OsbornePro TV
OsbornePro TV
  • Видео 28
  • Просмотров 219 002
How To Install Windows Server 2022 Active Directory (AD DS)
I (tobor), cover How To Install Active Directory Directory Services (AD DS) on Windows Server and how to perform initial configuration actions. If you have any questions about this video please leave them in the comments down below. If you haven't Subscribed yet please do its free! And if you like this video give a thumbs up and share it. Thanks for watching OsbornePro TV!
Link to Default Ports:
social.technet.microsoft.com/wiki/contents/articles/52765.windows-server-2019-step-by-step-setup-active-directory-environment-using-powershell.aspx
Capacity Planning:
learn.microsoft.com/en-us/windows-server/administration/performance-tuning/role/active-directory-server/capacity-planning-for-active-d...
Просмотров: 1 206

Видео

How To Install Windows Server in VMWare Workstation
Просмотров 42210 месяцев назад
I (tobor), cover How To Install Windows Server 2022 on VMWare Workstation Pro 17. If you have any questions about this video please leave them in the comments down below. If you haven't Subscribed yet please do its free! And if you like this video give a thumbs up and share it. Thanks for watching OsbornePro TV! Download VHD: www.microsoft.com/en-us/evalcenter/download-windows-server-2022 Compa...
How To Speed Up a Slow Windows Computer
Просмотров 44710 месяцев назад
I (tobor), cover How To improve the performance of your Windows Computer by making a few simple adjustments. If you have any questions about this video please leave them in the comments down below. If you haven't Subscribed yet please do its free! And if you like this video give a thumbs up and share it. Thanks for watching OsbornePro TV! # Repair Corrupt System Files sfc /scannow dism /online ...
How to Set Your DNS Servers (Windows)
Просмотров 34110 месяцев назад
I (tobor), cover How To set DNS entries manually on your local Windows machine. If you have any questions about this video please leave them in the comments down below. If you haven't Subscribed yet please do its free! And if you like this video give a thumbs up and share it. Thanks for watching OsbornePro TV! # Get your DNS Servers Get-DnsClientServerAddress -AddressFamily IPv4 # Set your DNS ...
How to Set a Static IP Address (Windows)
Просмотров 4,5 тыс.10 месяцев назад
I (tobor), cover How To Configure a Static IP Address on a Windows operating system. If you have any questions about this video please leave them in the comments down below. If you haven't Subscribed yet please do its free! And if you like this video give a thumbs up and share it. Thanks for watching OsbornePro TV! # Set Wi-Fi adapter IP Address From Terminal ```netsh interface ipv4 set address...
VMWare Workstation Stops at Boot Manager
Просмотров 4 тыс.10 месяцев назад
I (tobor), demonstrate how to resolve a VMWare Workstation server from stopping a servers boot process at the Boot Manager. This was done on VMWare Workstation 17 Pro booting a Windows Server 2022 ISO. Official Site of OsbornePro osbornepro.com/ View my Verified Certifications! www.youracclaim.com/users/roberthosborne/badges Follow us on GitHub! github.com/tobor88 github.com/OsbornePro Give Res...
How To Configure Secure Dynamic DNS (Windows Server 2022)
Просмотров 8 тыс.2 года назад
I (tobor), demonstrate how to set up Secure Only Dynamic DNS updates on Windows Server 2022. If you are NOT using best practices, running your DHCP service on your Active Directory server you will need to execute the below command to apply least privilege. CMD: dnscmd /config /OpenAclOnProxyUpdates 0 Script to Configure Dynamic DNS github.com/OsbornePro/ConfigTemplates/blob/main/ConfigureDynami...
Securing Lighttpd (Pi-Hole) [Debian Linux]
Просмотров 1,7 тыс.3 года назад
Securing Lighttpd (Pi-Hole) [Debian Linux] I (tobor), demonstrate some extra measures that can be taken to harden a lighttpd server. I demonstrate settings I have configured for a Pi-Hole running on Lighttpd. If you like what you see please subscribe! CONFIG TEMPLATE FOR /etc/lighttpd/external.conf github.com/OsbornePro/ConfigTemplates/blob/main/lighttpd-external.conf github.com/OsbornePro/Conf...
Securing Apache [Debian Linux]
Просмотров 2,2 тыс.3 года назад
Securing Apache [Debian Linux] I (tobor), demonstrate how to secure an Apache server on a Debian based Linux system and show some of the reasons behind them. If you like what you see please subscribe! COMMANDS TO USE WHAT I USED sudo apt update && sudo apt install -y apache2 apache2-utils libapache2-mod-security2 libapache2-mod-evasive sudo a2enmod ssl headers security2 socache_shmcb unique_id ...
Forgot Admin Password (Windows) [PassFab 4WinKey]
Просмотров 10 тыс.3 года назад
Forgot windows 10 password? How to remove password from windows 10? You can try PassFab 4WinKey(bit.ly/3iGimWm), unlock Windows 10 password. Free Download Best Windows password recovery and password reset tool, 100% working and easy! Forgot Admin Password (Windows) [PassFab 4WinKey] I (tobor), demonstrate how you can reset a forgotten local administrator password on Windows using PassFab's 4Win...
Securing the Local Admin Account (LAPS Password Manger) [Windows Server 2019]
Просмотров 2,8 тыс.3 года назад
Securing the Local Administrator Account (LAPS Password Manger) [Windows Server 2019] I (tobor), demonstrate how to secure the local Administrator account in a domain environment using LAPS password manager. If you like what you see please Subscribe! LAPS Backup Script github.com/OsbornePro/BackupScripts/blob/main/BackupLAPS.ps1 LAPS Installer www.microsoft.com/en-us/download/confirmation.aspx?...
Getting Started with AppArmor (Debian Based Linux) [Linux Mint]
Просмотров 5 тыс.3 года назад
Getting Started with AppArmor (Debian Based Linux) [Linux Mint] I (tobor), demonstrate what you need to know in order to get started with apparmor. Apparmor is a MAC based service control for Debian based Linux operating systems. It applies the principals of least privilege to programs and services. If you like what you see please Subscribe! NEW USER CHECK SCRIPT github.com/tobor88/Bash/blob/ma...
Securing Files with EFS (Encrypting File System) [Windows Environment]
Просмотров 1,8 тыс.3 года назад
Securing Files with EFS (Encrypting File System) [Windows Environment] I (tobor), demonstrate how to set up Encrypting File System (EFS) for use in a domain environment. If you like what you see please Subscribe! 0:00 Intro Summary 0:59 How to use EFS encryption without EncrypIT 1:28 How to use EncrypIT for EFS encryption 1:52 Use EncrypIT to backup an EFS certificate 2:43 Why you want an EFS R...
Securing RADIUS with EAP-TLS (Wired WPA2- Enterprise) [Windows Server 2019]
Просмотров 18 тыс.3 года назад
IMPORTANT NOTE: At 14:47 we want to set the authentication method to "RADIUS, None" not "None". This uses RADIUS authentication and keeps the port authenticated even if the RADIUS server is not available. Brandon Harp was kind enough to point out my misunderstanding here. Thanks Brandon! I put together a script that can be run as a cron job on a Linux device that will generate a private key, cr...
Securing Windows 10 [Windows 10]
Просмотров 6 тыс.3 года назад
Securing Windows 10 [Windows 10] I (tobor), demonstrate how to make your Windows 10 computer more secure and the reasons behind them. If you like what you see please Subscribe! LOG-MD www.imfsecurity.com/free SYSINTERNALS AUTOLOGON docs.microsoft.com/en-us/sysinternals/downloads/autologon POWERSHELL SCRIPT SECURE WINDOWS 10 github.com/OsbornePro/ConfigTemplates/blob/main/Harden-Windows10.ps1 0:...
Securing SMB (Read Note in Description) [Windows Server 2019]
Просмотров 7 тыс.3 года назад
Securing SMB (Read Note in Description) [Windows Server 2019]
Securing RDP (Cover Home and Domain Networks) [Windows]
Просмотров 6 тыс.3 года назад
Securing RDP (Cover Home and Domain Networks) [Windows]
Securing RADIUS with EAP-TLS [Windows Server 2019]
Просмотров 73 тыс.3 года назад
Securing RADIUS with EAP-TLS [Windows Server 2019]
Getting Started Vim [On Raspberry Pi Linux]
Просмотров 1,3 тыс.3 года назад
Getting Started Vim [On Raspberry Pi Linux]
Securing DNS (DNSSEC, DoH, LLMNR, NetBIOS, LMHOSTS) [Windows Server 2019]
Просмотров 4,1 тыс.3 года назад
Securing DNS (DNSSEC, DoH, LLMNR, NetBIOS, LMHOSTS) [Windows Server 2019]
Securing LDAP over SSL Safely [Windows Server 2019]
Просмотров 39 тыс.3 года назад
Securing LDAP over SSL Safely [Windows Server 2019]
Securing FTP over SSL [Windows Server 2019]
Просмотров 4,4 тыс.3 года назад
Securing FTP over SSL [Windows Server 2019]
Securing WinRM over HTTPS [Windows Server 2019]
Просмотров 7 тыс.3 года назад
Securing WinRM over HTTPS [Windows Server 2019]
Getting Started ConEmu [Windows 10]
Просмотров 7 тыс.3 года назад
Getting Started ConEmu [Windows 10]
Securing FTP over SSL (VSFTPD) [Linux]
Просмотров 8533 года назад
Securing FTP over SSL (VSFTPD) [Linux]
Securing SSH [OpenSSH Linux]
Просмотров 4383 года назад
Securing SSH [OpenSSH Linux]
Getting Started Tmux [Linux]
Просмотров 6783 года назад
Getting Started Tmux [Linux]
Getting Started Windows Terminal [Windows 10]
Просмотров 1,5 тыс.3 года назад
Getting Started Windows Terminal [Windows 10]

Комментарии

  • @sashalexander7750
    @sashalexander7750 2 дня назад

    Great video! Thank you very much for both Part1 and Part2! I did some changes following Part1 of your video in my environment.

