Title: Windows Vista and LH Server: Understanding and Enhancing Security
 1Windows Vista and LH Server Understanding and 
Enhancing Security
- Idan Plotnik 
- CTO, MSecurity 
- Microsoft Security Regional Director of ISA 
 Server
- V-IdanP_at_Microsoft.COM 
- Idan_at_MSecurity.NET
2Agenda
- Windows Vista and Longhorn Server Security 
 Overview
- Isolated Desktop 
- WinLogon Architecture 
- Service Hardening 
- User Account Control (UAC  a.k.a UAP  a.k.a 
 LUA)
- Network Access Protection (NAP) 
- Group Policy Object (GPO) Improvements 
- Wireless improvements in Longhorn and Vista
3Vista Security OverviewAccess Control
Credential Management
Identity
Policy exp.
Certificate Server
Eventing
Protocol
RBAC
Lifecycle Management
Logging 
Logon 
Azman
Credential Roaming
Common Criteria
2 Factor AuthN
App AuthZ
Smart Cards
FIPS
CAPI
CNG
X.509 Processing
Isolated Desktop
Secure Startup 
 4Session 0 IsolationWindows XP behavior 
 5Session 0 IsolationWindows Vista behavior
Session 0
Service A
Service B
Service C 
 6WinLogon ArchitectureWindows XP
Session 0
WinLogon
LSA
Profiles
User GP
SCM
Machine GP
MSGINA
Shell
Other Sessions
WinLogon
User GP
MSGINA
Shell 
 7WinLogon ArchitectureVista
Session 0
WinInit
Profiles
SCM
Group Policy
Other Sessions
WinLogon
LogonUI
Credential Provider 1
Credential Provider 2
Credential Provider 3 
 8Credential ProvidersPassword Example
LSA
WinLogon
1. CtrlAltDelete
9. LSALogonUser
2. Request Credential
8. Return Credential
5. Click on tile, type user name  password, 
click Go
LogonUI
4. Display UI
Credential Provider Interfaces
6. Go received
7. Get credential for logon
3. Get credential information
Credential Provider 2
Credential Provider 1
Credential Provider 3 
 9Service HardeningMotivation
- Services are attractive targets for malware 
- Run without user interaction 
- Number of critical vulnerabilities in services 
- Large number of services run as System 
- Worms target services 
- Sasser, Blaster, CodeRed, Slammer, etc 
10User Account Control
- Previously known as UAP and LUA 
- Users will logon as non-administrator by default 
- Protects the system from the user 
- Enables the system to protect the user 
 (Virtualization)
- Consent UI allows elevation to administrator 
- Applications and administrator tools should be 
 UAC aware
- Differentiate capabilities based on UAC 
- Apply correct security checks to product features 
- Start testing your software in LH Beta2 with UAC
11User Account Control 
 12Network Access Protection(NAP) 
 13Why Network Access Protection? 
- Customer environment 
- Customer requirements 
- Solution overview 
- Policy Validation 
- Network Restriction 
- Remediation 
- Ongoing Compliance 
14Network Access Protection Components
Enforcement Components
Health Components
Platform Components 
- Quarantine Agent (QA)  Reports client health 
 status, coordinates between SHA and NAD.
- System Health Agents (SHA)  Declare health 
 (patch state, virus signature, system
 configuration, etc.).
- Quarantine Enforcement Clients (QEC)  Negotiate 
 access with network access device(s) DHCP, VPN,
 1X, IPSec QECs.
- Quarantine Server (QS)  Restricts clients 
 network access based on what SHV certifies.
- System Health Validators (SHV)  Certify 
 declarations made by health agents.
- Network Access Devices  Provide network access 
 to healthy endpoints.
- System Health Servers  Define health 
 requirements for system components on the client.
- Health Registration Authority  Issues 
 certificates to clients that pass health checks.
- Remediation Servers  Install necessary patches, 
 configurations, applications. Bring clients to
 healthy state.
System Health Servers 
Remediation Servers 
Health policy
Updates
Network Access Requests
Client
Health Statements
IAS Policy Server
SHA1
SHA2
Health Certificate
SHV1
SHV2
Quarantine Agent (QA)
Network Access Device  Health Registration 
Authority 
QEC1
QEC2
Quarantine Server (QS) 
 15Network Access Protection Walk-through
Corporate Network
Restricted Network
Remediation Servers 
Here you go.
Can I have updates?
Ongoing policy updates to IAS Policy Server 
May I have access? Heres my current health 
status. 
Should this client be restricted based on its 
health? 
Requesting access. Heres my new health status.
According to policy, the client is not up to 
date. Quarantine client, request it to update.
According to policy, the client is up to date. 
 Grant access.
You are given restricted access until fix-up.
Client
Network Access Device (DHCP, VPN)
IAS Policy Server
Client is granted access to full intranet. 
 16Network Access Protection 
 17Group Policy  Whats New in Vista and Longhorn 
Server More Settings, Applied More Reliably, 
Easier to Use 
 18Group Policy Client Service
- Reliability  A fundamental Vista goal 
- Prior to Windows Vista, Group Policy processing 
 was implemented within the Winlogon process
- Group Policy now runs in a shared service host on 
 the client
- Service has been hardened 
- A local administrator needs elevated privilege to 
 stop the service
- Service restart configuration provides recovery 
 from any unexpected failures
- Isolation of 3rd party Client Side Extensions 
- Note This is transparent to users
19Improved Network Awareness
- More Responsive to Network Changes 
- No longer just 90 minutes or so 
- If previous policy application cycle was skipped 
 or failed then it retries whenever network
 connectivity (Ability to reach DC) is available
- Leverages NLA v2.0 (Network Location Awareness) 
- Subscribe for DC availability notification 
- Removal of dependence on ICMP (no more Ping!) 
- Improved bandwidth determination (through NLA) 
- Note Network Quarantine scenario needs 
 additional configuration
20Local GPO  Customer Request
- The problem  
- Local GPOs are primarily used in  
- Customer Request Ability to set different 
 configurations for different users using just
 Local GPO
- The solutions Multiple LGPOs 
- Supports having different policy settings for 
 different local users
- LGPOs for 
- The machine (same LGPO as today) 
- NEW Local groups (Admin or Non-Admin) 
- NEW Individual local users 
21Troubleshooting Group Policy  Some Challenges
- Cryptic Error messages 
- No consistent diagnosis or resolution information 
- Error help link broken 
- Not Actionable 
- Userenv.log 
- Not many users aware of this option 
- Not IT Admin friendly 
- Each GP extension has a different format and 
 location of its log
- No consolidated centralized reporting 
22Vista  GP Logging Enhancements
- Leverages new Crimson event 
 management feature
- XML based event logs 
- Simple event consolidation using Subscription 
- Can associate actions to events (Send email, 
 execute script/WMI jobs)
- Two levels of logging 
- Admin events 
- Operational events 
- HKLM\Software\Microsoft\Windows 
 NT\CurrentVersion\Diagnostics
-  GpSvcDebugLevel REG_DWORD  10002 (Hex) 
-  
-  NOTE new GP Service is dynamic  no service 
 restart / reboot is require. New file
 gpsvclog.log
23Wireless in Longhorn and Vista 
 24Wireless Security
- Highest level of standards based security 
 including
- WPA2, WPA, Wireless 802.1x 
- PEAP MSCHAP v2 (default in Vista), PEAPTLS, 
 EAPTLS
- Secure Ad-Hoc Networking 
- WPA2-PSK security for Ad-Hoc networks 
- Single-Sign-On Experience 
- EAPHost Extensibility Framework 
- Enable 3rd party EAP methods 
- Security management through GP and CLI 
- Network Access Protection Support 
- Specific wireless networks or network types can 
 be Blocked / Allowed
25Wireless Group PolicyVista Policy Enhancements
-  Deployment Simplified 
- Support for mixed wireless security environments 
- Separation of wired 802.1x and wireless services 
-  Granular Manageability Supported 
- Allow / Deny Lists 
- WPA2, WPA, WEP, EAP-TLS, PEAP-MSCHAPv2, etc. 
- Hidden network support 
- Automatic / Manual connectivity 
-  User Experience Improved 
-  Extensibility Supported 
- For IHV specific settings
26GPO Infrastructure Enhancements  Wireless UI 
 27Wireless interfaceNETSH Commands
- Wireless Commands 
- add profile 
- add filter 
- show profiles 
- show filters 
- show settings 
- show interfaces 
- delete profile 
- delete filter 
- set preferenceorder 
- set autoconfig 
- set blockednetworks 
- export profile 
- dump
- Wired Commands 
- add profile 
- show profiles 
- show settings 
- show interfaces 
- delete profile 
- set autoconfig 
- export profile 
28Summary
- Vista and LH Security model 
- Isolation Desktop 
- WinLogon architecture 
- Service Hardening 
- UAC 
- NAP 
- GPO 
- Wireless
29Resources
- Windows Vista Security  Protection 
- User Account Control 
- Security Update Webcast 
30Thank you very much for your time! 
 31(No Transcript)