IT tutorials
 
Technology
 

System Center Configuration Manager 2007 : Network Access Protection in Windows Server 2008

10/14/2013 9:16:48 PM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

Network Access Protection is a ConfigMgr process in which NAP-capable clients evaluate their compliance with predefined policies and send this data in as a client Statement of Health (SoH) to the System Health Validator point (SHV) site system. This evaluation consists of comparing the updates specified in the NAP policy with what is installed on the client. ConfigMgr administrators can choose actions to perform when clients are found to be out of compliance; this process is known as remediation. Remediation uses existing software update packages to update the client with the software updates feature.

The systems responsible for the policies, health evaluation, and remediation are often confused due to ConfigMgr relying on Windows Server 2008’s Network Policy Server (NPS). ConfigMgr by itself does not enforce compliance with NAP; it provides a mechanism by which ConfigMgr clients can produce an SoH with a noncompliant status if they lack software updates required by the ConfigMgr NAP policies you configure. A ConfigMgr SHV confirms the health state of the computer as compliant or noncompliant, and passes this information to the NPS. Policies on the NPS then determine whether noncompliant computers will be remediated and, additionally, whether they will have restricted network access until they are compliant.

NAP is only supported on the following operating systems:

  • Windows XP with SP 3 and above

  • Windows Vista

  • Windows Server 2008

Here are 10 things you should know about ConfigMgr NAP:

  • The technologies required for NAP are built in to Windows Server 2008 and Windows Vista.

  • Deploying NAP does not require additional licenses (check with your Microsoft representative for current information on licensing).

  • The NAP agent is really a service running on the box and can be managed via group policy.

  • The agent for XP shipped as part of Service Pack 3 for XP in April of 2008.

  • NAP is not a security solution; it is a network health solution.

  • There is no NAP agent for Windows Server 2003; Microsoft is not developing an NAP agent for any platform older than Windows XP Service Pack 3.

  • NAP interoperates with Cisco’s Network Admission Control framework.

  • NAP interoperates with practically every switch/access point in the market and uses industry-standard protocols.

  • NAP is currently deployed to thousands of desktops inside and outside of Microsoft.

  • The NAP Statement of Health protocol has been accepted as a TNC/TCG standard.

NPS Overview in Windows Server 2008

Network Policy Server is Microsoft’s replacement technology in Windows Server 2008 for Internet Authentication Service (IAS) in Windows Server 2003. IAS only provided a subset of NPS’s capabilities. Both IAS and NPS allow administrators to route traffic authentication against AD for remote access and enforcement of network access. Both technologies offer these capabilities:

  • VPN services

  • Dial-up services

  • 802.11 protected access

  • Routing and Remote Access (RRAS)

  • Authentication through AD

  • Control of network access with policies (GPOs)

NPS now lets administrators centrally configure and manage network policies with the following three features: RADIUS (Remote Authentication Dial-In User Service) server, RADIUS proxy, and NAP policy server. NPS also allows centralized connection authentication, authorization, and accounting for many types of network access, including wireless and virtual private network (VPN) connections.

NPS’s full suite on functionality and capabilities includes the following:

  • Microsoft’s implementation of the RADIUS protocol.

  • Configurable as a RADIUS server.

  • Configurable as a RADIUS proxy that forwards connection requests to other RADIUS servers for processing.

  • A required component of NAP. When you deploy NAP, NPS functions as an NAP health policy server.

  • Configurable to perform all three functions (RADIUS server, RADIUS proxy, NAP health policy server) at the same time.

  • Compatible with user account databases in Active Directory Domain Services (AD DS).

NPS is available on all Windows Server 2008 editions except Microsoft’s Web Server 2008.

ConfigMgr NAP Policies

NAP policies in ConfigMgr evaluate clients and verify if they have the required updates. ConfigMgr then sends the NPS the SoH from the client and a list of remediation servers. NPS then determines whether the client will be granted full network access or restricted network access, and whether the computer can be remediated if found to be out of compliance. NPS supports the following policies for NAP clients:

  • NAP-capable clients that are compliant have full network access.

  • NAP-capable clients that are noncompliant have restricted network access until remediated.

  • NAP-capable clients that are noncompliant have full network access for a limited time and are immediately remediated.

  • NAP-ineligible clients have full network access.

  • NAP-ineligible clients have restricted network access but are not remediated.

  • All error conditions, by default, result in computers having restricted access (with remediation if supported by the client), but they can be configured for full network access.

Caution: ConfigMgr NAP Remediation Requirement

If health policies are not enforced in the network policy on the NPS, NAP in Configuration Manager cannot remediate noncompliant computers. Compliance in this case can be achieved through the defined Configuration Manager Software Updates functionality. If health policies are enforced in the network policy on the NPS, NAP in Configuration Manager always attempts to remediate noncompliant computers, even if the option to auto-remediate noncompliant computers is not enabled in the network policy.


