Secure IIS Web Server with SSL

Similar documents
How To Embed EventTracker Widget to an External Site

Receive and Forward syslog events through EventTracker Agent. EventTracker v9.0

Integrate Veeam Backup and Replication. EventTracker v9.x and above

SECURE FILE TRANSFER PROTOCOL. EventTracker v8.x and above

Product Update: ET82U16-029/ ET81U EventTracker Enterprise

Port Configuration. Configure Port of EventTracker Website

Integrating Barracuda SSL VPN

Integrate Bluecoat Content Analysis. EventTracker v9.x and above

IIS Web Server Configuration Guide EventTracker v8.x

Integration of Phonefactor or Multi-Factor Authentication

Integrate Dell FORCE10 Switch

Integrate Citrix Access Gateway

Integrate Aventail SSL VPN

Integrate Palo Alto Traps. EventTracker v8.x and above

Integrating Microsoft Forefront Unified Access Gateway (UAG)

Integrating Imperva SecureSphere

Integrate Symantec Messaging Gateway. EventTracker v9.x and above

How to Configure ASA 5500-X Series Firewall to send logs to EventTracker. EventTracker

Integrate Sophos Appliance. EventTracker v8.x and above

Integrate NGINX. EventTracker v8.x and above

Integrate Microsoft ATP. EventTracker v8.x and above

EventTracker v8.2. Install Guide for EventTracker Log Manager. EventTracker 8815 Centre Park Drive Columbia MD

Enhancement in Agent syslog collector to resolve sender IP Address EventTracker Enterprise

Agent Installation Using Smart Card Credentials Detailed Document

Integrate Sophos Enterprise Console. EventTracker v8.x and above

Integrate Barracuda Spam Firewall

IIS Web Server Configuration Guide EventTracker v9.x

Integrating Terminal Services Gateway EventTracker Enterprise

Enhancement in Network monitoring to monitor listening ports EventTracker Enterprise

Integrate IIS SMTP server. EventTracker v8.x and above

Configuring TLS 1.2 in EventTracker v9.0

Integrating Cisco Distributed Director EventTracker v7.x

Integrate TippingPoint EventTracker Enterprise

Integrate Sophos UTM EventTracker v7.x

Integrate MySQL Server EventTracker Enterprise

Remote Indexing Feature Guide

Integrate HP ProCurve Switch

Event Correlator. EventTracker v8.x

Geolocation and hostname resolution while Elasticsearch indexing. Update Document

Integrate EMC Isilon. EventTracker v8.x and above

Integrate Citrix NetScaler

Integrate F5 BIG-IP LTM

Integrate pfsense EventTracker Enterprise

Integrate Fortinet Firewall. EventTracker v8.x and above

Integrate Akamai Web Application Firewall EventTracker v8.x and above

8815 Centre Park Drive Columbia MD Publication Date: Dec 04, 2014

Integrate Cisco IronPort Security Appliance (ESA)

Integrate Check Point Firewall. EventTracker v8.x and above

Integrate Salesforce. EventTracker v8.x and above

Integrate Saint Security Suite. EventTracker v8.x and above

Integrating Microsoft Forefront Threat Management Gateway (TMG)

Integrate Juniper Secure Access VPN

Integrate Cisco IOS Publication Date: April 15, 2016

Integrate Cisco VPN Concentrator

Integrate Microsoft Antimalware. EventTracker v8.x and above

Integrate Meraki WAP. EventTracker Enterprise. EventTracker 8815 Centre Park Drive Columbia MD

Integrate Routing and Remote Access Service (RRAS) EventTracker v8.x and above

Integrate Microsoft IIS

Integrate Viper business antivirus EventTracker Enterprise

Integrate Microsoft Office 365. EventTracker v8.x and above

Integrate Windows PowerShell

Integrating LOGbinder SP EventTracker v7.x

Check Point Guide. Configure ETAgent to read CheckPoint Logs. EventTracker 8815 Centre Park Drive Columbia MD

Integrating Cyberoam UTM

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free:

Integrate Apache Web Server

Integrate Malwarebytes EventTracker Enterprise

Integrate Microsoft Hyper-V Server

EventTracker v7.x. Integrating Cisco Catalyst. EventTracker 8815 Centre Park Drive Columbia MD

Integrate McAfee Firewall Enterprise VPN

Integrate Cisco Switch

Agent health check enhancements Detailed Document

Integrate WatchGuard XTM. EventTracker Enterprise

Integrate Cb Defense. EventTracker v8.x and above

Service Pack ET90U Feature Document

EventVault Introduction and Usage Feature Guide Version 6.x

Process Termination. Feature Guide

Integrate Trend Micro InterScan Web Security

Installation Guide Install Guide Centre Park Drive Publication Date: Feb 11, 2010

Integrate APC Smart UPS

Integrate VMware ESX/ESXi and vcenter Server

EventTracker Manual Agent Deployment User Manual

Security Scorecard in Flex Dashboard

Agent Direct Log Archiver Configuration Guide

Monitoring SharePoint 2007/ 2010/ 2013 Server using EventTracker

Integrate A10 ADC Publication Date: September 3, 2015

Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server

Enable Auditing in Open LDAP on Linux Server

EventTracker Manual Agent Deployment User Manual Version 7.x

Configure Alerts. EventTracker v6.x. EventTracker 8815 Centre Park Drive Columbia MD Publication Date: Jun 12, 2009

Integrate Cisco Sourcefire

Using SSL to Secure Client/Server Connections

Step-by-step installation guide for monitoring untrusted servers using Operations Manager

New Features Guide EventTracker v6.2

EventTracker Upgrade Guide. Upgrade to v9.0

Upgrade Guide. Upgrading to EventTracker v6.4 b50. Upgrade Guide Centre Park Drive Publication Date: Feb 17, 2010.

Feature List. EventTracker v9.0

How to - Install EventTracker Windows and Change Audit Sensor Sensor Deployment User Manual-v9.0

EventTracker: Backup and Restore Guide Version 9.x

Installing a SSL Server Certificate on Client Access Server

Transcription:

Publication Date: May 24, 2017

Abstract The purpose of this document is to help users to Install and configure Secure Socket Layer (SSL) Secure the IIS Web server with SSL It is supported for all EventTracker Enterprise v8.x versions. NOTE: From v8.0 onwards, EventTracker is not supporting Windows 2003 (Operating System) and IIS 6. Audience The document holds good for EventTracker Users and Administrators who wish to access EventTracker via a secured layer. The information contained in this document represents the current view of EventTracker. on the issues discussed as of the date of publication. Because EventTracker must respond to changing market conditions, it should not be interpreted to be a commitment on the part of EventTracker, and EventTracker cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. EventTracker MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, this paper may be freely distributed without permission from EventTracker, if its content is unaltered, nothing is added to the content and credit to EventTracker is provided. EventTracker may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from EventTracker, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. The example companies, organizations, products, people and events depicted herein are fictitious. No association with any real company, organization, product, person or event is intended or should be inferred. 2017 EventTracker Security LLC. All rights reserved. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. 1

Table of Contents Abstract... 1 Audience... 1 Secure IIS Web Server with SSL... 3 Secure Sockets Layer (SSL)... 3 Mandatory Requirements... 3 Operating System... 3 Software and Components... 3 Windows Server 2012/2016 Enterprise... 3 Install Active Directory Certificate Services (AD CS) in Win 2012... 4 Configure Active Directory Certificate Services (AD CS) in Win 2012... 18 Create a certificate request in Win 2012... 30 Get Pending Request Accepted by the Certificate Authority (CA) in Win 2012... 37 Complete the certificate request in Win 2012... 41 Bind the certificate to Default Web Site in Win 2012... 48 Configure SSL Settings in Win 2012... 52 Windows Server 2K8/2K8 R2 Enterprise... 53 Install and configure the Certificate Authority (CA) in Win 2K8 / 2K8 R2... 54 Create Certificate Request in Win 2K8 / 2K8 R2... 67 Get Pending Request Accepted by the Certificate Authority (CA) in Win 2K8 / 2K8 R2... 73 Install the Certificate in Win 2K8 / 2K8 R2... 78 Bind the Certificate to the Default Web Site in Win 2K8 / 2K8 R2... 82 EventTracker 8.0 and above... 82 Test the SSL Enabled Default Web Site in Win 2K8 / 2K8 R2... 85 Configure SSL Settings in Win 2K8 / 2K8 R2... 86 2

