Server and Systems Administration - 05
Server and Systems Administration - 05
Code:CSC3504
• Active Directory groups are a powerful tool for managing access control.
Instead of assigning permissions to individual users, you can assign them to
groups, and then assign permissions to the group. This simplifies
management, especially in large environments.
Types of Active Directory Groups:
• Types
• Domain Local Groups: Best for assigning permissions to resources within the same domain.
• Global Groups: Typically used for organizing users based on common attributes (e.g.,
departments).
• Universal Groups: Used for assigning permissions across multiple domains within a forest.
• Group Memberships:
• Create groups based on roles or departments (e.g., “HR,” “Finance”).
• Assign users to these groups based on their roles.
• Apply folder and file permissions to these groups, rather than to individual users.
3. Share Permissions for Network Shares
• If the folders are shared across the network, you'll also need to configure share
permissions. Share permissions apply to files accessed over the network, while
NTFS permissions apply to both local and network access.
• Types of Share Permissions:
• Read: Users can only view the files.
• Change: Users can modify files and folders.
• Full Control: Users can modify, delete, and change permissions on the shared folder.
4. Delegating Administrative Control
Active Directory allows delegation of specific administrative tasks without granting
full control over the entire AD infrastructure.
• Delegation of Folder and File Permissions:
• Use Active Directory Users and Computers (ADUC) to delegate permissions to manage
folders and file shares to specific users or groups.
• Right-click on an organizational unit (OU) or object, and select Delegate Control.
• Follow the wizard to assign specific permissions (such as managing group memberships,
creating/deleting objects, etc.).
5. Audit and Monitor File Access
To ensure security and compliance, you should enable auditing of folder and file access.
• Enabling Auditing:
1. Open Group Policy Management and create a GPO.
2. Go to Computer Configuration > Policies > Windows Settings > Security Settings >
Advanced Audit Policy Configuration.
3. Enable Object Access auditing.
4. Apply the policy to the target machine(s).
5. In the file or folder’s Security tab, click Advanced and go to the Auditing tab to configure
auditing for specific events (e.g., file access, file modification).
6. Using Group Policy for Security Settings
You can apply security settings at the domain level using Group Policy to enforce
restrictions on file access.
• Examples of Group Policy Settings:
• Folder Redirection: Redirect user folders (e.g., Documents, Desktop) to a central location.
• AppLocker: Restrict the types of applications that can run on machines.
• Security Options: Set policies related to file encryption, password complexity, etc.
7. Encrypting Files and Folders
• To add an extra layer of security, you can use Encrypting File System (EFS)
to encrypt files and folders on NTFS volumes.
• Steps for Encrypting Files:
1. Right-click the file or folder and select Properties.
2. Go to the General tab, click Advanced.
3. Check the option Encrypt contents to secure data.
4. Once encrypted, only authorized users will be able to decrypt and access the data.
8. Managing Permissions Using PowerShell
• You can automate and manage security configurations using PowerShell. Below is an example of setting NTFS permissions using
PowerShell:
# Grant read access to a group
$folderPath = "C:\SharedFolder"
$group = "Domain\GroupName"
$acl = Get-Acl $folderPath $permission = “
$group", "Read", "Allow"
$accessRule = New-Object [Link]
$permission
$[Link]
($accessRule) Set-Acl -Path
$folderPath -AclObject $acl
Server monitoring
• Server monitoring is essential to ensure that your server infrastructure is
running smoothly, securely, and efficiently. It involves tracking the
performance, health, and availability of servers and services to prevent
downtime, identify issues early, and optimize performance.
Components that server can monitor
1. Hardware Monitoring
Monitoring hardware helps ensure the physical components of the server are functioning properly.
• CPU Usage: Track CPU utilization to ensure it’s not constantly running at high percentages,
which could indicate resource exhaustion or an issue with the system.
• Memory (RAM): Monitor RAM usage to identify memory leaks or heavy memory
consumption by processes that could affect server performance.
• Disk Space: Ensure there is adequate disk space and track disk performance (read/write speed,
I/O) to avoid server crashes.
• Network Traffic: Monitor network throughput and latency to ensure network connectivity and
performance.
• Temperature and Power: Check server temperatures (important for physical hardware) and
power supply health.
2. Operating System Monitoring
Monitoring the health of the operating system itself is essential to maintaining
performance.
• System Logs: Monitor event logs (Windows Event Viewer, Linux syslog, etc.)
for errors, warnings, and potential security threats.
• System Load: Check load averages (Linux) or performance counters
(Windows) to determine how well the system is handling the workloads.
