Archive

Archive for the ‘Windows 7’ Category

On-premises BitLocker management using System Center Configuration Manager

Beginning in June 2019, System Center Configuration Manager (SCCM) will release a product preview for BitLocker management capabilities, followed by general availability later in 2019.

Configuration Manager will support BitLocker for Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education editions. It will also support Windows 7, Windows 8, and Windows 8.1 during their respective support lifecycles.

SCCM will provide the following BitLocker management capabilities:

Provisioning
Our provisioning solution will ensure that BitLocker will be a seamless experience within the SCCM console while also retaining the breadth of MBAM.

Prepare Trusted Platform Module (TPM)
Admins can open the TPM management console for TPM versions 1.2 and 2.0. Additionally, SCCM will support TPM+PIN for log in. For those devices without a TPM, we also permit USBs to be used as authenticators on boot.

Setting BitLocker Configuration
All MBAM configuration specific values that you set will be available through the SCCM console, including: choose drive encryption and cipher strength, configure user exemption policy, fixed data drive encryption settings, and more.

Encryption
Encryption allows admins to determine the algorithms with which to encrypt the device, the disks that are targeted for encryption, and the baselines users must provide in order to gain access to the disks.

Policy enactment / remediation on device
Admins can force users to get compliant with new security policies before being able to access the device.

New user can set a pin / password on TPM & non-TPM devices
Admins can customize their organization’s security profile on a per device basis.

Auto unlock
Policies to specify whether to unlock only an OS drive, or all attached drives, when a user unlocks the OS drive.

Helpdesk portal with auditing
A helpdesk portal allows other personas in the organization outside of the SCCM admin to provide help with key recovery, including key rotation and other MBAM-related support cases that may arise.

Key rotation
Key rotation allows admins to use a single-use key for unlocking a BitLocker encrypted device. Once this key is used, a new key will be generated for the device and stored securely on-premises.

Compliance reporting
SCCM reporting will include all reports currently found on MBAM in the SCCM console. This includes key details like encryption status per volume, per device, the primary user of the device, compliance status, reasons for non-compliance, etc.

If you are familiar with Microsoft BitLocker Administration and Monitoring (MBAM), you probably noticed that above listed BitLocker-related SCCM improvements to come look a lot like MBAM features – and you would be correct to think that. The reason for that is in Microsoft’s announcement for the MBAM support – MBAM will end mainstream support on July 9, 2019 and will enter extended support until July 9, 2024.

Regardless of the MBAM situation, I sure am happy to see this new feature set is coming to SCCM.

More info at: Microsoft expands BitLocker management capabilities for the enterprise

AaronLocker – automate AppLocker configuration

February 25, 2019 Leave a comment

AppLocker is application whitelisting security feature that became available in Windows 7 and Windows Server 2008 R2. With Windows 10 and Windows Server 2016 Microsoft decided to rebrand it to Windows Defender Application Control or WDAC for short. Other than rebranding it, AppLocker didn’t receive any major improvements. In most of the management tools you will still find it under AppLocker name.

If you want to learn more about it, I would recommend you to check out official documentation.

If you or your company is using Windows Enterprise or Education client operating system, then you should look at setting up AppLocker. The implementation itself doesn’t take much time but it can drastically improve overall security of Windows environment. In Windows 10 and Windows Server 2016 AppLocker represents one part of multi-layer defense strategy.

To ease the implementation, Aaron Margosis put together set of PowerShell scripts including detailed documentation called AaronLocker. What AaronLocker helps you do is automate most of the tasks needed to implement and maintain AppLocker.

Few of the nice to have features are:

– Selective scan of any folder and subfolders with rule merge
– Additional rules for domain-joined PCs
– Find user writable paths and set exclusions
– Exclude sensitive build-in Windows programs, that are rarely used by non-admins
– Policy report in Excel
– Audit and Enforce policy
– Audit/Enforce summary reporting from AppLocker Logs in Event Viewer
– Reporting supports forwarded events with Event Forwarding (How-to in the documentation)
– Detailed documentation including how to implement Pilot / Broad / Production phases

You can learn more about AaronLocker from the documentation available on the GitHub portal. If you prefer or like video content, you can also check two YouTube videos, first one introducing the solution and second one quick start.