Secure IIS Web Server with SSL Secure Sockets Layer (SSL) The Secure Sockets Layer (SSL) is a commonly-used protocol for managing the security of a message transmission on the Internet. Source: http://searchsecurity.techtarget.com/sdefinition/0,,sid14_gci343029,00.html You need SSL if you, Offer a login or sign in on your site Process sensitive data Need to comply with security requirements Mandatory Requirements This section describes the mandatory software and components requirements to create SSL digital certificate and secure Web site hosted on IIS server with SSL digital certificate. Operating System Windows 2008 / 2008 R2 Server Windows 2012 Server Windows 2016 Server Software and Components Active Directory and Domain Controller. Internet Information Server (IIS) 7.0 and above. Browser, which supports 128-bit encryption (IE 11 or above). Windows Server 2012/2016 Enterprise Windows Server 2012 uses Internet Information Services (IIS) 8.0 and 8.5. Windows Server 2016 uses Internet Information Services (IIS) 10. Summary: Install and configure the Certificate Authority (CA) Create the Certificate Request Get the Pending Request Accepted by the Certificate Authority Install the Certificate 3

Bind the Certificate to the Default Web Site Test the SSL enabled Default Web Site Configure SSL Settings Install Active Directory Certificate Services (AD CS) in Win 2012 1. Select the Start button, select Administrative Tools, and then select Server Manager. Server Manager displays. The Dashboard is displayed by default. Figure 1 2. Select Add Roles and Features. Add Roles and Features Wizard displays. 3. In the Before You Begin page, select the Next > button. 4

Figure 1 4. On the Select installation type page, select Role-based or feature-based installation, and then select the Next > button. 5

Figure 2 5. On the Select destination server page, select Select a server from the server pool, select a server from Server Pool list, and then select the Next > button. 6

Figure 3 6. On Select server roles page, select Active Directory Certificate Services option and then select the Next> button. 7

Figure 4 Add Features that are required for Active Directory Certificate Services window displays. 8

Figure 5 7. Verify the required features and then select the Add Features button. Select server roles window displays. 9

Figure 6 8. Select the Next > button. Select features page displays. 10

Figure 7 9. Select the Next > button. Active Directory Certificate Services page display. 11

Figure 8 10. Select the Next > button. 11. In Select role services page, select the Certificate Authority (if not selected) and Certification Authority Web Enrollment option. 12

Figure 9 Add features that are required for Certificate Authority Web Enrollment window displays. 13

Figure 10 12. Select the Add features button. The selected role services are enabled. 14

Figure 11 13. Select the Next > button. Confirm installation selections window displays. 15

Figure 12 14. Select the Restart the destination server automatically if required option and then select the Install button. A successful message displays. 16

Figure 13 The installation of Active Directory Certificate Services is complete but is yet to be configured. 17

Configure Active Directory Certificate Services (AD CS) in Win 2012 The server manager displays a notification that AD CS is not yet configured. 1. Click on the notification and continue to configure AD CS. AD CS Configuration window displays to enter credentials: 2. Select the Next > button. Role Services page displays. Figure 14 18

Figure 15 3. Select role services Certification Authority, Certification Authority Web Enrollment option and then select the Next > button. 19

Figure 16 4. Select the Next > button. Setup Type page displays to specify Certification Authority. 20

Figure 17 By default, Standalone CA option is selected as Setup Type. 15. Select the Next > button. CA Type page displays. By default, Root CA is selected as CA Type. 21

Figure 18 16. Select the Next > button. Private Key page displays. By default, Create a new private key option is selected. 22

Figure 19 17. Select the Next > button. Cryptography for CA page displays. By default, RSA#Microsoft Software Key Storage Provider is selected as Cryptographic provider and Key character length is 2048. 23

Figure 20 18. In Select the hash algorithm for signing certificates issues by this CA: list, select SHA1. 19. Select the Next > button. CA Name page displays. 24

