Windows Server Homelab: Implementing Security Policies | Fine-Grained Passwords

East Charmer
10 Aug 202414:07

Summary

TLDRIn this sixth episode of the Windows Server home lab series, the focus is on implementing essential security policies for workplace computers. The tutorial covers setting strong password policies, enforcing password complexity, and managing account lockout policies to protect against brute force attacks. It also addresses user rights assignment for role-based access control and introduces fine-grained password policies for applying different security measures to various user groups, enhancing overall network security.

Takeaways

  • 😀 This video is part of a series on setting up a Windows Server home lab, focusing on the sixth episode about security policies.
  • 🔒 The video discusses implementing essential security measures to enhance security for all computers in the workplace.
  • đŸ›Ąïž It covers how to set up security policies, which are configurations applied to desktops to improve their security.
  • đŸ—ïž The video addresses a request from the audience to cover different password rules for various user types, such as admins and standard users.
  • đŸ‘šâ€đŸ’» For prerequisites, viewers should have a Windows Server with active directory tools, Group Policy Management console, and a Windows client joined to the domain.
  • 🔑 The script explains how to configure a strong password policy for Active Directory users, including minimum length, complexity, and age.
  • 📈 It suggests that the standard for strong passwords should be at least 12 characters, exceeding the default of 8 characters in Windows Server.
  • đŸš« The video also explains how to set up an account lockout policy to protect against brute force attacks, specifying the number of failed attempts before lockout and the lockout duration.
  • đŸ‘„ It describes user rights assignment to enhance security by restricting user groups from performing certain tasks, such as logging in locally or using remote desktop services.
  • 🔄 The script includes a step-by-step guide on testing the implemented policies to ensure they are enforced correctly.
  • 🌐 Finally, the video introduces fine-grained password policies, allowing different password rules for different user groups, and how to implement them using Active Directory Administrative Center.

Q & A

  • What is the main focus of the sixth episode in the Windows Server home lab series?

    -The main focus of the sixth episode is on implementing security policies to enhance the security of computers in the workplace.

  • Why is security important in the workplace according to the video?

    -Security is important in the workplace to protect against attacks and to enforce essential security measures for all computers.

  • What was the request from the comment section that the video addresses?

    -The request from the comment section was to cover different password rules for different users, such as allowing admins to have basic passwords while enforcing strong password rules for standard users.

  • What are the prerequisites for creating security policies in the home lab as mentioned in the video?

    -The prerequisites include having a Windows Server installed with Active Directory tools, Group Policy Management console, and a Windows client for testing that is joined to the domain.

  • What is the minimum password length recommended in the video for strong passwords?

    -The video recommends a minimum password length of at least 12 characters for strong passwords, as eight characters is no longer considered strong in the digital age.

  • How can the default domain policy be edited in the Group Policy Management console?

    -To edit the default domain policy, right-click on it and select 'Edit' in the Group Policy Management console.

  • What is the purpose of enforcing password complexity requirements?

    -Enforcing password complexity requirements ensures that new passwords are not basic and meet certain criteria, such as including symbols, capital letters, or numbers, making them stronger against attacks.

  • What is the significance of the 'enforce password history' setting in the password policy?

    -The 'enforce password history' setting determines how many previous passwords the system should remember, preventing users from reusing recent passwords and enhancing security.

  • What is the recommended account lockout threshold and duration in the video's home lab scenario?

    -In the home lab scenario, the recommended account lockout threshold is three invalid logon attempts, and the lockout duration is set to 30 minutes.

  • How can user rights be assigned or restricted to enhance security in a role-based access system?

    -User rights can be assigned or restricted by configuring policies in the Group Policy Management console, such as denying standard users to log in locally or allowing specific groups to use remote desktop services.

  • What is the concept of applying different password policies to different user groups called in Windows Server?

    -The concept of applying different password policies to different user groups is called Fine-Grained Password Policies in Windows Server.

  • Which tool is used to implement Fine-Grained Password Policies in Windows Server?

