S 4.410 Use of network access protection under Windows

Initiation responsibility: Head of IT

Implementation responsibility: Administrator

Under the heading "Network Access Protection", several protection technologies are summarised for Microsoft operating systems. They control the access of individual IT systems to a network depending on the security level implemented on the respective IT system. In this manner, the sensitive systems that can be reached in the network are protected against threats arising from other systems with a lack of security precautions such as outdated virus signatures.

Under the name "Network Access Protection" (NAP), Microsoft has integrated in several products a mechanism to protect against unauthorised access to networks. Using NAP is optional; it requires at least Windows Server 2008 as well as clients with Windows Vista, Windows 7 or Windows XP with Service Pack 3. Here, components control the access on the Windows server using the clients. During the login procedure, they send information on their security level such as installed updates or on the currency of the virus signatures to the server. On the basis of stored security rules ("policies"), the server decides whether the clients may access the network or the access is denied or limited to just a few servers. In general, these servers contain services which the client needs to restore the required condition. This can be an update mechanism for virus signatures or Windows Updates.

The access to the network to be protected can be controlled on different levels:

Depending on the scenario, the technical procedures and the component used are different. In each case, the clients need a locally running component called System Health Agent, (SHA) which determines the local parameters of the security configuration in System Health Validators (SHVs) and sends it to the receiver. In clients with Windows XP Service Pack 3, Windows Vista and Windows 7, a corresponding SHA has been integrated in the operating system; implementations are also available for clients with Mac OS X or Linux.

The client available in Windows can check the following conditions:

Depending on the selected protection mechanism, the server components involved in the examination include a Health Registration Authority (HRA) to issue certificates for examined clients, a Network Policy Server (NPS) comparing the transferred configurations to the regulatory scheme as well as Enforcement Servers (ES) to implement the result of the NAP examination.

On the network level, Cisco offers its own implementation of a network access protection concept under the name "Network Admission Control". Both technologies can also be used in combination. For this purpose, the Cisco network components integrate a query into the examination of the clients for a Windows Network Policy Server.

NAP is a recommended tool to provide additional security for sensitive systems in a network. The gain of security, however, may not be overrated: Since the agents for determining the security level inevitably run on the clients themselves, an attacker can in principle manipulate the client with an administrative access so that they can gain access to the network using false information. NAP does not provide protection against targeted attacks, but is particularly suited to minimise damage for undirected attacks such as virus infections.

When planning the use of NAP, the following aspects must be considered:

Review questions: