vCloud Powered HPC is Better and Outperforming Physical
VMworld 2013: vCloud Powered HPC is Better and Outperforming Physical
 
Create your own multi node Application Blue Prints using VMware Application D...
Create your own multi node Application Blue Prints using VMware Application D...Create your own multi node Application Blue Prints using VMware Application D...
Create your own multi node Application Blue Prints using VMware Application D...
 
Ultan Kinahan Business Continuity & Dr With Virtualization And Doubletake
Ultan Kinahan   Business Continuity & Dr With Virtualization And DoubletakeUltan Kinahan   Business Continuity & Dr With Virtualization And Doubletake
Ultan Kinahan Business Continuity & Dr With Virtualization And Doubletake
 
VMworld 2013: Data In, Data Out and Data Protected
VMworld 2013: Data In, Data Out and Data Protected VMworld 2013: Data In, Data Out and Data Protected
VMworld 2013: Data In, Data Out and Data Protected
 
70 533 study material
70 533 study material70 533 study material
70 533 study material
 
Moving to ws2003
Moving to ws2003Moving to ws2003
Moving to ws2003
 
Topology Service Injection using Dragonflow & Kuryr
Topology Service Injection using Dragonflow & KuryrTopology Service Injection using Dragonflow & Kuryr
Topology Service Injection using Dragonflow & Kuryr
 
Forbidden fruits of Active Directory – Cloning, snapshotting, virtualization
Forbidden fruits of Active Directory  –  Cloning, snapshotting, virtualization Forbidden fruits of Active Directory  –  Cloning, snapshotting, virtualization
Forbidden fruits of Active Directory – Cloning, snapshotting, virtualization
 
(SDD422) Amazon VPC Deep Dive | AWS re:Invent 2014
(SDD422) Amazon VPC Deep Dive | AWS re:Invent 2014(SDD422) Amazon VPC Deep Dive | AWS re:Invent 2014
(SDD422) Amazon VPC Deep Dive | AWS re:Invent 2014
 
3 2--power-aware-cloud
3 2--power-aware-cloud3 2--power-aware-cloud
3 2--power-aware-cloud
 
DCV
DCVDCV
DCV
 
Windows 2008 R2 Virtualization
Windows 2008  R2  VirtualizationWindows 2008  R2  Virtualization
Windows 2008 R2 Virtualization
 
VMware Disaster Recovery Solution Presentation EN (1).pptx
VMware Disaster Recovery Solution Presentation EN (1).pptxVMware Disaster Recovery Solution Presentation EN (1).pptx
VMware Disaster Recovery Solution Presentation EN (1).pptx
 
AWS re:Invent 2016: Managing and Supporting the Windows Platform on AWS (GPSS...
AWS re:Invent 2016: Managing and Supporting the Windows Platform on AWS (GPSS...AWS re:Invent 2016: Managing and Supporting the Windows Platform on AWS (GPSS...
AWS re:Invent 2016: Managing and Supporting the Windows Platform on AWS (GPSS...
 
Discovery Day 2019 Sofia - Big data clusters
Discovery Day 2019 Sofia - Big data clustersDiscovery Day 2019 Sofia - Big data clusters
Discovery Day 2019 Sofia - Big data clusters
 
Mens jan piet_dnssec-in-practice
Mens jan piet_dnssec-in-practiceMens jan piet_dnssec-in-practice
Mens jan piet_dnssec-in-practice
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
 
ARC304 Solutions in Action - AWS re: Invent 2012
ARC304 Solutions in Action - AWS re: Invent 2012ARC304 Solutions in Action - AWS re: Invent 2012
ARC304 Solutions in Action - AWS re: Invent 2012
 
Moving Enterprise Windows Workloads to AWS – Peter Stanski
Moving Enterprise Windows Workloads to AWS – Peter StanskiMoving Enterprise Windows Workloads to AWS – Peter Stanski
Moving Enterprise Windows Workloads to AWS – Peter Stanski
 

Mehr von Microsoft TechNet - Belgium and Luxembourg

Mehr von Microsoft TechNet - Belgium and Luxembourg (20)

Windows 10: all you need to know!
Windows 10: all you need to know!Windows 10: all you need to know!
Windows 10: all you need to know!
 