    -The Active Directory Administrative Center is used to implement Fine-Grained Password Policies in Windows Server.

  • What is the purpose of setting precedence in Fine-Grained Password Policies?

    -The purpose of setting precedence is to determine the order in which password policies are applied when multiple policies are applicable to a user or group, with the lowest number having the highest priority.

  • How can you test if the new password policy is enforced after creating a test user account?

    -You can test the enforcement of the new password policy by attempting to set a weak password for the test user account and verifying that the system rejects it due to not meeting complexity requirements.

  • What is the process to test the account lockout policy?

    -The process to test the account lockout policy involves using a test user account to attempt multiple failed login attempts and verifying that the account gets locked out with a message indicating the lockout status.

Outlines

00:00

🔒 Implementing Security Policies in Windows Server Home Lab

This paragraph introduces the sixth episode of a Windows Server home lab series, focusing on security policies. The video aims to implement essential security measures for workplace computers. It addresses a request from the audience to cover different password rules for various user types, such as admins and standard users. The speaker outlines the prerequisites for the lab, including having a Windows Server with Active Directory tools, Group Policy Management console, and a Windows client joined to the domain. The first activity involves configuring a strong password policy for all Active Directory users, emphasizing the need for a minimum password length of at least 12 characters, complexity, and age. The process of creating or editing a group policy object and setting the policy parameters is detailed, including enforcing password history and complexity requirements.

05:02

đŸ›Ąïž Configuring Account Lockout and User Rights Policies

The second paragraph delves into configuring an account lockout policy to protect against brute force attacks. It explains setting a threshold for password attempts and the duration of account lockout. The process involves using the Group Policy Management console to edit the default domain policy, focusing on computer configuration and security settings under account policies. The speaker also discusses user rights assignment for role-based access control, restricting certain user groups from tasks like local server login or using remote desktop services. The implementation of these policies is demonstrated through testing with a regular user account, showing the enforcement of 'deny log on locally' and 'allow log on through remote desktop services' policies.

10:02

🔑 Implementing Fine-Grained Password Policies for Different User Groups

The final paragraph introduces the concept of fine-grained password policies, allowing different password rules for different user groups within an organization. The speaker guides through the process of implementing these policies using the Active Directory Administrative Center, rather than Group Policy. The steps include creating a new password settings object (PSO) with specific settings, such as minimum password length and password history, and assigning these settings to particular groups like admins or standard users. The precedence of these policies is highlighted, with lower numbers indicating higher priority. The paragraph concludes with a demonstration of creating PSOs for both admin and regular users, setting different requirements for each group.

Mindmap

Keywords

💡Windows Server

Windows Server is a group of server operating systems developed by Microsoft, designed to handle network and server-related tasks. In the video, it is the platform on which security policies are being implemented and managed, serving as the foundation for the home lab series and the main theme of the video.

💡Security Policies

Security policies are a set of rules and configurations in computing that are put in place to protect the integrity and confidentiality of a system. The video focuses on implementing these policies to enhance the security of desktops in a workplace environment, emphasizing the importance of strong password rules and account lockout policies.

💡Active Directory

Active Directory is a directory service that Microsoft developed for the Windows domain networks. It provides centralized authentication, network access control, and user management. In the script, Active Directory is used to enforce security policies across the network and manage user accounts.

💡Group Policy Management Console

The Group Policy Management Console (GPMC) is a Microsoft Management Console (MMC) snap-in that provides a single location to manage Group Policy in a domain. The video script describes using the GPMC to create and edit Group Policy Objects (GPOs) to apply security configurations.

💡Password Policy

A password policy is a set of rules that govern the creation of passwords, dictating their complexity, length, and expiration. The video explains how to configure a password policy in Windows Server to enforce strong passwords for Active Directory users, including minimum length and complexity requirements.

💡Account Lockout Policy

An account lockout policy is designed to protect user accounts from brute force attacks by locking the account after a certain number of failed login attempts. The video demonstrates how to set a threshold for failed login attempts and the duration of the lockout period to secure the system.