    • @OsbornePro
      @OsbornePro 2 дня назад

      @@sashalexander7750 thanks for watching! Glad it was helpful

  • @undefined_18
    @undefined_18 6 дней назад

    Hello Dear Robert! Thank you for the very useful video! Following your configuration for the Machine. authentication, I have faced two issues. Radius server doesn't allow to authenticate any devices if we select a network authentication method as "Smart Card or other certificate" following the path (the same as on the video): Edit GPO Policy -> Сomputer Configuration -> Policies -> Windows Settings -> Security Settings -> Wireless Network Policies (IEEE 802.11)-> MyNetworkPolicy -> Select Profile Name and click 'Edit' -> Security Tab -> Select a network authentication method: Smar Card ar Certificate. In this case, all settings are made for machine authentication only. But when I selected "Protected EAP" for the WiFi enrollment, the configured WiFi network is asking user AD credentials to allow connection even if I have 'machine authentication' only. Could you you please give me any advises how we can remove user credentials request if I select "Computer Authentication"? Thank you so much! Regards, Yury

    • @OsbornePro
      @OsbornePro 2 дня назад

      Thanks for watching! If you select PEAP they will be prompted to enter credentials. Use Smart Card or Ofher certificate and Computer Authentication in your settings. Also select the certificate authority so it knows the certificate to auto-choose.

  • @CardinS2U
    @CardinS2U 16 дней назад

    It hep especially llnr

  • @CardinS2U
    @CardinS2U 17 дней назад

    thanks youre awesome. love your videos

    • @OsbornePro
      @OsbornePro 17 дней назад

      @@CardinS2U thanks for watching! Glad it was helpful

  • @Ajith-il6dn
    @Ajith-il6dn 19 дней назад

    how to access from global using public ip

  • @MourningDove1990
    @MourningDove1990 20 дней назад

    Shouldnt the protocol be TLS now, not SSL?

    • @OsbornePro
      @OsbornePro 19 дней назад

      @@MourningDove1990 the terms are used interchangeably. The protocol was called LDAP over SSL before TLS existed. It does technically use a TLS connection not an SSL one

  • @karenbelnap4234
    @karenbelnap4234 Месяц назад

    This video was sooooo helpful! Thank you. You have a new fan.

  • @drossi6635
    @drossi6635 Месяц назад

    Very interesting video ! If I understood correctly, this also means that an attacker on the internal network wouldn't be able to connect via RDP, even if they have a valid username and password ? This would also serve as a form of 2FA ?

  • @AliiikGaming
    @AliiikGaming Месяц назад

    Advanced option not showing on my end :c

  • @websupport-b1s
    @websupport-b1s Месяц назад

    Very insightful! I'm stuck right now with trying to access a network share from server 2019 to a chromebook. Do you have any sugesstions or resources on this?

    • @OsbornePro
      @OsbornePro Месяц назад

      @@websupport-b1s thanks for watching! I don’t have any experience with Chromebooks honestly. I think they are designed to be website based only so I am not sure how they handle file server communication

  • @TechWorldwithPankaj
    @TechWorldwithPankaj Месяц назад

    Thank you for this video. Very helpful.

    • @OsbornePro
      @OsbornePro Месяц назад

      @@TechWorldwithPankaj thanks for watching glad it was helpful!

  • @PmanDelux
    @PmanDelux Месяц назад

    If i use network policy authorization by domain User it doesnt work but when i use domain computer it somehow does

  • @logicalAllyKat
    @logicalAllyKat Месяц назад

    Does anyone know if this causes problems for Device Guard?

  • @mirzairfan3426
    @mirzairfan3426 Месяц назад

    Excellent explaining by keeping it simple and very much understandable for the person who is very new into such tasks. Much appreciated the efforts you done to prepare such wonderful content.

    • @OsbornePro
      @OsbornePro Месяц назад

      @@mirzairfan3426 thanks for watching! Glad it was helpful

  • @wahferreira
    @wahferreira 2 месяца назад

    Hello, excellent content, but I'm having some difficulties. How do I make the machines use port 636 when logging in? In all my tests they are still using 389 and when I block it the service stops working.

    • @OsbornePro
      @OsbornePro 2 месяца назад

      @@wahferreira thanks for watching! Port 389 is still going to be used. The only thing that gets encrypted are LDAP Bind requests. HTTP has options to communicate such a GET POST HEAD PUT OPTIONS. Bind is the LDAP equivalent to one of those which is authentication only

    • @wahferreira
      @wahferreira 2 месяца назад

      Thanks. So the communication will still happen over port 389, but now the information will be encrypted. Is that it? Now I need to go to the next level. Leave the DNS exposed only as Authoritative DNS and recursive only locally.

    • @OsbornePro
      @OsbornePro 2 месяца назад

      @@wahferreira correct with the GPO setting on the windows clients they will use ldaps for ldap bind requests whenever they occur. Third party services will need to be pointed to port 636 and trust the CA that issued the LDAPS certificate.

    • @wahferreira
      @wahferreira 2 месяца назад

      @@OsbornePro Thanks

  • @vaibhavkapoor1987
    @vaibhavkapoor1987 2 месяца назад

    Thanks!

    • @OsbornePro
      @OsbornePro 2 месяца назад

      @@vaibhavkapoor1987 thanks for watching! Glad it was helpful

  • @tremblayd76
    @tremblayd76 2 месяца назад

    Hello, it the procedure needs to be perform on all DC in the environment ? Probably right ?