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de KeukelaereConfiguration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
 
Windows 8.1 a closer look
Windows 8.1 a closer lookWindows 8.1 a closer look
Windows 8.1 a closer look
 
So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Deploying and managing ConfigMgr Clients
Deploying and managing ConfigMgr ClientsDeploying and managing ConfigMgr Clients
Deploying and managing ConfigMgr Clients
 
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
 
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware UpdatingHands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
 
SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012
 
What’s new in Lync Server 2013: Persistent Chat
What’s new in Lync Server 2013: Persistent ChatWhat’s new in Lync Server 2013: Persistent Chat
What’s new in Lync Server 2013: Persistent Chat
 
What's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & DevicesWhat's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & Devices
 
Office 365 ProPlus: Click-to-run deployment and management
Office 365 ProPlus: Click-to-run deployment and managementOffice 365 ProPlus: Click-to-run deployment and management
Office 365 ProPlus: Click-to-run deployment and management
 
Office 365 Identity Management options
Office 365 Identity Management options Office 365 Identity Management options
Office 365 Identity Management options
 
SharePoint Installation and Upgrade: Untangling Your Options
SharePoint Installation and Upgrade: Untangling Your Options SharePoint Installation and Upgrade: Untangling Your Options
SharePoint Installation and Upgrade: Untangling Your Options
 
The application model in real life
The application model in real lifeThe application model in real life
The application model in real life
 
Microsoft private cloud with Cisco and Netapp - Flexpod solution
Microsoft private cloud with Cisco and Netapp -  Flexpod solutionMicrosoft private cloud with Cisco and Netapp -  Flexpod solution
Microsoft private cloud with Cisco and Netapp - Flexpod solution
 
Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise
 
Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management
 
Network Management in System Center 2012 SP1 - VMM
Network Management in System Center 2012  SP1 - VMM Network Management in System Center 2012  SP1 - VMM
Network Management in System Center 2012 SP1 - VMM
 
Hackers (Not) Halted
Hackers (Not) Halted Hackers (Not) Halted
Hackers (Not) Halted
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

What’s new in Windows Server 2012 Active Directory?

  • 1.
  • 2. With Windows Server 2012 AD you can Use GUI management for:  The Recycle Bin  Fine Grain Password Policies Perform simplified and more robust DC installations Safely virtualize DCs Clone DCs Implement Kerberos claims identity Control access to files and folders with Dynamic Access Control Protect the RID pool Use PowerShell for everything And more…
  • 3.
  • 4. Make sure PowerShell is your best friend PowerShell 3.0 with over 2000 cmdlets  Allows creation scripts with workflow  AD PowerShell history helps you get started  Comprehensive cmdlets for replication management  Newest help files download on demand: Update-Help
  • 6. Dcpromo RIP Can be run remotely
  • 7. Create IFM seed with NTDSUTIL IFM seed generation no longer requires offline defrag (on by default)
  • 8. Adprep can still be run manually if required Checks are performed at each stage of the Wizard and any issues highlighted before the final validation
  • 10. Restoring from an image One DC fails  We can restore an image backup Any problems?
  • 11. USN rollback… snapshot DSA-GUID = A DSA-GUID = B InvocationID = E InvocationID = M highestCommitedUSN =1000 highestCommitedUSN = 3000 HW vector M,3000 HW vector E,1000 DSA-GUID = A DSA-GUID = B Time InvocationID = E InvocationID = M highestCommitedUSN =4567 highestCommitedUSN = 5679 HW vector M,5679 HW vector E,4567 DSA-GUID = A DSA-GUID = B Restore InvocationID = E InvocationID = M highestCommitedUSN = 4567 highestCommitedUSN = 3000 HW vector M,5679 HW vector E,1000
  • 12. What happens next? Add users DC1 DC2 DSA-GUID = A DSA-GUID = B InvocationID = E InvocationID = M highestCommitedUSN = 4567 highestCommitedUSN = 3000 3050 HW vector M,5679 HW vector E,1000 Send me your changes from 1000 Checks UTD vectors from DC2 and sends changes  Replication OK Send me your changes from 5679 It gets worse! There aren’t any!
  • 13. Post Server 2003 SP1 quarantining DSA-GUID = A DSA-GUID = B InvocationID = E InvocationID = M highestCommitedUSN = 4567 highestCommitedUSN = 3050 HW vector M,5679 HW vector E,1000 Send me your changes from 5679 There aren’t any! Appears more up to date than me, that’s not right! Replication Write event log messages log Disable inbound and outbound replication Stop Netlogon service
  • 14. Windows Server 2012 solution The hypervisor creates an identifier VM-Generation ID (128 bits)  Exposed to the guest OS via the BIOS ACPI namespace  Stored by the DC on promotion in the msDS-GenerationID attribute  An attribute of the DC computer object The VM-Generation ID is set during a VM import, copy or application of a snapshot When the DC boots, if the VM-Generation ID and the msDS-GenerationID are not the same  The DC assumes an AD restore  InvocationID Changes  Seen as a new replication source  RID pool discarded  Non-authoritative restore of SYSVOL
  • 15. Hypervisor support 22 January 2013 Windows Server 2012 Standard Edition (Hyper-V) Windows Server 2012 Enterprise Edition (Hyper-V) Hyper-V Server 2012 (Hyper-V) Windows 8 Professional (Hyper-V) Windows 8 Enterprise (Hyper-V) VMware Workstation 9.0 VMware vSphere 5.0 with Update 4 VMware vSphere 5.1
  • 16.
  • 18. Cloning steps Source DC CloneableDomainControllers Check for incompatible components PDCE Get-ADDCCloningExcludedApplicationList W2012 Remove incompatible components or declare them as safe Cloned DC Create new VM XML DCCloneConfig.XML Deploy XML to source DC If ID has changed or mounted vhd/vhdx copy cloning starts if XML (can be on removable media) exists
  • 19. Start the copied DC and…
  • 20. DefaultDCCloneAllowList.XML Get-ADDCCloningExcludedApplicationList displays any services or applications that are running that are NOT included in the XML These applications or services must either be removed or if considered safe added to CustomDCCloneAllowList.XML Generate XML using:  Get-ADDCCloningExcludedApplicationList -GenerateXML  Xml added to %windir%NTDS
  • 21. DCCloneConfig.XML New-ADDCCloneConfigFile –Static -IPv4Address "192.168.137.202" -IPv4DNSResolver "192.168.137.200" -IPv4SubnetMask "255.255.255.0" -CloneComputerName "AD-DC3" -IPv4DefaultGateway "192.168.137.1" -SiteName "London" <?xml version="1.0"?> <d3c:DCCloneConfig xmlns:d3c="uri:microsoft.com:schemas:DCCloneConfig Create using New-ADDCCloneConfigFile <ComputerName>rootdc4</ComputerName> <SiteName>London</SiteName> or create from sample: <IPSettings> ..windowssystem32SampleDCCloneConfig.XML <IPv4Settings> <StaticSettings> <Address>192.168.137.202</Address> DCCloneConfig.xml placed in …windowsNTDS <SubnetMask>255.255.255.0</SubnetMask> Alternate locations are available <DefaultGateway>192.168.137.1</DefaultGateway> <DNSResolver>192.168.137.200</DNSResolver> </StaticSettings> </IPv4Settings> </IPSettings> </d3c:DCCloneConfig>
  • 22.
  • 24. Kerberos changes There are a number of other changes to Kerberos to enhance day to day operations  Increase to the maximum Kerberos SSPI context buffer size  PAC group compression  Warning events for large token sizes  Increased logging Major changes  New Kerberos constrained delegation support  Claims support
  • 25. Block cross forest delegation Delegation by setting netdom trust to “no” for /EnableTGTDelegation Protect backend services by setting services account parameter – PrincipalsAllowedToDelegateToAccount Prior to Windows Server 2012, constrained delegation required the front- and back-end service accounts to be in the same domain 2012 allows delegation across domains and forest trusts
