Windows Server 2008 R2 Unleashed (190 page)

BOOK: Windows Server 2008 R2 Unleashed
3.36Mb size Format: txt, pdf, ePub

1. Log on to the desired server with local administrator privileges.

2. Click Start, Administrative Tools, Remote Desktop Services, Remote Desktop

Connection Manager.

3. Next, in the Actions pane click the Configure Virtual Desktops Wizard option.

4. Once the wizard has loaded, click Next.

5. Now, on the Specify an RD Virtualization Host Server page, define the name of the

RD Virtualization Host server in the Server Name field, click the Add button, and

then click Next.

6. On the Configure Redirection Settings page, define the name of an RD Session Host

server running in Redirection mode in the Server Name field, click the Add button,

and then click Next.

7. On the Specify an RD Web Access Server page, click Next.

8. On the next page, click Apply, ensure that the Assign Personal Virtual Desktop check

box is selected, and then click Finish.

9. Next, on the Assign Personal Virtual Desktop page, click Select User.

10. In the Enter the Object Name to Select box, enter the user’s account name and click

OK.

11. Next, in the Virtual Machine box, select the name of the virtual machine being

defined to the user, and click Next.

Deploying Remote Desktop Services

977

12. Now, confirm the information is correct, and click Assign.

13. Finally, clear the Assign Another Virtual Machine to Another User check box, and

then click Finish.

Configuring a Virtual Desktop Pool

A virtual desktop pool is a grouping of identically configured virtual machines that reside

on an RD Virtualization Host server. The following steps describe how to create a virtual

desktop pool using existing virtual machines that reside on an RD Virtualization Host

server. These steps should be carried out on the server that has the RD Connection Broker

role service installed and the Configure Virtual Desktops Wizard has not been executed:

1. Log on to the desired server with local administrator privileges.

2. Click Start, Administrative Tools, Remote Desktop Services, Remote Desktop

Connection Manager.

3. Next, in the Actions pane click the Configure Virtual Desktops Wizard option.

4. Once the wizard has loaded, click Next.

5. Now, on the Specify an RD Virtualization Host Server page, define the name of the

25

RD Virtualization Host server in the Server Name field, click the Add button, and

then click Next.

ptg

6. On the Configure Redirection Settings page, define the name of an RD Session Host

server running in Redirection mode in the Server Name field, click the Add button,

and then click Next.

7. On the Specify an RD Web Access Server page, click Next.

8. On the next page, click Apply, clear the Assign Personal Virtual Desktop check box,

and then click Finish.

9. Next, in the Actions pane of the Remote Desktop Connection Manager, click the

Create Virtual Desktop Pool option.

10. On the Welcome page, click Next.

11. Now, select all of the virtual machines that will be part of the virtual desktop pool,

and then click Next.

12. On the Set Pool Properties page, define the following and then click Next:

.
Display Name box—
Define the name for the virtual desktop pool.

.
Pool ID box—
Define the ID used for the virtual desktop pool.

13. Lastly, click Finish.

Deploying RD Licensing

RD Licensing is a required component of any Remote Desktop Services deployment. To

deploy RD Licensing, the following tasks must be completed:

1. Determine the type of RDS CALs that will be used.

2. Install the RD Licensing role service.

3. Activate the RD licensing server.

978

CHAPTER 25

Remote Desktop Services

4. Install RDS client access licenses (RDS CALs) on the RD licensing server.

5. Configure the RD Session Host servers to use the licensing server.

Installing the RD Licensing Role Service

To use the RD Licensing service, the RD Licensing role service needs to be installed on the

system. To install the RD Licensing role service, do the following:

1. Log on to the desired server with local administrator privileges.

2. Click Start, and then click Run.

3. In the Run dialog box, type in ServerManager.msc and click OK.

4. Under Roles Summary, select the Remote Desktop Services option.

5. Under Role Services, select the Add Role Services task.

6. On the Select Role Services page, select the Remote Desktop Licensing role service.

7. On the Configure Discovery Scope for RD Licensing page, do not choose a scope

option and click Next.

8. On the Confirm Installation Selections page, verify the settings, and then click Install.

9. On the Installation Results page, confirm that the installation was successful, and

then click Close.

ptg

Activating the RD Licensing Server

An RD licensing server can be activated automatically if the server has Internet access,

through a web page from any computer with Internet access, or by the administrator

calling a Microsoft Clearing House using an 800 number. The licensing server is activated

by contacting the Microsoft Clearing House server that will send the RD licensing server a

digital certificate. To activate an RD licensing server, follow these steps:

1. Click Start, Administrative Tools, Remote Desktop Services, Remote Desktop

Licensing Manager.

2. Right-click the RD licensing server and select Activate Server.

3. Click Next on the Welcome page.

4. Choose the proper connection method, and click Next.

. If you choose the Web Browser or Phone Connection method, follow the

instructions in the window to complete the activation. Click Finish when

you are done.

. If you choose Automatic Activation, enter the appropriate company informa-

tion to send to the Microsoft Clearing House, and click Next at each window.

5. After the server is activated, uncheck the Install Licenses Wizard Now check box,

and click Finish to return to the Remote Desktop Licensing Manager.

Installing Client Access Licenses

After the RD licensing server is activated, CALs must be installed using the following steps:

1. Click Start, Administrative Tools, Remote Desktop Services, Remote Desktop

Licensing Manager.

Securing Remote Desktop Services

979

2. Right-click the RD licensing server, and click Install Licenses.

3. Click Next on the Welcome page, and depending on the default connection method,

the CAL Installation Wizard will try to connect to the Microsoft activation server.

4. When the wizard connects to the activation server, choose the license program that

the organization participates in, and click Next. For example, select License Pack

(Retail Purchase), Open License, or Select License, as shown in Figure 25.19.

25

ptg

FIGURE 25.19

Choosing the license program.

5. On the Licensing Code page, enter the license number or agreement number for

your licensing pack, click the Add button, and then click Next.

6. After the licensing information is verified and the CALs are installed, click Finish to

close the CAL Installation Wizard.

Now that the licenses are installed, each RD Session Host server must be configured to use

the RD licensing server.

Securing Remote Desktop Services

Remote Desktop Services should be secured using standard security guidelines and policies

defined by an organization. In addition to an organization’s security standards and guide-

lines, it is advisable that administrators use recommended best practices compiled by

Microsoft, as well as the National Institute of Standards and Technologies (NIST) and the

980

CHAPTER 25

Remote Desktop Services

National Security Agency (NSA). Both NIST and NSA provide security lockdown configura-

tion standards and guidelines that can be downloaded from their websites (http://www.

nist.gov and http://www.nsa.gov, respectively).

Securely Building Remote Session Services

When building security into Remote Desktop Services, keep in mind that you are giving

users certain levels of access to a shared resource. Essentially, users are logging on to a

system and using the applications and services installed on that server or virtual machine.

With this in mind, it is important to strike a balance between a user’s productive capabil-

ity and what the user can do (intentionally or accidentally) to a system. Otherwise, a

single session can significantly affect other user sessions, as well as the entire RD Session

Host server or an individual shared virtual machine. Additionally, administrators should

also consider that depending on their deployment strategy, users might be accessing

Remote Desktop Services from external systems. Therefore, a comprehensive approach

around end-to-end security (from the client to RD Session Host/virtual machine) needs to

be implemented.

Segmenting Resources

RD Session Host server resources should be segmented in such a way that users can only

ptg

modify specific settings. This sounds simple, but requires careful planning. For instance,

partitioning the server’s disk subsystem can keep the operating system, logs, applications,

and profiles separated. Each of these partitions should also be formatted with NTFS so that

the proper permissions can be applied. This also makes it easier for administrators to

manage and lock down specific resources.

The profile partition should be given particular attention because of the nature of the

content it stores. For smaller installations, profiles can be stored on the local server on a

separate partition. For larger installations, temporary profiles should be kept on a separate

partition and folder redirection should be used for data that needs to roam with a user.

This not only improves security, but it can also significantly improve performance.

Typically, these temporary RDS profiles are stored under

%SystemDrive%\Users\%Username%, even if roaming profiles are used in the network

environment. To change the location to another partition, do the following:

1. Create a Users folder on the partition.

2. Modify HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\

CurrentVersion\ProfileList\ProfilesDirectory Reg_Sz to the new location.

3. Restart the server.

Securing Remote Desktop Services with GPOs

As mentioned later in the “Group Policy for RD Session Host Servers” section, GPOs can

and should be used to secure the Remote Desktop Services environment. For instance, if an

application or department working with sensitive information uses Remote Desktop

Services, the Remote Control setting can be disabled to ensure that only authorized users

Supporting Remote Desktop Services

981

can view these sessions. Group Policy can also be used to set disconnect timeout values

and allow reconnections from only the original client. For more complex security require-

ments, Group Policy can also be used to secure and customize a user’s session. For example:

. GPO can be used to create a secure desktop that gives users limited Windows func-

tionality based on their needs.

. Or, if supported, a GPO can be used to customize and restrict individual applica-

tion features.

Network Level Authentication

In RDP 6.0, a feature called Network Level Authentication was introduced. This feature

enhanced RDP security by providing an interface for user authentication earlier in the

connection process of a session (before a Remote Desktop connection and the logon

screen appears). The following are the benefits of configuring Remote Desktop Services to

require Network Level Authentication:

. Fewer resources are used validating users before presenting them with a full session.

25

. Remote computer authentication can be used to preauthenticate servers as well.

ptg

. It can reduce the risk of a denial-of-service attack.

Changing the RDP Port

As mentioned earlier, Remote Desktop Services securely communicates over TCP port 3389

using RDP. Organizations requiring even greater security can change the default port by

modifying the following Registry key:

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Terminal

Server\WinStations\RDP-Tcp\PortNumber

Or, if RemoteApp programs are being used, the RDP settings can be modified to specify a

Other books

Don't Swap Your Sweater for a Dog by Katherine Applegate
The Fire of Life by Hilary Wilde
Summer Secrets by Sarah Webb
The Loves of Judith by Meir Shalev
The Vietnam Reader by Stewart O'Nan
Inez: A Novel by Carlos Fuentes
The Day the Rabbi Resigned by Harry Kemelman
Avenging Angel by Rex Burns