    • @OsbornePro
      @OsbornePro 2 месяца назад

      @@tremblayd76 hey thanks for watching! You do not need to install the AD LDS role but if you want to use LDAPS on all your DCs you will need to assign each one an individual LDAP certificate and attach it to the NTDS service on each DC. Typically third party devices and apps that aren’t windows require ldap binds for authentication and need to be configured to point to a specific DC. If you want more than one DC to handle this you will want to setup LDAPS on each

    • @tremblayd76
      @tremblayd76 2 месяца назад

      @@OsbornePro Thanks a lot... another thing, when we activate the "Negociate signing" on the client, is it trying to secure the connexion first (636) and if not drop to 389 ? I did activate it on my computer and it does not try to securely authenticate, it's stays on LDAP 389.

    • @OsbornePro
      @OsbornePro 2 месяца назад

      @@tremblayd76 normal LDAP communication will still happen on port 389. Any LDAP born requests performed will use LDAPS on 636 is what will happen there

  • @Thom_us
    @Thom_us 2 месяца назад

    I'm currently setting up a wired 802.1X configuration on my Dell N4048P switch to communicate with my RADIUS server using EAP-TLS for machine certificate authentication. I’ve successfully configured this for Wi-Fi, where my access points communicate with the RADIUS server without issues. In my current wired setup, I’m unable to get the switch to properly communicate with the RADIUS server for dot1x authentication. I've already configured my RADIUS server for AAA authentication on the switch through the CLI. Here are the steps I've followed: Enabled dot1x globally on the switch: dot1x system-auth-control Configured AAA authentication and authorization (RADIUS server is set up for both dot1x and switch authentication): aaa authentication dot1x default radius aaa authorization network default radius Configured the interface (GigabitEthernet 1/0/34) for dot1x: interface gigabitethernet 1/0/34 description "NAC-Test" switchport mode access # Configures the port as an access port switchport access vlan <DEFAULT_VLAN> # Default VLAN before authentication authentication port-control auto # Enables 802.1X on this port dot1x pae authenticator # Sets the port as an authenticator for 802.1X authentication event fail action authorize vlan <Guest_VLAN> # VLAN if authentication fails authentication event no-response action authorize vlan <NO_RESPONSE_VLAN> # VLAN if no response from RADIUS Despite configuring everything as shown above, there is no communication between the switch and the RADIUS server, and the port continues to operate as if 802.1X is not configured. The switch simply assigns the VLAN as it did before, without attempting any authentication for the connected client. On the RADIUS side (using NPS), I don’t see any authentication attempts when a client connects via that port. I do, however, see successful authentication logs when logging in to the switch itself, which indicates that RADIUS is working for switch authentication, but not for dot1x. I have configured all the necessary wired policies on the RADIUS server, so I believe this may be a misconfiguration on the switch. I’m not sure if I need to configure dot1x for the TenGigabit port as well, or if there’s another step I’m missing. TO REMARK, THE RADIUS COMMUNICATES WITH THE SWITCH WHEN DOING AAA AUTHENTICATION VIA SSH, BUT NOT WHEN DOING DOT1X. There's my problem, IDK why, I've spend HOURS and HOURS trying to find why. Any advice or suggestions would be greatly appreciated!

  • @HSula-jj2wn
    @HSula-jj2wn 2 месяца назад

    thanks a lot Rob great video as usual, I have one question, could this be used authenticate users logging on the Cisco switch, rather than a network device, as well?

    • @OsbornePro
      @OsbornePro 2 месяца назад

      @@HSula-jj2wn thanks for watching! You can use RADIUS authentication to login to a Cisco switch however they are only capable of using PAP for credentials and certificates can’t be used. It is still utilized in environments since LDAP is not an option for SSH access.

    • @HSula-jj2wn
      @HSula-jj2wn 2 месяца назад

      @@OsbornePro thanks a lot for the answer. Cheers!

  • @codygregg1629
    @codygregg1629 3 месяца назад

    At 23:02 when setting up the network policy and after you chose smart card or other certificate what certificate is your radius server using? I ask because when I set my radius server up I loaded up the MMC and went to the computer certificate store on the new radius server. Under personal I made a request for a certificate and just pulled down the same Radius Client Server certificate I will be using on my client/supplicants. Is this ok to do? On my radius server if you go to the network policy at 23:02 in your video under EAP Types I am using Smart Card or Other Ceriticiate but if you click the edit button you can see its using that certificate under the computer - personal store which is the same certificate my clients will be using for Radius authentication via the wireless? Is there an issue with that or whats the best practice?

    • @OsbornePro
      @OsbornePro 3 месяца назад

      Thanks for watching! The certificate I select I have had to choose by its expiration date. I use the RADIUS Server certificate template for that. In this video I made a cert that could be used by both the server and client. In this case I would have selected that one. It is okay to do. For least priv purposes it’s best to have a separate template for server and client

    • @codygregg1629
      @codygregg1629 3 месяца назад

      @@OsbornePro Appreciate the feedback. I was not 100 percent sure. I thought it might be best to just setup a cert template for just the radius server that way its not using same cert the clients are using as I currently have the validity period set to 3 months and the renewal period set to 2 months. It may cause issues once I deploy to production if my radius server cert is using the same as the clients.

