20
1 www.pkjayan.wordpress.com Jayachandran PK Step-by-step installation guide for monitoring untrusted servers using Operations Manager (Part 1 of 3) Most of the time through Operations Manager, you may require to monitor servers and clients that are located outside of the Active Directory environment. These servers and clients may be located in the DMZ as workgroup machines, or maybe you have a number of completely different Active Directory domains and forests that have no relation with each other but need to be monitored by a central Operation Monitor implementation. The Operations Manager agents support two types of authentication method, Kerberos or certificate based authentication. In order to monitor servers and clients located outside the Operations Manager’s native Active Directory domain, you will need to configure certificate authentication using either an internal Certificate Authority or through a 3rd party Certificate Authority. Following are the high-level overview of tasks involved in monitoring servers and clients located outside Active Directory domain. Check communication port availability Download the Trusted Root (CA) certificate Import the Trusted Root (CA) certificate Create a certificate template Request a certificate from the enterprise CA Manual installation of agents and importing the SCOM certificate to the servers to be monitored Import the certificate into SCOM Approve agents in SCOM console Agent communication port availability: The SCOM agent uses TCP Ports 5723 and 5724 (both ways) to communicate with root management server. To test the port access between agent server and root management server, you may Log on to the agent server and from command prompt, type Telnet <Management Server> 5723 If you get a cursor at the top left corner then the port is open, any other errors indicate that the port is still closed.

Step-by-step installation guide for monitoring untrusted ... · PDF fileStep-by-step installation guide for monitoring untrusted servers using Operations ... located in the DMZ as

  • Upload
    hathuan

  • View
    241

  • Download
    3

Embed Size (px)

Citation preview

Page 1: Step-by-step installation guide for monitoring untrusted ... · PDF fileStep-by-step installation guide for monitoring untrusted servers using Operations ... located in the DMZ as

1 www.pkjayan.wordpress.com Jayachandran PK

Step-by-step installation guide for monitoring untrusted servers using Operations Manager (Part 1 of 3) Most of the time through Operations Manager, you may require to monitor servers and clients that are located outside of the Active Directory environment. These servers and clients may be located in the DMZ as workgroup machines, or maybe you have a number of completely different Active Directory domains and forests that have no relation with each other but need to be monitored by a central Operation Monitor implementation. The Operations Manager agents support two types of authentication method, Kerberos or certificate based authentication. In order to monitor servers and clients located outside the Operations Manager’s native Active Directory domain, you will need to configure certificate authentication using either an internal Certificate Authority or through a 3rd party Certificate Authority. Following are the high-level overview of tasks involved in monitoring servers and clients located outside Active Directory domain.

Check communication port availability

Download the Trusted Root (CA) certificate

Import the Trusted Root (CA) certificate

Create a certificate template

Request a certificate from the enterprise CA

Manual installation of agents and importing the SCOM certificate to the servers to be monitored

Import the certificate into SCOM

Approve agents in SCOM console

Agent communication port availability: The SCOM agent uses TCP Ports 5723 and 5724 (both ways) to communicate with root management server. To test the port access between agent server and root management server, you may Log on to the agent server and from command prompt, type Telnet <Management Server> 5723

If you get a cursor at the top left corner then the port is open, any other errors indicate that the port is still closed.

Page 2: Step-by-step installation guide for monitoring untrusted ... · PDF fileStep-by-step installation guide for monitoring untrusted servers using Operations ... located in the DMZ as

2 www.pkjayan.wordpress.com Jayachandran PK

Download the Trusted Root (CA) Certificate: The trusted root certificate must be installed on the RMS, MS, Gateway server or DMZ/untrusted domain servers. To download the trusted root certificate, Log on to the computer where you want to install a certificate and connect to the Certificate Enrolment URL on the certificate Authority Server. For example, http://<CAservername>/certsrv In case the server in DMZ or untrusted domain cannot reach the certificate Authority Server, you may download the Root (CA) Certificate to any server which has access to the Certificate Enrolment URL on the certificate Authority Server. Then copy the certificate using removable media and imports the

same to desired server in DMZ or untrusted domain. On the Welcome page, click Download a CA Certificate, certificate chain, or CRL.

On the Download a CA Certificate, Certificate Chain, or CRL page, under Encoding method, click Base 64, and then click Download CA certificate chain.

Page 3: Step-by-step installation guide for monitoring untrusted ... · PDF fileStep-by-step installation guide for monitoring untrusted servers using Operations ... located in the DMZ as

3 www.pkjayan.wordpress.com Jayachandran PK

In the File Download dialog box, click Save

Then save the certificate with a relevant name such as ‘rootcert’ to the C:\ drive of your computer.