Where to start your journey when your goal is multi-boot USB

January 10, 2012 Leave a comment

Not so often anymore, but still sometimes I find myself in situation when I have to analyze and possibly repair broken Windows system. When that happens, it is good to have few tools at hand. Because you never know what went wrong in advance, it is good to be prepared for all occasions. I usually need only one USB drive – my 32GB multi-boot USB drive (you can also go with less).

On my USB, there are quite few tools; some of them might come in handy even to you some day. Just to kick-start your journey I will give you few pointers:

You need bootable USB and something to boot. I prefer:

Windows 7 USB/DVD tool
– Free
– Good for Windows-only multi-boot
– Wizard driven “ISO to USB/DVD” converter
– Can create bootable USB from any WIM based image, like:
     – Windows Vista & Windows Server 2008
     – Windows 7 & Windows Server 2008 R2
     – Windows Defender Offline
     – Microsoft Diagnostics and Recovery Toolset
     – Windows PE – you can get it in Windows AIK
     – Windows RECreate a Windows RE Recovery Media

Windows Defender Offline
– Free
– Dedicated to finding and removing malicious and potentially unwanted programs
– Based on Windows PE
– Wizard driven USB/DVD creator

Microsoft Diagnostics and Recovery Toolset
– Free for Microsoft SA customers, available to Volume Licensing customers, Microsoft Development Network subscribers, and Microsoft TechNet subscribers
– Packed with tools like Locksmith, Crash Analyzer, File Restore, Disk Wipe and Standalone System Sweeper
– Based on Windows PE
– Wizard driven USB/DVD creator

Universal USB Installer
– Free
– Great for true multi-boot
– Can combine multiple Windows based and non-Windows based images onto one media
– Supports Windows XP and newer
– Supports 90+ Linux distributions (don’t forget to check out KON-BOOT*)
– Wizard driven USB/DVD creator

When creating bootable USB all the applications require USB format (wipe and FAT32 created).

If you also like to have updated Sysinternals tools with you, don’t forget to check out SysInternalsUpdater.

*Great tool for true bypassing of local Windows Logon passwords.

Remote Server Administration Tools for Windows 7 SP1 available for download

April 12, 2011 2 comments

RSAT Client is the collection of Windows Server management tools which enable IT professionals to manage their Windows Server infrastructure from their PCs running Windows 7 SP1 and Windows 7.

This is the list of Windows Server administration tools which are included in RSAT Client for Win7 SP1:

Server Administration Tools:
Server Manager

Role Administration Tools:
Active Directory Certificate Services (AD CS) Tools
Active Directory Domain Services (AD DS) Tools
Active Directory Lightweight Directory Services (AD LDS) Tools
DHCP Server Tools
DNS Server Tools
File Services Tools
Hyper-V Tools
Terminal Services Tools

Feature Administration Tools:
BitLocker Password Recovery Viewer
Failover Clustering Tools
Group Policy Management Tools
Network Load Balancing Tools
SMTP Server Tools
Storage Explorer Tools
Storage Manager for SANs Tools
Windows System Resource Manager Tools

Download page at Microsoft Download Center: RSAT for Windows 7 with SP1

If you followed my previous post on how to manually install RSAT tools on Windows 7 with SP1 you can also install this update on your PC over existing RSAT tools.

Categories: Microsoft, Windows 7

Error message when installing RSAT on Windows 7 SP1: ‘This update is not applicable to your computer’ or how to install RSAT on Windows 7 SP1

March 29, 2011 3 comments

If you can install RSAT on Windows 7 RTM and than do the update to SP1 – do it. Currently this is the only supported way of using RSAT on Windows 7 updated to SP1.

Use the following steps for testing purposes only. I did clean install of Windows 7 with SP1 already integrated and this was the only way for me to get RSAT working. So far so good Smile.

Here are my steps – first download all necessary files to RSAT folder (D:\RSAT), then:

1. step
Expand the RSAT msu file to a folder like D:\RSAT\RTM:
D:\RSAT>start /wait expand -f:* amd64fre_GRMRSATX_MSU.msu RTM
or
D:\RSAT>start /wait expand -f:* x86fre_GRMRSAT_MSU.msu RTM

2. step
Expand the CAB file included in previously expanded MSU:
D:\RSAT\RTM>start /wait expand -f:* Windows6.1-KB958830-x64.cab Windows6.1-KB958830-x64
or
D:\RSAT\RTM>start /wait expand -f:* Windows6.1-KB976932-x86.exe Windows6.1-KB976932-x86

3. step
Extract Windows 7 Service Pack 1 files to a folder like W7-SP1:
D:\RSAT>start /wait windows6.1-KB976932-X64.exe /X:D:\RSAT\W7-SP1
or
D:\RSAT>start /wait windows6.1-KB976932-X86.exe /X:D:\RSAT\W7-SP1

4. step
Expand the CAB file included in previously extracted EXE:
D:\RSAT\W7-SP1>start /wait expand -f:* windows6.1-KB976932-X64.cab windows6.1-KB976902-X64
or
D:\RSAT\W7-SP1>start /wait expand -f:* windows6.1-KB976932-X86.cab windows6.1-KB976902-X86

5. step
Install the RSAT MUMs (replace the language-specific (en-us) MUM files with the language of your Windows 7 OS!):
D:\RSAT>start /wait pkgmgr /ip /m:"d:\RSAT\RTM\Windows6.1-KB958830-x64\microsoft-windows-remoteserveradministrationtools-package~31bf3856ad364e35~amd64~~6.1.7600.16385.mum"
D:\RSAT>start /wait pkgmgr /ip /m:"d:\RSAT\RTM\Windows6.1-KB958830-x64\microsoft-windows-remoteserveradministrationtools-package~31bf3856ad364e35~amd64~en-us~6.1.7600.16385.mum"
D:\RSAT>start /wait pkgmgr /ip /m:"d:\RSAT\RTM\Windows6.1-KB958830-x64\microsoft-windows-remoteserveradministrationtools-package-minilp~31bf3856ad364e35~amd64~en-us~6.1.7600.16385.mum"
D:\RSAT>start /wait pkgmgr /ip /m:"d:\RSAT\W7-SP1\windows6.1-KB976932-X64\microsoft-windows-remoteserveradministrationtools-package~31bf3856ad364e35~amd64~~6.1.7601.17514.mum"
or
D:\RSAT>start /wait pkgmgr /ip /m:"d:\RSAT\RTM\Windows6.1-KB958830-x86\microsoft-windows-remoteserveradministrationtools-package~31bf3856ad364e35~x86~~6.1.7600.16385.mum"
D:\RSAT>start /wait pkgmgr /ip /m:"d:\RSAT\RTM\Windows6.1-KB958830-x86\microsoft-windows-remoteserveradministrationtools-package~31bf3856ad364e35~x86~en-us~6.1.7600.16385.mum"
D:\RSAT>start /wait pkgmgr /ip /m:"d:\RSAT\RTM\Windows6.1-KB958830-x86\microsoft-windows-remoteserveradministrationtools-package-minilp~31bf3856ad364e35~x86~en-us~6.1.7600.16385.mum"
D:\RSAT>start /wait pkgmgr /ip /m:"d:\RSAT\W7-SP1\windows6.1-KB976932-X86\microsoft-windows-remoteserveradministrationtools-package~31bf3856ad364e35~x86~~6.1.7601.17514.mum"