Figure 21 20. Type a distinctive common name and distinctive name in the Common name for this CA: and Distinguished name suffix: fields respectively or leave as it is. 21. Select the Next > button. Validity Period page displays. 25

Figure 22 22. Set the Specify the validity period and then select the Next > button. CA Database page displays. 26

Figure 23 23. If required, change the path of Certificate database location: and Certificate database log location: or leave it as it is. 24. Select the Next > button. 27

Figure 24 25. Crosscheck the configuration settings, and then select the Configure button. A message stating Configuration succeeded displays. 28

Figure 25 26. Select the Close button. Server Manager displays the newly installed Role Services. 27. Restart the server. 29

Create a certificate request in Win 2012 1. Select the Start button, select Administrative Tools, and then select Internet Information Services (IIS) Manager. 2. Select the server node. Figure 26 30

Figure 27 3. In IIS pane, double click Server Certificates icon. Server Certificates page displays. Figure 28 31

Figure 29 4. In Actions pane, select Create Certificate Request link. Request Certificate window displays. 32

Figure 30 5. In Distinguished Name Properties page, type the system name (FQDN- Fully qualified domain name) as common name in the Common name text box. Example: mcloon.toons.local 33

Figure 31 6. Enter organization and geographical details, and then select the Next button. Cryptographic Service Provider Properties page displays. 34

Figure 32 Microsoft RSA SChannel Cryptographic Provider is selected by default as Cryptographic service provider. 7. In Bit length: dropdown, set the bit length to 2048, and then select the Next button. File Name page displays. 35

Figure 33 8. In Specify a file name for the certificate request:, type name and path of the file to save the CSR (Certificate Server Request). 9. Select the Finish button. Send this request file to the certificate vendor. 36

Get Pending Request Accepted by the Certificate Authority (CA) in Win 2012 Now you have a pending certificate request, and it needs to be accepted by the CA. 1. Open Internet explorer. 2. Type http://server/certsrv in the Address field. Here server is the name of the server for which you are creating the certificate. Example: elcwin2k8 or localhost 3. Click the Request a certificate hyperlink. Figure 34 Figure 35 4. Click the advanced certificate request hyperlink. 37

Figure 36 5. Click the Submit a certificate request by using a Base64-encoded CMC or PKCS #10 file, or submit a renewal request using a base64-encoded PKCS #7 file hyperlink. Figure 37 6. In Saved Request: box; enter the content of the certreq.txt file. 7. In Certificate Template: drop-down, select Web Server. 38

Figure 38 8. Click the Submit > button. Once you click Submit, the certificate is issued to you. 9. Select Base 64 encoded option. 10. Click Download certificate hyperlink. Figure 39 39

Figure 40 11. To save the certificate on local drive, click the Save button. Figure 41 12. Close the Microsoft Certificate Services IE window. 40

Complete the certificate request in Win 2012 NOTE: Certificate received from the vendor needs to be copied to the system. 1. Select the Start button, select Administrative Tools, and then select Internet Information Services (IIS) Manager. Internet Information Services (IIS) Manager window is displayed. 2. Click the server node. 3. In IIS pane, double click the Server Certificates icon. Figure 42 4. In Actions pane, click Complete Certificate Request hyperlink. 41

Figure 43 5. In Complete Certificate Request window, click the browse button to specify File name containing the certification authority s response:. 42

Figure 44 6. Locate the server certificate that has been received from the certificate authority and then click Open. 43

Figure 45 Specify Certificate Authority Response page displays. 44

Figure 46 7. Type a relevant name in Friendly name: box to keep track of the certificate on this server and then click OK. 45

Figure 47 If successful, the newly installed certificate will be shown in the list. 46

Figure 48 If an error stating the request or private key cannot be found occurs, then make sure that the correct certificate is being used and is getting installed on the same server where the CSR (Certificate Server Request) is generated. If these two things are in place then proceed to create a new Certificate Request and reissue/replace the certificate. 47

Bind the certificate to Default Web Site in Win 2012 1. Expand the server node, expand the Sites node, and then select Default Web Site node. 2. In the Actions pane, select Bindings. Site Bindings window displays. Figure 49 48

Figure 50 3. Select the Add button. Add Site Binding window displays. Figure 51 4. In Type: drop down, select https. 49