  • 26. Adding claims to the Kerberos token Pre-Windows 8 Windows 8 & Server 2012 Compound ID PAC contains a user’s User’s Kerberos Groups group and claims Token User information Claims + PAC Groups Device information Device Claims User’s group memberships added to PAC Authorization can be based on group Authorization based on group membership, user and device claims membership
  • 27. Dynamic Access Control Files can be classified (tagged) and access and audit policies applied based on the files classification Expression based access control and auditing Expressions can contain groups, users, and user and device claims Access based on compound ID user and device claims
  • 28. Enabling Kerberos for claims Enable the KDC administrative template for Support for Dynamic Access Control and Kerberos armoring Kerberos armoring also referred to as Flexible Authentication Secure Tunneling (FAST) provides:  A protected channel between the Kerberos client and the KDC  Protection against offline dictionary attacks  Signs Kerberos error messages  Prevent spoofing  Compound identity
  • 30. DNTs Each DC keeps track of object written to its database using a Distinguished Name Tag (DNT)  The DNT is held in a 2^31 bit number (~ 2 billion)  The DNT is incremented as each new object is written  A DNT value is never reused even if an object is deleted When you run out of DNTs the DC must be demoted and then repromoted The DNT value is now exposed through a constructed attribute of RootDSE  approximateHighestInternalObjectID
  • 31. SIDs S-1-5-21-1539329446-2123584859-1544097757-5023 Domain subauthority RID SIDs must be unique throughout and across forests The RID is incremented by one each time a new SID is generated  This is simple to implement in a single-master environment  A RID master is required in a multi-master domain controller environment
  • 32. RID management attributes RID Master rIDAvailablePool Replicates Holds start of next 7500 7500 pool to be allocated Applies for a new pool No replication X when 50% of the current rIDPreviousAllocationPool 6500 7000 pool has been consumed rIDAllocationPool 6500 7000 RID Set used for SID generation rIDPreviousAllocationPool Current pool on DC rIDAllocationPool Next pool to be used on DC
  • 33. RID Manager Attributes cn=RID Manager$,cn=System,dc=example,dc=com fSMORoleOwner Distinguished name of the NTDS Settings object rIDAvailablePool (large integer 64-bits) High value Low value Total number of RIDs that can be Start of Next RID pool to be allocated created in the domain The RID Manager object is replicated to all DCs in the domain  The rIDAvailablePool attribute is used by the RID Master when allocating the next RID pool to a DC
  • 34. RID problems The maximum available RID is held as a 30 bit number  1073,741,824  10,000 RIDs/day for the next 294 years  So why is it an issue?  Rogue script creating millions of security principles  Very large RID Block size set  Incorrect values entered when elevating the RID pool during recovery  Large numbers of domain controllers removed and re-added  Bug – new RID pool requested every 30 seconds can occur under certain rare circumstances  See KB 2618669 for Windows 2008 R2 hotfix
  • 35. Windows Server 2012 Warnings at 10% usage of remaining pool size  After warning recalculates the 10% marker and repeats  First event at 100 million  If you receive this you probably have a problem Ceiling at 90% usage – intervention required to issue more RIDs Max RID block size capped at 15K  HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesNTDSRID ValuesRID Block Size Global RID Space Size Unlock  Global space can use 31 bit number doubling the RIDs available  2003 & 2008 DCs cannot use the 31 bit RID values
  • 36.
  • 37. Lots of other improvements Support for deferred index creation Off-premises domain join  Supports DirectAccess clients Enhanced LDAP logging New LDAP behaviours Active Directory Based Activation (AD BA)  Automatic activation for Windows 8 and Windows Server 2012 machines  You still require KMS to support downlevel volume-licensing
  • 38. Lots of other improvements (continued) Group Managed Service Accounts (gMSA)  gMSA accounts can run a service across multiple servers  Services running gMSA accounts only supported on Windows 8 and Windows Server 2012 PowerShell Cmdlets for replication support
  • 39. So what do we get? Better GUI support More robust deployment of DCs Simplified Active Directory upgrade path Virtualization safe Quick deployment via cloning Fast domain and forest recovery through cloning Cross-domain and forest constrained delegation Rich access control and auditing via Dynamic Access Control Recovery from depleted RID pools PowerShell everywhere…
  • 40. TechEd 2013 I will be speaking a TechEd 2013  Precon: Windows Server DirectAccess  Other breakouts
  • 41. Consulting services on request John.craddock@xtseminars.co.uk John has designed and implemented computing systems ranging from high-speed industrial controllers through to distributed IT systems with a focus on security and high-availability. A key player in many IT projects for industry leaders including Microsoft, the UK Government and multi-nationals that require optimized IT systems. Developed technical training courses that have been published worldwide, co-authored a highly successful book on Microsoft Active Directory Internals, presents regularly at major international conferences including TechEd, IT Forum and European summits. John can be engaged as a consultant or booked for speaking engagements through XTSeminars. www.xtseminars.co.uk