NAP in ConfigMgr 2007 builds on the capabilities and automation routines offered natively in NPS. The integration of NPS in ConfigMgr creates some very sophisticated possibilities for administrators to secure their network environment. The value of NAP increases exponentially as the number of mobile systems in an environment increase.

ConfigMgr NAP Evaluation

ConfigMgr NAP is a feature that allows administrators the ability to enforce compliance of software updates, or restrict access, on client computers to help protect the integrity of the network. NAP is managed via policies that the clients download. Administrators define their requirements for connectivity to the environment. The client checks its configuration against that which is defined, and generates a client Statement of Health. This SoH is sent to the SHV, a ConfigMgr role. The SHV evaluates what is required if the client is out of compliance and offers options defined by the administrator for remediation. The remediation process may be user interactive or completely silent, depending on the administrative desires for the specific deviation from compliance. If the client does not have current NAP policies, the agent will kick off a machine policy refresh, which includes the latest NAP policies, and then reevaluate its health and send a more current SoH.

Caution: NAP SoH Time Validation

Although NAP SoH time validation can be set as wide as every 7 days, the default is every 26 hours, which could lead to poor user experience due to clients being restricted from the network after long weekends or holidays. Finding an acceptable threshold for your environment will require a balance between user acceptance and security risk mitigation. A good starting point is 4 or 5 days.


NAP’s success hinges on software update management (SUM). If SUM is not working correctly, clients can be accidently quarantined without the capability of remediation. Do not NAP-enforce software updates without approving and distributing those updates, because clients will otherwise be unable to remediate. An exception to this is for those highly critical patches, where the risk of infection is greater than network access by the non-compliant user or system.

NAP Health State

ConfigMgr clients generate an SoH when the NAP agent requests it from the ConfigMgr client. The ConfigMgr client sends the SoH to the ConfigMgr SHV for verification. The SHV then sends a Statement of Health Response (SoHR) containing the client health state to the NPS. The NPS then sends the client heath state back to the client as an SoHR. The SoH always contains the following items:

  • The client’s compliance status

  • The client’s site

  • A timestamp reference to identify the Configuration Manager NAP policies that the client used to evaluate its compliance

All NAP-capable clients generate an SoH with a compliant status, even when the site is not NAP enabled. Once NAP is enabled on the site, clients will evaluate their SoH against the NAP policies defined on the NPS.

Caution: Forcing Fresh Scans for NAP Evaluations

Perform thorough testing when using the Force a fresh scan for each evaluation option on the NAP agent within ConfigMgr. This feature will generate excessively long authentication times and may lead to an unfavorable boot-up/logon experience.

This is another setting to use with caution, but it may be of value in situations where a specific patch is required. Experiment with these enforcement settings in a lab environment, so the end user experience is clearly understood.


The SHV will accept a cached statement of health from clients if it is within the configured validity period and it does not conflict with the optional Date setting specified on the General tab of System Health Validator Point Component Properties. SoH messages may also contain failures when a client cannot determine its own health status. Figure 1 illustrates the System Health Validator Point Component configuration within the ConfigMgr console.

Figure 1. SHV component properties

When clients generate an unknown response state failure, the NPS may not be able to auto-remediate the client. ConfigMgr clients may return a compliant SoH when they actually are noncompliant, and the SHV will send a noncompliant SoH to the NPS. This can occur when the client has not downloaded the new policies for compliance and is sending a cached SoH. When a client’s SoH is sent to the SHV/NPS with a noncompliant status and it is remediated, the client will generate another SoH and re-send it, with a list of the client’s MP, DP, and SUP, to the SHV, where it will be reevaluated and eventually granted access to the network.

 
Others
 
- System Center Configuration Manager 2007 : PKI Management References (part 3) - Certificate Templates, Certificate Validation, Deploying Certificates
- System Center Configuration Manager 2007 : PKI Management References (part 2) - How SSL Works, Establishing a PKI
- System Center Configuration Manager 2007 : PKI Management References (part 1) - Cryptography Basics
- Administering an Exchange Server 2007 Environment : Using the Exchange Server 2007 Toolbox
- Administering an Exchange Server 2007 Environment : Journaling and Archiving
- Administering an Exchange Server 2007 Environment : Server Administration
- Sharepoint 2010 : Making Business Intelligence Work - Excel Services
- Sharepoint 2010 : Making Business Intelligence Work - Excel Services
- Sharepoint 2010 : Getting Started with Business Intelligence
- Windows Small Business Server 2011 : Advanced Email Configuration (part 3) - Adding an Additional Email Domain Name, Changing the Maximum Message Size
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us