By default, system will select the port number as 443. The default port number can be changed, if required. Figure 52 5. In SSL certificate: drop down, select the recently installed SSL certificate, and then select the OK button. The binding for port number 443 is listed. Figure 53 50

Figure 54 6. Select the Close button. The newly added https website is listed in Actions pane under Browse Website. Figure 55 51

Configure SSL Settings in Win 2012 1. To configure SSL Settings to interact in a specific way with client certificates, expand the Sites node, and then select Default Web Site node. 2. In IIS pane, double-click SSL Settings icon. SSL Settings page display. Figure 56 52

Figure 57 3. Select Require SSL option. 4. In Actions pane, select the Apply button. After successful SSL settings modification, a message will be displayed in the Actions pane. 5. Close the IIS Manager. Windows Server 2K8/2K8 R2 Enterprise Windows Server 2K8 uses Internet Information Services (IIS) 7.0.and 7.5 Summary: Installing and configuring the Certificate Authority (CA) Creating the Certificate Request Getting the Pending Request Accepted by the Certificate Authority Installing the Certificate Binding the Certificate to the Default Web Site Testing the SSL enabled Default Web Site Configuring SSL Settings 53

Install and configure the Certificate Authority (CA) in Win 2K8 / 2K8 R2 1. Select the Start button, select Settings, and then select Control Panel. 2. Select Programs and Features, and then select Turn Windows Features on or off. Server Manager displays. Figure 58 3. Select Roles node, and then select Add Roles. Figure 59 54

Figure 60 Add Roles Wizard displays. Figure 61 4. Select the Next > button. 55

Select Server Roles page display. Figure 62 5. Select Active Directory Certificate Services option and then select the Next > button. Figure 63 56

Introduction to Active Directory Certificate Services page displays. Figure 64 6. Select the Next > button. 7. Select Certificate Authority (if not selected), Certification Authority Web Enrollment option, and then select the Next > button. Figure 65 57

Specify Setup Type page displays. By default, Enterprise option is selected as Setup Type. 8. Select the Next > button. Specify CA Type page displays. By default, Root CA is selected as CA Type. Figure 66 58

Figure 67 9. Select the Next > button. Set Up Private Key page displays. By default, Create a new private key option is selected. 59

Figure 68 10. Select the Next > button. Figure 69 60

By default, RSA#Microsoft Software Key Storage Provider is selected as Cryptographic Service Provider (CSP) and Key character length as 2048. Leave as it is. 11. In Select the hash algorithm for signing certificates issued by this CA: list, select the Hash Algorithm as sha1. 12. Select the Next > button. Configure CA Name page displays. Figure 70 61

Figure 71 13. Type a distinctive common name and distinctive name in the Common name for this CA: and Distinguished name suffix: fields respectively or leave as it is. 14. Select the Next > button. Set Validity Period page displays. 62

Figure 72 15. In Select validity period for the certificate generated for this CA:, set validity period and then select the Next > button. Configure Certificate Database page displays. Figure 73 63

16. If required, change the path of Certificate database location: and Certificate database log location:, select the Browse button and specify the path of the folder. 17. Select the Next > button. Confirm Installation Selections page display. Figure 74 18. Crosscheck the configuration settings, and then select the Install button. Installation Progress is displays. 64

Figure 75 After successful installation, installation results are displayed. Figure 76 65

19. Select the Close button. Server Manager displays the newly installed Role Services. 20. Restart the server. Figure 77 66

Create Certificate Request in Win 2K8 / 2K8 R2 1. Select the Start button, select Programs, and then select Administrative Tools. 2. Select Internet Information Services (IIS) Manager. Internet Information Services (IIS) Manager is displayed. 3. Click the server node. Figure 78 67

Figure 79 4. Double-click Server Certificates icon. Figure 80 68

5. In Actions pane, click Create Certificate Request link. Request Certificate window displays. Figure 81 Figure 82 69

6. Enter/select appropriate data in the relevant fields. 7. Select the Next button. Figure 83 Figure 84 70

Leave the default Cryptographic service provider as it is. Increase the Bit length if desired. Higher is more secure but slower. 8. Select the Next button. File Name page displays. Figure 85 9. Type name and path of the file or browse the location of the file to save the Certificate Request. 71