  • @TheMeMo1999
    @TheMeMo1999 3 месяца назад

    thank you soo much this helped me

    • @OsbornePro
      @OsbornePro 3 месяца назад

      @@TheMeMo1999 thansk for watching glad it was helpful!

  • @ryanmcguire2578
    @ryanmcguire2578 3 месяца назад

    with this, should end users devices then automatically connect once setup?

    • @OsbornePro
      @OsbornePro 3 месяца назад

      @@ryanmcguire2578 thanks for watching! Yes they will automatically connect to wifi once setup

    • @ryanmcguire2578
      @ryanmcguire2578 3 месяца назад

      @OsbornePro ok I had set the up previously on a different dc, and my first test user I had to hit connect for them to connect, in the cert authority should each computer have 2 certs listed?

    • @OsbornePro
      @OsbornePro 3 месяца назад

      @@ryanmcguire2578 if you have two certificates on a device capable of being used for radius auth from the same certificate authority. In your client wireless profile you define the CA that assigned the certificate to auto select from. If you have two they may prompt you to

    • @ryanmcguire2578
      @ryanmcguire2578 3 месяца назад

      ​@@OsbornePro I have my original cert authority setup on server 2016(going to decommission) which is still active and it has both certificate templates for radius server client and computer(machine) on it but my server 2022, the new CA only has the radius server client cert template listed for this user

    • @ryanmcguire2578
      @ryanmcguire2578 3 месяца назад

      @@OsbornePro sent you an email if you have a chance to take a look...thank you

  • @ansonsage1504
    @ansonsage1504 3 месяца назад

    Really helpful video. I'm a bit new to CAs, do you have a video detailing the installation and best practices for installation/configuration?

    • @OsbornePro
      @OsbornePro 3 месяца назад

      Thanks for watching! I do not have a video like that. You want your CA to not have any other services on it. It should just do CA stuff. The best practice that is rarely followed is to have an offline root CA server non-domain joined. Then have an Intermediate CA attached to that which is domain joined. Require NTLMv2 authentication to it. Use SMBv2 and v3 with required signing. Biggest threat to your domain with a certificate authority are Certificate Templates. The guys who wrote an exploit tool called Certify have a white paper that is well worth the read to see the do not so certificate template making. You can run the tool to discover vulnerable certificates on your CA if you are ever unsure

  • @faizankhanseo4639
    @faizankhanseo4639 3 месяца назад

    is it free?

    • @OsbornePro
      @OsbornePro 3 месяца назад

      @@faizankhanseo4639 thanks for watching! No it is not. Lazesoft has a free one I believe still

    • @faizankhanseo4639
      @faizankhanseo4639 3 месяца назад

      @@OsbornePro yes lazesoft is free you are right thanks 👍🏼🙏🏼

  • @shinshen9020
    @shinshen9020 3 месяца назад

    Can mac os join Windows domian?

    • @OsbornePro
      @OsbornePro 3 месяца назад

      @@shinshen9020 thanks for watching! Yes a Mac can bind to a Windows domain. There is more info on how that is done and requirements in this article. onmac.net/how-to-join-mac-to-windows-domain/

  • @timothycrystal2623
    @timothycrystal2623 3 месяца назад

    Does anyone know if there is a way to use a Windows Network Policy (RADIUS) server to authenticate users on a different trusted domain? We are using Meraki APs and it works fine on the first domain, but when I copy the GPO to the second domain, clients are not able to connect to the Wireless network. If not, I could add an NPM server on the second domain and give them their own SSID, but that solution won't work if I push this down to switch ports.

    • @OsbornePro
      @OsbornePro 3 месяца назад

      Thanks for watching! I would be curious what you do for this. If you are using PEAP I would think trusting the Root CA and a domain trust would be required between the two domains so the user accounts can be found. For EAP-TLS you probably need a non-domain joined CA to issue certs to both domains in order to accomplish that

  • @pstz_800
    @pstz_800 3 месяца назад

    The best LDAP tutorial, I have ever seen. Thanks.

    • @OsbornePro
      @OsbornePro 3 месяца назад

      @@pstz_800 thanks for watching glad it was helpful!

  • @michaelem7883
    @michaelem7883 4 месяца назад

    no need for that hassle if the LDAPS is to be used. its enough to have certificate for dc in personal store. also if you enable signing. its should be stated that in corp env you should enable NTDS logging to see who is using simple bind before you wreck havoc =) .also there is no way to force any one except windows clients. if applications are setup to use simple bind they will send plain text passwords without possibility to auth

  • @BGPNetworks
    @BGPNetworks 4 месяца назад

    Guys, real Good Video, Just one question about certificate Authority, how about if the domain controller is the certificate authority as well and there is already a root cert installed, How does this step differ?

    • @OsbornePro
      @OsbornePro 4 месяца назад

      @@BGPNetworks thanks for watching! It is not recommended to user your DC as a CA however, that should not affect the setup. The CA cert still needs to be trusted by the server and clients. It is still able to do what you need it too

  • @filipfabicevic3077
    @filipfabicevic3077 4 месяца назад

    What if you have DHCP in another subnet and you have everything open between those 2 servers and still it dose not work? But when i put them in an isolated network on the same subnet it works well. Do windows have some sort of firewall rules that affect this...