💡User Rights Assignment

User rights assignment refers to the process of granting or denying permissions to users or groups to perform certain tasks or access specific resources. The video discusses assigning user rights in a role-based access control system to enhance security by restricting who can log in locally or use remote desktop services.

💡Remote Desktop Services

Remote Desktop Services, previously known as Terminal Services, is a feature of Windows Server that allows users to remotely access and control another computer. The video script includes a discussion on allowing or denying access to these services as part of the security policy configuration.

💡Fine-Grained Password Policies

Fine-Grained Password Policies (FGPP) are an advanced feature in Windows Server that allows administrators to apply different password policies to different groups of users. The video script describes how to implement FGPP using the Active Directory Administrative Center to meet the specific security requirements for different user groups.

💡Active Directory Administrative Center

The Active Directory Administrative Center is a Microsoft Management Console snap-in that provides a graphical user interface for managing Active Directory objects. The video script mentions using this tool to create and manage Fine-Grained Password Policies, which is a more advanced configuration than what is available in the Group Policy Management Console.

💡Precedence

In the context of the video, precedence refers to the priority order in which password settings are applied when multiple policies could affect a user or group. The script explains setting precedence numbers for different password policies to ensure that the most restrictive or relevant policy is enforced.

Highlights

Introduction to the sixth episode of the Windows Server home lab series focusing on security policies.

Importance of implementing security policies to enhance computer security in the workplace.

Request from the comment section to cover different password rules for admin and standard users.

Explanation of prerequisites needed for creating security policies, including Windows Server with active directory tools.

Demonstration of how to configure a strong password policy for Active Directory users.

Details on setting minimum password length, complexity, and age to improve security standards.

Instructions on creating or editing a Group Policy Object (GPO) for security policy application.

Process of enforcing password history and complexity requirements through Group Policy.

Testing the new password policy with a test user account to ensure policy enforcement.

Configuration of an account lockout policy to protect against brute force attacks.

Setting thresholds for password attempts and lockout durations in the Group Policy.

Testing the account lockout policy to verify its effectiveness in preventing unauthorized access.

User rights assignment to enhance security through role-based access control.

Restricting user groups from logging in locally or using remote desktop services for security.

Implementation of fine-grained password policies for different user groups using Active Directory Administrative Center.

Creating password settings objects (PSO) with different precedence for admin and standard users.

Assigning password settings to specific groups to apply different policies based on user roles.

Conclusion of the home lab series episode with a call to action for questions and feedback.

Transcripts

play00:07

hello everyone welcome back to the

play00:08

channel this video is a continuation of

play00:11

our Windows Server home lab series and

play00:14

this is the sixth episode and we are

play00:16

going to be focusing on security

play00:17

policies on this video so we are going

play00:19

to be implementing the essential

play00:21

security measures for all of our

play00:23

computers in the workplace so in this

play00:26

video we are going to be covering how to

play00:28

implement security policies and security

play00:30

policies or a set of configurations that

play00:33

can be applied onto the desktops to

play00:35

enhance their security and security is

play00:37

very important in the workplace we also

play00:40

have a request from the comment section

play00:41

to cover different password rules for

play00:44

different users example letting admin

play00:47

making basic passwords but have strong

play00:49

password rules standard users so later

play00:52

on we can also make different settings

play00:54

for different users just like from this

play00:57

request we can set up different

play00:59

parameters for it admin and different

play01:02

password parameters for the users so if

play01:05

you're interested in today's video

play01:06

please keep on watching and without

play01:08

further Ado let's get started okay so if

play01:11

you're planning to follow along and

play01:12

create the security policies in this

play01:14

home lab you should check on the

play01:16

prerequisites first and you should have

play01:18

all of this first before you can do this

play01:21

lab so you should have a Windows Server

play01:23

installed with active directory tools

play01:26

Group Policy Management console and a

play01:28

Windows client for testing that is

play01:31

joined to The Domain okay so for our

play01:33

first activity we are going to do a

play01:34

password policy configuration and we are

play01:37

going to configure and enforce a strong

play01:38

password for all of our active directory

play01:41

users so this is really basic and we are

play01:44

going to configure the minimum password

play01:47

length password complexity and password

play01:50

age in this activity because the default

play01:52

for the minimum password in Windows

play01:55

server is eight characters and that is

play01:58

no longer the standard for strong

play02:00

passwords it should be at least 12

play02:02

characters or more to make it strong in

play02:05

this digital age so we have to also

play02:08

protect our users from attacks by

play02:11

enforcing this security policy okay so

play02:13

on the Windows Server open the group

play02:15

policy Management console and then

play02:17

create a new group policy object or you

play02:20

can also edit the default domain policy

play02:23

so for this case we are just going to

play02:24

edit the default domain policy because

play02:26

we want this to apply to all of the ad

play02:28

users under our main so you can right

play02:31

click on this and click edit and what do

play02:34

we choose in here is it going to be

play02:36

computer configuration or user

play02:39

configuration this needs to be applied

play02:41

to all the computers when a user login

play02:43

so we should select computer

play02:45

configuration in here and then select

play02:47

policies and then window settings and

play02:51

security settings and then under account

play02:53

policies there are different policy but

play02:56

for this situation we should be

play02:58

selecting password policy policy and

play03:01

this is where you can set up the

play03:02

different policy for strong passwords

play03:05

for ad users so first we can select

play03:08

enforce password history in here this is

play03:11

setting up how many password the system

play03:13

should

play03:16

remember and then we can also set up the

play03:18

maximum password age on when the

play03:21

password should expire usually we do it

play03:23

every quarter at work but it also

play03:25

depends on your company then we can set

play03:28

up the minimum password length to create

play03:30

stronger passwords so typically eight

play03:33

characters is the minimum now or

play03:36

sometimes there's more so it also

play03:38

depends on your company and last is

play03:40

password must meet complexity

play03:42

requirements so this should be always

play03:45

enabled to enforce strong password so

play03:48

this is where systems is stricter when

play03:50

taking a new password that you're going

play03:52

to set up like it's not going to take a

play03:54

basic password and there's different

play03:56

characters that you should meet for the

play03:59

p the passwords for example you should

play04:01

have a symbol or capital letter or a

play04:03

number so this is how you configure and

play04:06

enforce a strong password policy for ad

play04:08

users through the group

play04:12

policy so to test if our new password

play04:16

policy works we can create a test user

play04:19

account and attempt to set a week

play04:21

password to verify that the password

play04:24

policy is enforced make sure to check

play04:26

user must change password at next log on

play04:29

because we want to to check if we can

play04:30

change the password to meet the

play04:32

complexity

play04:34

rules okay so let's test the account

play04:36

that you just created so now log into

play04:39

the new

play04:42

account okay so it's going to ask us to

play04:45

change the password so let us type in

play04:47