• Processes and Services: Ensure that critical processes and services are
running as expected. Set alerts for service crashes or unexpected shutdowns.
3. Application Monitoring
Many servers are running specific applications or services that need constant monitoring.
• Web Servers (Apache, Nginx, IIS): Monitor web server availability, response times,
and error rates (e.g., 404 or 500 errors).
• Database Servers (SQL, MySQL, Oracle): Track database performance (queries per
second, slow queries, connection pool utilization), resource utilization, and replication
status.
• File Servers: Ensure file shares are accessible and monitor file system performance
and usage.
• Email Servers (Exchange, Postfix): Monitor email traffic, server availability, and
error rates (failed sends/receives).
4. Security Monitoring
Security monitoring ensures the server is protected from unauthorized access and threats.
• Firewall Status: Ensure firewall rules are intact and logs are being reviewed for
suspicious activity.
• Intrusion Detection: Monitor for unusual network traffic patterns, failed login
attempts, and other signs of a security breach (using IDS/IPS systems like Snort,
Suricata, or integrated solutions).
• Antivirus/Antimalware Status: Verify that antivirus software is running and up to
date, scanning for threats.
• User Account and Access Auditing: Track login attempts, failed logins, privilege
escalations, and access to sensitive areas of the system.
5. Service and Process Monitoring
Critical background services and processes must be continuously monitored.
• Availability: Monitor essential services like DNS, DHCP, and other network
services for availability.
• Resource Utilization: Track memory and CPU usage of critical background
processes, such as database engines, web servers, or application services.
• Alerting and Recovery: Configure alerts for when services are down or
nearing their resource limits (e.g., high CPU usage, low disk space).
6. Backup and Disaster Recovery
Monitoring
Ensure backups are working and are regularly completed.
• Backup Status: Monitor whether backups run successfully and are
completed on schedule.
• Backup Integrity: Ensure that backup files are not corrupted and can be
restored when needed.
• Disaster Recovery: Test and monitor the disaster recovery plan to ensure
that data can be restored in case of failure.
Tools for Server Monitoring
1. Native Tools
• Windows Performance Monitor: Built into Windows, it allows you to track
CPU, memory, disk, and network usage, as well as specific application-level
performance counters.
• Task Manager: Quick overview of running processes, CPU, and memory
usage.
• Event Viewer: Provides logs related to system, security, and application
events.
2. Third-Party Monitoring Tools
Third-party tools provide more advanced features like remote monitoring, alerting,
and historical data analysis.
• Nagios: A popular open-source monitoring tool that provides monitoring for
servers, applications, and network devices.
• Zabbix: An open-source solution that monitors network performance, server
health, and application availability.
• PRTG Network Monitor: A tool for monitoring the availability and
performance of IT infrastructure, including servers, network devices, and
services.
• SolarWinds Server & Application Monitor: A commercial tool that provides deep
visibility into server performance, including applications, system resources, and
uptime.
• Datadog: A cloud-based monitoring solution that integrates with cloud
environments, servers, and applications.
• New Relic: Provides monitoring for servers, applications, and cloud services,
offering deep performance insights.
• Checkmk: Another open-source monitoring tool that provides detailed monitoring
and alerts for servers, databases, and services.
3. Cloud-Based Monitoring
Cloud providers (like AWS, Azure, and Google Cloud) often provide their own
server monitoring tools:
• AWS CloudWatch: Monitors AWS resources like EC2 instances, disk
performance, and network traffic.
• Azure Monitor: Provides monitoring for Azure-based servers, including
application insights and metrics.
• Google Cloud Operations Suite (formerly Stackdriver): Monitors Google
Cloud resources with integrated logging and alerting.
Server protection
• Server protection, also known as server security, is the process of
safeguarding a server from malicious activity and unauthorized access. It
involves using tools and methods to ensure data privacy, accuracy, and
availability.
Server protection methods
• Encryption: Transforms data into a code that can't be decrypted, even if it's intercepted
• Firewalls: Inspect and authenticate data packets to prevent unwanted traffic
• Intrusion detection systems (IDS): Monitor network traffic for signs of unauthorized
activity
• Patch management: Keep systems up to date with the latest security patches
• Privileged access management (PAM): Control access to users and accounts
• Strong passwords: Use strong passwords and multi-factor authentication
• Regular backups: Implement regular backups of the server
• Security audits: Conduct regular security audits and vulnerability assessments
Other server protection methods include:
• Involves creating virtual machines (VMs) on a physical server (host machine) that
each run their own operating system (guest OS). The hypervisor manages the
distribution of hardware resources to each VM.