    • @OsbornePro
      @OsbornePro 4 месяца назад

      @@filipfabicevic3077 thanks for watching! The DHCP server is registering the domain and IP resolution on behalf of the client so as long as the client can get a DHCP address it should work. It sounds like you need to set an ip helper-address on the switch for that VLAN. Make sure the forward look up zone exists on the DHCP server also. In the DNS server check your security settings to see if there are restrictions and what subnets allow updates

  • @rakesh4a1
    @rakesh4a1 4 месяца назад

    Covered all the details from cert generation, server bringup and client connection. Thanks. How the user 'tobor' user is mapped to the newly generated certificate? is there any cert-to-username mapping required? We do not see 'ftpsecure` user used anywhere, is there a specific need for creating this user. Why is there a prompt for password if certificate based authentication is enabled?

    • @OsbornePro
      @OsbornePro 4 месяца назад

      @@rakesh4a1 thanks for watching! FTP over SSL is not capable of key authentication, only FTP over SSH can use certificates for authentication. FTP over SSL to FTP is the equivalent of what HTTPS is to HTTP. The user tobor does not have a certificate assigned. You will need to create the ftpsecure user. It is used for limiting permissions and employing least privileges.

    • @OsbornePro
      @OsbornePro 4 месяца назад

      I put this script together to auto-install using a secure method. If the vsftpd service fails to start it is because UTF8 is no longer an option to set on certain Linux distro github.com/OsbornePro/ConfigTemplates/blob/main/vsftpd-installer.sh

  • @vladimirarias-antonov9584
    @vladimirarias-antonov9584 4 месяца назад

    Can you explain how to get mab working with dot1x? Basically I need anything with a cert to authenticate, but for devices like printers/phones that can’t take a cert, I am trying to use MAB. I added the approved macs to my list on my Cisco switch.And it says authenticated. But won’t connect. Do I need to add the macs so where in radius? I’m just using Cisco switch and NPS no ise

    • @OsbornePro
      @OsbornePro 4 месяца назад

      @@vladimirarias-antonov9584 thanks for watching! I would suggest taking a look at this article for the NPS side of things documentation.meraki.com/MS/Access_Control/Configuring_Microsoft_NPS_for_MAC-Based_RADIUS_-_MS_Switches

    • @vladimirarias-antonov9584
      @vladimirarias-antonov9584 4 месяца назад

      Thank you this is great

  • @cloudsquall45
    @cloudsquall45 4 месяца назад

    To save anyone else typing this out from the screen like I did... Here's the PS one liner to generate a shared secret. Pretty clever. ( -join ((0x30..0x39) + ( 0x41..0x5a) + ( 0x61..0x7a) | Get-Random -Count 36 | ForEach-Object {[Char]$_}))

  • @KhalidAmin-f7x
    @KhalidAmin-f7x 4 месяца назад

    Thank you for sharing information. I have a question, i am trying to connect linux machind using 802.1x wired authentication method and its failing to connect. This machine has not koined the domain. I am getting user credentials mismatch error. Please share your valuable feedback. Thank you

    • @OsbornePro
      @OsbornePro 4 месяца назад

      @@KhalidAmin-f7x thanks for watching, sounds like the same thing I have seen with Macs. If you check the NPS event logs it probably says it can’t find the account. If that is the case you won’t be able to use EAP-TLS to authenticate Linux devices unless they are domain joined

  • @hichamlyaacoubi1196
    @hichamlyaacoubi1196 4 месяца назад

    What tls version will be used here ?

    • @OsbornePro
      @OsbornePro 4 месяца назад

      @@hichamlyaacoubi1196 thanks for watching! There is a registry value you can at on the NPS server to define what version you want to use if you want to make sure a modern one is used support.microsoft.com/en-us/topic/microsoft-security-advisory-update-for-microsoft-eap-implementation-that-enables-the-use-of-tls-october-14-2014-d9ba4b83-b4e9-2c01-83a7-e42706e671af

  • @marcusjackman1487
    @marcusjackman1487 4 месяца назад

    This is great stuff, truly appreciate the time you took to divulge this information. You've got my like. I would like to ask your suggestion on the best way to study APACHE2 configuration? Maybe if you have certain books, courses, channels etc. that helped you. Thanks again.

    • @OsbornePro
      @OsbornePro 4 месяца назад

      @@marcusjackman1487 thanks for watching glad it was helpful! Haha I do not unfortunately. The Apache documentation is very extensive. The things I have learned came from doing hackthebox labs and configuring apache for different web services. I don’t know a good source out there for it so I put this together to share things I have run into