You can do the same with DISM in one step:
d:\RSAT\RTM\Windows6.1-KB958830-x64>DISM.exe /Online /NoRestart /Add-Package /PackagePath:"microsoft-windows-remoteserveradministrationtools-package~31bf3856ad364e35~amd64~~6.1.7600.16385.mum" /PackagePath:"microsoft-windows-remoteserveradministrationtools-package~31bf3856ad364e35~amd64~en-us~6.1.7600.16385.mum" /PackagePath:"microsoft-windows-remoteserveradministrationtools-package-minilp~31bf3856ad364e35~amd64~en-us~6.1.7600.16385.mum" /PackagePath:"d:\RSAT\W7-SP1\windows6.1-KB976932-X64\microsoft-windows-remoteserveradministrationtools-package~31bf3856ad364e35~amd64~~6.1.7601.17514.mum"
or
d:\RSAT\RTM\Windows6.1-KB958830-x86>DISM.exe /Online /NoRestart /Add-Package /PackagePath:"microsoft-windows-remoteserveradministrationtools-package~31bf3856ad364e35~x86~~6.1.7600.16385.mum" /PackagePath:"microsoft-windows-remoteserveradministrationtools-package~31bf3856ad364e35~x86~en-us~6.1.7600.16385.mum" /PackagePath:"microsoft-windows-remoteserveradministrationtools-package-minilp~31bf3856ad364e35~x86~en-us~6.1.7600.16385.mum" /PackagePath:"d:\RSAT\W7-SP1\windows6.1-KB976932-X86\microsoft-windows-remoteserveradministrationtools-package~31bf3856ad364e35~x86~~6.1.7601.17514.mum"

6. step
Reboot (if needed) and open "Turn Windows Features on or off" and activate the RSAT Tools you want. You can also install all RSAT Tools in one step with DISM:
DISM.exe /Online /NoRestart /Enable-Feature /FeatureName:"RemoteServerAdministrationTools" /FeatureName:"RemoteServerAdministrationTools-ServerManager" /FeatureName:"RemoteServerAdministrationTools-Roles" /FeatureName:"RemoteServerAdministrationTools-Roles-CertificateServices" /FeatureName:"RemoteServerAdministrationTools-Roles-CertificateServices-CA" /FeatureName:"RemoteServerAdministrationTools-Roles-CertificateServices-OnlineResponder" /FeatureName:"RemoteServerAdministrationTools-Roles-AD" /FeatureName:"RemoteServerAdministrationTools-Roles-AD-DS" /FeatureName:"RemoteServerAdministrationTools-Roles-AD-DS-SnapIns" /FeatureName:"RemoteServerAdministrationTools-Roles-AD-DS-AdministrativeCenter" /FeatureName:"RemoteServerAdministrationTools-Roles-AD-DS-NIS" /FeatureName:"RemoteServerAdministrationTools-Roles-AD-LDS" /FeatureName:"RemoteServerAdministrationTools-Roles-AD-Powershell" /FeatureName:"RemoteServerAdministrationTools-Roles-DHCP" /FeatureName:"RemoteServerAdministrationTools-Roles-DNS" /FeatureName:"RemoteServerAdministrationTools-Roles-FileServices" /FeatureName:"RemoteServerAdministrationTools-Roles-FileServices-Dfs" /FeatureName:"RemoteServerAdministrationTools-Roles-FileServices-Fsrm" /FeatureName:"RemoteServerAdministrationTools-Roles-FileServices-StorageMgmt" /FeatureName:"RemoteServerAdministrationTools-Roles-HyperV" /FeatureName:"RemoteServerAdministrationTools-Roles-RDS" /FeatureName:"RemoteServerAdministrationTools-Features" /FeatureName:"RemoteServerAdministrationTools-Features-BitLocker" /FeatureName:"RemoteServerAdministrationTools-Features-Clustering" /FeatureName:"RemoteServerAdministrationTools-Features-GP" /FeatureName:"RemoteServerAdministrationTools-Features-LoadBalancing" /FeatureName:"RemoteServerAdministrationTools-Features-SmtpServer" /FeatureName:"RemoteServerAdministrationTools-Features-StorageExplorer" /FeatureName:"RemoteServerAdministrationTools-Features-StorageManager" /FeatureName:"RemoteServerAdministrationTools-Features-Wsrm" /FeatureName:"IIS-LegacySnapIn" /FeatureName:"IIS-IIS6ManagementCompatibility" /FeatureName:"IIS-WebServerManagementTools" /FeatureName:"IIS-WebServerRole" /FeatureName:"IIS-Metabase"

More info on setup error and download links:
Error message when installing RSAT: ‘This update is not applicable to your computer’
How-To: Install RSAT (Remote Server Administration Tools) on Win 7 Sp1
Remote Server Administration Tools for Windows 7
Windows 7 and Windows Server 2008 R2 Service Pack 1

Categories: Microsoft, Windows 7

Windows 7 SP1

March 12, 2011 Leave a comment