• Example: Running multiple operating systems on a single physical server, such as
running Windows and Linux on the same server.
• Hypervisors: Can be Type 1 (bare-metal, runs directly on hardware) or Type 2
(hosted, runs on top of a host OS).
• Examples: VMware ESXi, Microsoft Hyper-V, KVM (Kernel-based Virtual
Machine), Xen.
[Link] Virtualization:
• This type of virtualization combines hardware and software network
resources into a virtualized network. It abstracts physical networking
hardware, creating virtual networks for different traffic types and
applications, which can improve performance and flexibility.
• Example: Creating virtual LANs (VLANs) or virtual networks for isolated
environments.
3. Storage Virtualization
• Combines multiple physical storage devices into a single virtualized storage
pool, making it easier to manage storage resources. Virtual storage allows
data to be pooled from multiple physical locations and accessed as a unified
resource.
• Example: Using software-defined storage (SDS) solutions to manage
distributed storage resources like SAN (Storage Area Network) or NAS
(Network-Attached Storage)
4. Desktop Virtualization:
• Provides users with virtual desktops that can be accessed remotely. It
involves running desktop operating systems on a server or in the cloud,
allowing users to access their desktop environment from any device.
• Virtual Desktop Infrastructure (VDI), where individual user desktop
environments are hosted on centralized servers.
• Examples: VMware Horizon, Citrix Virtual Apps and Desktops, Microsoft
RDS (Remote Desktop Services).
5. Application Virtualization:
• Separates applications from the underlying operating system so that the
application runs in a virtualized environment and can be accessed from
various devices without needing to install the software directly on each
device.
• Running a software application on a virtual machine while allowing users to
access it remotely.
• Examples: VMware ThinApp, Microsoft App-V, Citrix XenApp.
6. Operating System Virtualization
(Containerization):
• Involves creating lightweight virtual environments (containers) that share the
host OS kernel but are isolated from each other. This is ideal for running
applications in isolated, portable environments without the overhead of full
virtual machines.
• Docker containers that package applications and their dependencies into a
portable container.
• Examples: Docker, Kubernetes, LXC (Linux Containers).
Virtualization Vendors and Platforms
• Several vendors and platforms provide solutions for different types of
virtualization.
[Link]:
• Platform: VMware offers a variety of virtualization solutions for both
enterprise and individual use.
• Products:
• VMware vSphere (for server virtualization)
• VMware Workstation (for desktop virtualization)
• VMware vSAN (for storage virtualization)
• VMware NSX (for network virtualization)
• VMware Horizon (for desktop and application virtualization)
[Link]:
• Platform: Microsoft provides virtualization solutions primarily for businesses
and enterprises.
• Products:
• Hyper-V (for server virtualization)
• Windows Virtual Desktop (for desktop virtualization)
• Microsoft Azure (cloud platform with extensive virtualized resources like VMs, storage, and
networking)
• Remote Desktop Services (RDS) (for application and desktop virtualization)
[Link]:
• Platform: Citrix is a major player in virtualization solutions, with a focus on
providing virtual desktops and applications.
• Products:
• Citrix Hypervisor (formerly XenServer) (for server virtualization)
• Citrix Virtual Apps and Desktops (for desktop and application virtualization)
• Citrix ADC (for application delivery and load balancing)
• Citrix Workspace (for unified endpoint management and virtual environments)
4. Red Hat (and Linux-based solutions):
• Centralized Management: vDS is configured and managed from a central location (vCenter
Server). Changes to the vDS are automatically applied across all associated hosts, making it easier
to manage a large number of hosts.
• Port Groups: Similar to vSS, but port groups on a vDS are not tied to a single host and can span
multiple hosts.
• Advanced NIC Teaming and Load Balancing: vDS supports more sophisticated NIC
teaming configurations, with greater flexibility and additional load balancing algorithms.
• Network I/O Control (NIOC): Allows for prioritization of different types of traffic (e.g.,
vMotion, storage, etc.) across the network.
• Traffic Shaping: Provides more granular control over bandwidth allocation for specific traffic
types (e.g., VM traffic, vMotion traffic).
• Flow Monitoring & Advanced Traffic Management: Provides enhanced
network monitoring capabilities and the ability to track network traffic flows across
the entire virtual infrastructure.
• VLAN Tagging & QoS: Supports advanced VLAN tagging and Quality of
Service (QoS) for more fine-grained control of network traffic.
• Use Case: Ideal for large datacenters or environments with multiple hosts, where
centralized management and advanced features are necessary for network
scalability and control.