  • @doctorwhojr.2022
    @doctorwhojr.2022 5 месяцев назад

    thanks a lot

    • @OsbornePro
      @OsbornePro 5 месяцев назад

      Thanks for watching! Glad it was helpful

  • @jasonjohnson9403
    @jasonjohnson9403 5 месяцев назад

    First off..your narration and configuration flow together seamlessly..you do good work. Jack of all trades, master of none for a small K-12 here. I have both a staff and student wifi network. I setup NPS last summer (wish I had found your tutorial then) and it connects fast and very reliable for both student chromebooks and staff Win 11 laptops. Everyone (staff and students) have AD accounts. I only use a single AD Service Account I created to authenticate all of the chromebooks to the student wifi via Google Workspace wifi profile. However, I never thought about the fact that students would still be able to connect their phones to the student wifi with their personal AD accounts, something we do not want them to be able to do. I have tried blacklisting them in Aruba Central but the deny list maxes out at 125 entries. SMH. The day after school was out a few weeks ago, I spun up two VMs..an offline RA and a domain joined SA. I have the SA stood up. If I follow your tutorial, will the students be able to download and install the cert to their phones? Ive already burned two weeks of with the RA and CA configs, plus I went down the path of instaling NDES and GCCC (Google Cloud Certificate COnnector, which requires NDES) only to find out NDES would acutally assist the students in connecting their phones to wifi (did I mention master of none??) I uninstalled all of that today. WIth vacation next week, then reconfiguring NPS, and testing student chromebooks and powerwashing all 3,000 of them once NPS is configured...my summer is going by fast. Can you tell me how to configure NPS to keep students from connecting phones? I dont usually ask ppl for help, I research and read and try but Im running out of time for trail and error. Thanks

    • @OsbornePro
      @OsbornePro 5 месяцев назад

      Thanks for watching! No the students will not be able to download and install the certs on their phone; the important part for you to achieve that is when creating the device certificate template on your CA, the private key can not be marked as exportable. Once the certificate is assigned it will only be able to be used on the device it is assigned too. Also, the device hostname will have to match the subject name of the certificate. You can use PEAP certificates for deployment on a per user basis. However, making the key non-exportable in that situation means only one certificate goes to a user. That one certificate can only be used on the device that received it for that particular user. For example the students will not be able to use a second device like a laptop and desktop. EAP-TLS/Device Certificates allow you to authenticate devices. Users can access a device and that device can access the network. For your situation if possible I would use Aruba as a certificate authority with EAP-TLS for device authentication. The reason being is you may run into issues with devices that are not domain joined using certificates from a domain joined CA to authenticate. The account/user will not be found in AD and dummy accounts will not resolve the issue.

  • @kT2015N
    @kT2015N 5 месяцев назад

    Can I have 2 LDAPS services on two different DC in the same domain.

    • @OsbornePro
      @OsbornePro 5 месяцев назад

      Thanks for watching! Yes you can. Just have to assign each DC its own LDAPS certificate where the FQDN of each individual DC is in the Subject of the certificate.

  • @marshalllucas
    @marshalllucas 6 месяцев назад

    Great video. Thank you.

    • @OsbornePro
      @OsbornePro 6 месяцев назад

      Thanks for watching! Glad it was helpful

  • @JoeContrerasGenesisJoeC
    @JoeContrerasGenesisJoeC 6 месяцев назад

    Thanks for your courtesy of turning your head to cough , too prevent germs my way through the screen 😂. Seriously , great video .

    • @OsbornePro
      @OsbornePro 6 месяцев назад

      Lol of course don't want anyone researching to get sick! Thanks for watching!

  • @aliounethiaw1443
    @aliounethiaw1443 6 месяцев назад

    When i try to do the nltest i get an error "erro_no_such_domain"

    • @OsbornePro
      @OsbornePro 6 месяцев назад

      Thanks for watching. If you are running the nltest command on a device that is NOT a Windows Domain Controller there may be an issue with the trust or there is something up with the certificate trust on the client. Either of the below commands can be used to repair the trust. nltest /sc_reset:YourDomain.com Test-ComputerSecureChannel -Repair -Verbose # Run on the client device in admin powershell window Otherwise look at the System logs in Event Viewer after you do the above. Look for any events related to secure channel issues, likely with a the source Netlogon. This may help identify what exactly the trouble is.

    • @aliounethiaw1443
      @aliounethiaw1443 6 месяцев назад

      @@OsbornePro ok thank you very much for your response. I will try to execute the commands. I just forgot to mention that i tried executing the command on a windows 11 in the same network and domain, on a windows 11 in another network (through internet) and on the DC itself. I got the same error in every case. Oh and the DC is also the DNS server

    • @aliounethiaw1443
      @aliounethiaw1443 6 месяцев назад

      @@OsbornePro but my main issue is how to make LDAP work with iOS because iOS devices somehow dont send bind requests, only search requests from what i see through Wireshark. So i was trying to connect with SSL but apparently the iphone doesn't recognize the certificate. In Wireshark, we can see a "Unknown certificate" error.

    • @OsbornePro
      @OsbornePro 6 месяцев назад

      @@aliounethiaw1443 if you are not seeing bind requests from the iOS devices they are not trying to perform authenticated searches. They may need an LDAP profile of some sort with credentials specified typically using the distinguished name as the username. An MDM solution will need to be used to push out the Root CA certificate to the devices trusted machine certificate store.

    • @aliounethiaw1443
      @aliounethiaw1443 6 месяцев назад

      @@OsbornePro so i need to manually register the phone in the LDAP server using the phone's name and a password as credentials, then install the certificate on the phone via an MDM. And then i try to connect using the phone's credentials instead of the user's credentials. Is that what you mean?