some basic passwords so we can test if

play04:50

the password complexity was

play04:52

enforced so I've typed in 1 2 3 4 5 6 7

play04:56

in here and see if it will take it so as

play05:00

you can see in here we are getting this

play05:01

message now that we are not meeting the

play05:03

complexity requirements so that's a good

play05:05

sign that our policy was enforced so now

play05:08

I'm going to type in the password that

play05:10

meets all the requirements in here and

play05:12

also the minimum length

play05:15

required and let's see if the system

play05:17

will take it and change the

play05:19

password okay so our password was

play05:22

changed so it means that our policy

play05:24

works so that is how you can test this

play05:27

so for our next activity we are going to

play05:29

do the account lockout policy

play05:31

configuration and we are going to

play05:33

configure an account lockout policy to

play05:36

protect against boot Force attacks so in

play05:39

this activity we are going to set a

play05:41

threshold for password how many password

play05:44

attempts they have before their account

play05:47

will be locked out and the duration of

play05:50

the lock out like how long will they be

play05:52

locked out before they can be unlocked

play05:55

from their accounts so the higher the

play05:57

threshold is set the higher the

play05:59

probability also for a successful Brute

play06:02

Force attack which gives them more

play06:04

opportunities to guess the password and

play06:07

be successful with the attack okay so we

play06:09

can open the group policy Management

play06:11

console again and we can create a new GP

play06:14

or edit the default domain

play06:16

policy so I'm going to edit the default

play06:19

policy here I'm going to right click on

play06:21

it and click on

play06:22

edit so we are going to choose computer

play06:25

configuration in here and then go to

play06:27

policies and then select window settings

play06:30

and security settings and under that

play06:33

will be account policies and under

play06:35

account policies you can see the account

play06:37

lockout policy which we are looking for

play06:39

to set this up so let's configure the

play06:42

account lockout duration to 30 minutes

play06:46

then let's set the account lck out

play06:47

threshold to three invalid log on

play06:50

attempts just for the sake of this home

play06:52

lab you can choose it depending on your

play06:55

company policy then let's set up the

play06:58

account lockout counter after 30

play07:04

minutes so to test this policy you can

play07:07

use a test user account and attempt

play07:09

multiple failed login attempts to verify

play07:12

that the account gets logged out then

play07:14

you will see this message that is

play07:16

currently locked out which means that

play07:17

our policy

play07:20

worked next is user rights assignment

play07:23

and this is assign and restrict user

play07:26

rights to enhance security this is more

play07:28

of a role-based access and we can

play07:30

restrict different user groups for

play07:32

different tasks for example we can deny

play07:34

standard users to log in locally or

play07:37

directly to the servers because we don't

play07:38

want them to be messing around with the

play07:40

servers if they can figure out or

play07:42

accidentally log into them and we can

play07:44

also restrict using or allowing them

play07:47

remote desktop services so standard

play07:50

users can just log into to different

play07:52

computers or servers remotely using RDS

play07:55

so for this lab open the group policy

play07:58

Management console then you can create a

play08:00

new GPO or edit the default domain

play08:03

policy I'm going to create a new GPO so

play08:05

I'll right click on this group policy

play08:07

objects and click on new and let's type

play08:10

in user rights for

play08:12

example expand the group policy objects

play08:15

and look for user rights and right click

play08:17

and click edit and then navigate to

play08:19

computer configuration then select

play08:22

policies then window settings and select

play08:25

security settings under local policies

play08:28

select user right assignment so the

play08:31

first example that you want to do is to

play08:32

deny log on locally so look for deny log

play08:36

on locally in this list and check Define

play08:39

these policies and then add groups for

play08:42

users who should not log on directly to

play08:44

the servers so just make sure that you

play08:47

already have groups added in active

play08:49

directory so you have something to add

play08:51

to this lab just like each group or

play08:53

Accounting Group so that's what you are

play08:56

going to add in this restriction so

play08:59

let's let's add the HR department for

play09:02

example then next we just want to

play09:04

specify groups or users that are allowed

play09:06

to use remote desktop just like it

play09:09

department for example so find allow log

play09:12

on through remote desktop services and

play09:14

click on Define these policy settings

play09:16

and then you can add the users or groups

play09:19

you want to allow to use remote desktop

play09:22

just like the IT

play09:25

department so let's test the Deni log on

play09:28

locally policy first I am going to go to

play09:31

my Windows server and I'm going to sign

play09:33

out from admin account and I'm just

play09:36

going to use a regular user account that

play09:37

is not a member of the it group and

play09:40

let's see if we can sign in to the

play09:43

Windows Server so I'm getting this error

play09:46

message which means that our policy

play09:48

Works cuz I'm not allowed to log onto

play09:50

this Windows Server directly because I'm

play09:52

not an admin the next policy we're

play09:55

testing is allowing log on through

play09:57

remote desktop services so in testing

play10:00

this just make sure that you're logged

play10:01

in as regular user and not as admin so

play10:05

open the remote desktop program then

play10:08

type in the name of your server and then

play10:10

click connect and it's going to ask you

play10:12

to enter your

play10:14

password and then click okay and then as

play10:17

you can see you're getting this error

play10:18

message so this means that our policy

play10:21

work because we're not allowed to use

play10:22

remote desktop with this regular user

play10:26

account okay so for our last Hands-On

play10:28

lab it's going to be implementing fine

play10:30

grained password policies so this is

play10:33

covering the request from the comment

play10:35

yes earlier which will be applying

play10:37

different password policies to different

play10:39

groups of users so for example your

play10:41

organization wants to apply stricter

play10:43

policies to admin accounts while

play10:46

allowing standard users to have more

play10:49

lenient requirements or vice versa if

play10:52

you want admins to have less stricter

play10:55

requirements and more stricter with

play10:57

standard users so this is how you

play11:00

implement this kind of security policy

play11:02

so the concept of applying and

play11:05

implementing different password policies

play11:07

to different user groups is called

play11:09

theine grain password policies and

play11:12

window server and we also use different

play11:14

tools other than the group policy

play11:16

management to implement this since this

play11:18

is more advanced settings so for this

play11:22

configuration we're not going to use

play11:23

Group Policy but we're going to use a

play11:26

tool that's called active directory

play11:28

administrative Center and you can find

play11:31

it under your windows admin tools okay

play11:34

so go ahead and open the active

play11:36

directory administrative Center so to

play11:39

your left side click on your domain name

play11:41

and then select system and select

play11:45

password settings container because we

play11:47

are going to create a new password

play11:49

settings object or

play11:51

PSO next go to the upper right side

play11:53

click on new and password settings so

play11:56

this is where you're going to type the

play11:58

name for your password set settings

play12:00

we're going to do the admin password

play12:01

policy first thenx is precedence this

play12:05

determines the order in which the policy

play12:07

objects are applied when multiple

play12:09

password settings are applied to a user

play12:12

or a group so the password setting with

play12:14

the lowest president number has the

play12:16

highest priority and will be applied for

play12:19

example there's a user with two password

play12:21

setting first setting with the

play12:23

Precedence of 20 and second with the

play12:26

Precedence of 30 so the one with the

play12:28

lower number will take presidence and

play12:30

that's the one with presidence

play12:32

20 so for this admin password setting

play12:35

I'm going to put number one to make it

play12:37

the highest precedence and below is

play12:39

where you can edit the settings to make

play12:42

stricter policies for admin for example

play12:45

set up the minimum password length in

play12:47

here and also enforce password history

play12:50

in here so I'm just going to put 15 for

play12:53

minimum password length and three for

play12:55

password history then at the bottom you

play12:58

can click on ADD so we can add the

play13:00

groups where we want this admin password

play13:03

setting applied or implemented to in

play13:06

this case I'm going to select the group

play13:07

for it

play13:09

admins then just click on okay and now

play13:12

we have created a password setting

play13:14

object here for

play13:16

admin then if you want to create another

play13:18

one for regular users we can create

play13:21

another password settings object or PSO

play13:24

and follow the same process type in the

play13:27

name of the setting and then type in the

play13:29

presidence here I'm going to use a

play13:31

number two just to make it lower than

play13:34

the admin presidence and below is where

play13:36

you can change the settings to make it

play13:38

less stricter than the admin or more

play13:41

stricter depending on your company

play13:43

policy and same process you can add the

play13:45

groups where you want this to be

play13:47

implemented and then click on okay and

play13:50

then you have created another password

play13:52

setting

play13:53

object okay so that would be it for this

play13:56

episode of our home lab series if you

play13:58

have any questions please let me know in

play14:00

the comment section down below and I

play14:02

hope you learn something from this video

play14:04

thank you so much and hope to see you

play14:05

guys in the next one

Rate This
★
★
★
★
★

5.0 / 5 (0 votes)

Étiquettes Connexes
Security PoliciesWindows ServerHome LabPassword RulesActive DirectoryGroup PolicyAccount LockoutUser RightsFine-Grained PoliciesIT SecurityPassword Enforcement
Besoin d'un résumé en anglais ?