• Limitations:
• Requires a vCenter Server to manage and configure.
• More complex to set up compared to vSS.
• Requires a license for vDS, which is not included in the standard vSphere license.
Security Architecture
• In network security architecture, it’s crucial to understand the various
attacks, services, security mechanisms, and how they can be implemented
to protect systems and networks
1. Types of Attacks
▪ Denial of Service (DoS): An attack designed to overwhelm a network or service, making it
unavailable to legitimate users.
▪ Man-in-the-Middle (MitM): An attacker intercepts and potentially alters communications
between two parties without their knowledge.
▪ SQL Injection: Malicious SQL queries are injected into an application’s input fields to execute
arbitrary commands on the backend database.
▪ Cross-Site Scripting (XSS): Attacks targeting web applications where an attacker injects
malicious scripts into the pages viewed by others.
▪ Phishing: Fraudulent attempts to obtain sensitive information (like login credentials) by
pretending to be a trustworthy entity.
▪ Privilege Escalation: An attacker gains higher privileges than those initially granted to exploit
systems or data.
▪ Spoofing: The act of pretending to be another device or user, usually to gain unauthorized access
or confuse systems.
2. Services & Security Mechanisms
• To protect networks from the aforementioned attacks, various services and
security mechanisms are implemented. Some of the key ones include:
• Encryption:
• SSL/TLS (for HTTPS): Encrypts data in transit between a client and server.
• IPsec: A protocol suite for securing Internet Protocol (IP) communications through
encryption and authentication.
• Authentication:
• Multi-Factor Authentication (MFA): Requires more than one form of verification (e.g., password
and fingerprint).
• OAuth/OpenID: Authorization protocols used for third-party services and APIs.
• Access Control:
• Role-Based Access Control (RBAC): Access rights are assigned based on roles (e.g., admin, user).
• Mandatory Access Control (MAC): Uses labels and policies to restrict how resources can be
accessed.
• Intrusion Detection/Prevention Systems (IDS/IPS):
• IDS: Monitors network traffic for suspicious activities.
• IPS: Actively prevents detected malicious activities.
• Firewalls:
• Firewalls are used to monitor and filter network traffic based on predefined security rules. They are
typically deployed at the boundary between internal networks and the internet.
3. Port Forwarding and NAT
• Network Address Translation (NAT):
• NAT is a technique used in routing to translate private IP addresses to public
IP addresses, typically used for allowing internal devices (on a private
network) to communicate with external resources (the internet) using a
shared public IP address.
Types of NAT:
• Static NAT: A single private IP is mapped to a single public IP.
• Dynamic NAT: A private IP is dynamically mapped to a pool of public IPs.
• PAT (Port Address Translation): Multiple private IP addresses are mapped
to a single public IP address, but with different port numbers.
Port Forwarding:
• Port forwarding is a technique that directs incoming traffic on specific ports to a particular internal
device or service behind a router/firewall.
• Use Case: It’s often used to allow remote access to services such as a web server (HTTP), FTP, or
game server hosted within an internal network, which would otherwise be blocked by NAT or firewall
policies.
• Example: If you want to host a web server (HTTP) on an internal server with IP [Link] but
your router has a public IP [Link], you would configure the router to forward HTTP traffic on
port 80 to the internal IP [Link]:
4. Firewalls and Their Configurations
• Types of Firewalls:
• Packet Filtering Firewalls: Inspects packets at the network layer and allows or
blocks traffic based on predefined rules (source IP, destination IP, port, etc.).
o Pros: Simple, efficient, and easy to configure.
o Cons: Limited functionality, doesn’t inspect traffic beyond the network layer.
• Stateful Inspection Firewalls:
o How it Works: Tracks the state of active connections and makes decisions based on the context of the traffic.
This provides more granular control compared to packet filtering.
o Pros: More secure than simple packet filtering.
o Cons: Higher resource consumption compared to packet filtering firewalls.
• Proxy Firewalls:
o How it Works: Acts as an intermediary between the client and the server. It processes traffic and then sends
requests on behalf of clients, offering better control and inspection.
o Pros: High level of security and can provide traffic inspection at the application layer.
o Cons: Performance overhead and potential latency issues.
• Next-Generation Firewalls (NGFW):
o How it Works: Combines traditional firewall features with advanced capabilities such as deep packet
inspection (DPI), intrusion prevention, application awareness, and integrated threat intelligence.
o Pros: Offers robust security, capable of blocking sophisticated threats.
o Cons: Expensive and complex to configure.
Thanks