  • @wyattt4575
    @wyattt4575 6 месяцев назад

    Dumb question since I know this is for sure not best practice, but what if you have DHCP and DNS running on your server? Is the DnsUpdateProxy group even necessary at that point? What about even worse yet, your DHCP server is also functioning as DC (holding no fsmo roles) and DNS? In the video, it was mentioned if your DHCP server is also a DC, you should run "dnscmd /config /OpenAclOnProxyUpdates 0" on the server to secure it. What I got from the video was that I should do the following. !--- DHCP ---! 1. Assign only DHCP servers to DnsUpdateProxy group for each domain 2. Create service account for dynamic DNS update from DHCP 3. Assigned service account to only be a Domain Users member 4. Change DHCP advanced DNS dynamic update registration credentials to new service account on DHCP server !--- DNS ---! 5. Change forward zone to Secure dynamic updates Thanks!

    • @OsbornePro
      @OsbornePro 6 месяцев назад

      Thanks for watching! I would still assign the server to the DnsUpdateProxy group. If there ever comes a time when the role is moved off the server, it can be seen the current server is a member of that group and it will make whoever looks at it take notice possibly preventing or shortening a resolution. Twenty years from now some IT guy will say thank you Wyatt. This is not needed however when you issue that command. The link below references if that helps you decide whatever is best for you. Your summary of actions looks complete to me and yes use "dnscmd /config /OpenAclOnProxyUpdates 0" since your DC is also a DHCP server. Here is a link to Microsoft's mention of this learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/ff631099(v=ws.10)#summary

    • @wyattt4575
      @wyattt4575 6 месяцев назад

      @OsbornePro awesome! Thank you! This was the first video of yours that I have seen and it was perfect. Explain everything so well. Will definitely recommend to others and watch more of your tutorials!

  • @jasondabassman8411
    @jasondabassman8411 6 месяцев назад

    Do you not have to reference the RAS IAS cert in the network policy? I noticed you added smart card or other certificate as the EAP type but never edited it to choose the cert.

    • @OsbornePro
      @OsbornePro 6 месяцев назад

      Thanks for watching! A valid certificate is typically selected automatically however, its not perfect. Yes you should select the certificate to use on the RADIUS server in the network policy. I forgot to cover this in the video. I updated the description of the video to make mention of this in case someone reaches out to me having that issue. I can also get a quick copy paste responding to emails.

  • @killachang
    @killachang 7 месяцев назад

    When I request new certificate from the DC, it is showing all my certificates status as unavailable in include LDAP one. Do you know how to fix it? Much appreciated.

    • @killachang
      @killachang 7 месяцев назад

      I finally figured it out. My CA root certificate was expired. Once it is renew, I see the LDAP certificate is now available.

    • @OsbornePro
      @OsbornePro 6 месяцев назад

      Thanks for watching! Right on appreciate you sharing that. My approach would have been checking RPC and Windows Firewall. That did not even cross my mind.

  • @snkmr42
    @snkmr42 7 месяцев назад

    thanks man it works for me

    • @OsbornePro
      @OsbornePro 6 месяцев назад

      Thanks for watching! Glad it was helpful

  • @Tom-eh9lt
    @Tom-eh9lt 7 месяцев назад

    Great video! Very detailed and simple to follow. I have successfully set this up and is working with our domain joined devices - thank you! However, what could I do to implement this onto non domain joined devices such as iPads. In my org we have 3 groups of iPads all requiring different vlans for internet filtering. I would like to use EAP-TLS so no end user authentication is required.

    • @OsbornePro
      @OsbornePro 6 месяцев назад

      Thanks for watching! What I have found with non-domain joined Apple devices is they require a non-domain joined Root CA with a domain joined Intermediate CA. The non-domain joined Root CA is for issuing certs to Apple devices not on the domain. The domain joined intermediate is for auto-management of the Windows RADIUS client certificates. Of if you have something like Cisco ISE to act as a CA that issues certs to those devices that can work. If you just have a domain joined Root CA that assigns a device certificate to a non-domain joined Apple device, the authentication fails saying no matching account could be found. I have tried creating dummy accounts etc but nothing worked for me.

  • @MikeSharples-TheBrit
    @MikeSharples-TheBrit 7 месяцев назад

    This video was amazing. Thank you so much!

    • @OsbornePro
      @OsbornePro 6 месяцев назад

      Thanks for watching! Very happy it was helpful

  • @ryanmcguire2578
    @ryanmcguire2578 7 месяцев назад

    under public key policies I don't have anything listed under trusted root certificate authorities and intermediate certificate authorities where do I import these from? Thanks

    • @OsbornePro
      @OsbornePro 6 месяцев назад

      Thanks for watching! That I am not sure. By default you should have default certificate authorities that exist in both the Trusted Root Certificate Authorities and Intermediate Certificate Authorities stores. If there is nothing there maybe the Windows store is not used for trust and some other technology is handling that? If you want to get your domains Root CA, remote into the Root CA server and open Command Prompt or PowerShell. Then execute the below command mkdir C:\Temp # Creates a directory if it does not exist certutil -ca.cert C:\Temp\RootCA.cer # Exports your domains Root CA certificate to a file that you can import into the trusted stores Once you have the RootCA.cert file you can open certlm.msc and import it into the Trusted Root Certificate Authorities store

  • @_ruted
    @_ruted 8 месяцев назад

    Thanks man, really helped me out with my windows installation on my VM

    • @OsbornePro
      @OsbornePro 6 месяцев назад

      Thanks for watching! Glad it helped to get your VM started like you want!