Figure 86 10. Select the Finish button. Open the certreq.txt file in the Notepad. Figure 87 72

Get Pending Request Accepted by the Certificate Authority (CA) in Win 2K8 / 2K8 R2 Now you have a pending certificate request, and it needs to be accepted by the CA. 1. Open the Internet explorer. 2. Type http://server/certsrv in the Address field. Here server is the name of the server you are creating the certificate. Example: elcwin2k8. 3. Click the Request a certificate hyperlink. Figure 88 73

Figure 89 4. Click the advanced certificate request hyperlink. Figure 90 74

5. Click the Submit a certificate request by using a base-64-encoded CMC or PKCS #10 file, or submit a renewal request by using a base-64-encoded PKCS #7 file hyperlink. Submit a Certificate Request or Renewal Request page displays. Figure 91 6. In the Saved Request: box, insert the content of the certreq.txt file. 7. In Certificate Template: drop-down, select Web Server. 75

Figure 92 8. Click the Submit > button. Once you click Submit, the certificate is issued to you. 9. Select Base 64 encoded option. 10. Click Download certificate. Figure 93 76

11. Select the Save button. Save the certificate on your local drive. Figure 94 12. Select the Save button. Figure 95 13. Close the Microsoft Certificate Services IE window. 77

Install the Certificate in Win 2K8 / 2K8 R2 1. Select the Start button, select Programs, and then select Administrative Tools. 2. Select Internet Information Services (IIS) Manager. 3. Select the server node. 4. In IIS pane, double-click Server Certificates icon. Server Certificates page displays. Figure 96 5. In Actions pane, click Complete Certificate Request. Complete Certificate Request window displays. 78

Figure 97 6. Click the Browse button and select the server certificate that you received from the CA. Figure 98 79

7. Click Open. Figure 99 8. Type any Friendly name to keep track of the certificate on this server. Figure 100 80

9. Click OK. If successful, you will see your newly installed certificate in the list. Figure 101 If you receive an error stating that the request or private key cannot be found, make sure you are using the correct certificate and that you are installing it to the same server that you generated the CSR on. If you are sure of those two things, you may just need to create a new Certificate Request and reissue/replace the certificate. 81

Bind the Certificate to the Default Web Site in Win 2K8 / 2K8 R2 EventTracker 8.0 and above 1. Expand the server node, expand the Sites node. 2. Select the EventTracker node. 3. In Actions pane, select Bindings. Site Bindings window displays. Figure 103 4. Select the Add button. Figure 104 82

Add Site Binding window displays. Figure 105 5. In Type drop down, select https. Figure 106 6. In SSL certificate: dropdown, select the certificate that is just installed. Figure 107 83

7. Click OK. The binding for port 443 is listed. Figure 108 8. Click Close. The newly added https web site is listed under Browse Web Site pane. For EventTracker 8.0 and above, refer the figure below: Figure 111 84

Test the SSL Enabled Default Web Site in Win 2K8 / 2K8 R2 1. Open the Internet Explorer. 2. Type http://localhost/eventtracker/login.aspx in the Address field. Internet Explorer displays the Security Alert. Figure 112 3. Click OK. Internet Explorer displays an error page because the self-signed certificate was issued by your machine, not a trusted Certificate Authority (CA). Internet Explorer will trust the certificate if you add it to the list of Trusted Root Certification Authorities in the certificates store on the local machine or in Group Policy for the domain. Figure 113 85

4. Click Continue to this website (not recommended). Internet Explorer displays the Security Alert. 5. Click OK. Internet Explorer displays the Login page. Figure 114 Configure SSL Settings in Win 2K8 / 2K8 R2 For EventTracker 8.0 and above, Configure SSL settings if you want your site to require SSL, or to interact in a specific way with client certificates. 1. Expand the Sites node, and then select EventTracker node. 2. Double-click SSL Settings. 86

Figure 115 SSL Settings page display. Figure 116 3. Select Require SSL option and click the Require option. 87

Figure 117 4. In Actions pane, select Apply. A successful message displays. Figure 118 88