When the download has finished, close Internet Explorer.

Page 4: Step-by-step installation guide for monitoring untrusted ... · PDF fileStep-by-step installation guide for monitoring untrusted servers using Operations ... located in the DMZ as

4 www.pkjayan.wordpress.com Jayachandran PK

Import the Trusted Root (CA) certificate: Logon to the server (RMS, MS, Gateway server or DMZ/untrusted domain servers), click Start, and then click Run. In the Run dialog box, type mmc, and then click OK.

In the Console1 window, click File, and then click Add/Remove Snap-in.

In the Add or Remove Snap-in dialog box, under the available snap-ins, select Certificates, and then click Add.

Page 5: Step-by-step installation guide for monitoring untrusted ... · PDF fileStep-by-step installation guide for monitoring untrusted servers using Operations ... located in the DMZ as

5 www.pkjayan.wordpress.com Jayachandran PK

In the Certificates snap-in dialog box, select Computer account, and then click Next.

Page 6: Step-by-step installation guide for monitoring untrusted ... · PDF fileStep-by-step installation guide for monitoring untrusted servers using Operations ... located in the DMZ as

6 www.pkjayan.wordpress.com Jayachandran PK

In the Select Computer dialog box, ensure that Local computer: (the computer this console is running on) is selected, and then click Finish.

In the Add or Remove Snap-in dialog box, click OK.

Page 7: Step-by-step installation guide for monitoring untrusted ... · PDF fileStep-by-step installation guide for monitoring untrusted servers using Operations ... located in the DMZ as

7 www.pkjayan.wordpress.com Jayachandran PK

In the Console1 window, expand Certificates (Local Computer), then expand Trusted Root Certification Authorities, and then click Certificates.

Right-click Certificates, select All Tasks, and then click Import.

A Certificate Import Wizard opens. In the Certificate Import Wizard window, click Next

Page 8: Step-by-step installation guide for monitoring untrusted ... · PDF fileStep-by-step installation guide for monitoring untrusted servers using Operations ... located in the DMZ as

8 www.pkjayan.wordpress.com Jayachandran PK

On the File to Import page, click Browse and select the location where you downloaded the CA certificate file, for example, c:\rootcert.cer, select the file, and then click Open.

Page 9: Step-by-step installation guide for monitoring untrusted ... · PDF fileStep-by-step installation guide for monitoring untrusted servers using Operations ... located in the DMZ as

9 www.pkjayan.wordpress.com Jayachandran PK

If the server in DMZ or untrusted domain cannot reach the certificate Authority Server, make sure you copy the root CA certificate from the server where you downloaded the same using the previous step. On the certificate store page, select Place all certificates in the following store and ensure that Trusted Root Certification Authorities appears in the Certificate store box, and then click Next.

On the Completing the Certificate Import Wizard page, click Finish to complete the process. At this point you should now have the Trusted Root CA certificate downloaded and installed onto your server. You may verify the same from the local certificate store.

Page 10: Step-by-step installation guide for monitoring untrusted ... · PDF fileStep-by-step installation guide for monitoring untrusted servers using Operations ... located in the DMZ as

10 www.pkjayan.wordpress.com Jayachandran PK

Create a certificate template: To create certificate template, you need to access the Certification authority console. Follow the below steps to access Certification authority console. Logon to the Server running Enterprise CA. From the desktop, click Start, point to Programs, point to Administrative Tools, and then click Certification Authority.

Page 11: Step-by-step installation guide for monitoring untrusted ... · PDF fileStep-by-step installation guide for monitoring untrusted servers using Operations ... located in the DMZ as

11 www.pkjayan.wordpress.com Jayachandran PK

Under Certification authority (Local), Expand the <Servername-CA name>, right-click Certificate Templates, and then click Manage to open the Certificate Templates Console.

From the Certificate Templates console, in the results pane, right-click IPSec (Offline request), and then click Duplicate Template

Page 12: Step-by-step installation guide for monitoring untrusted ... · PDF fileStep-by-step installation guide for monitoring untrusted servers using Operations ... located in the DMZ as

12 www.pkjayan.wordpress.com Jayachandran PK

Select either Windows Server 2003 Enterprise or Windows Server 2008 Enterprise as the minimum supported CA type from the window.

In the Properties of New Template dialog box, on the General tab, under the Template display name: type a new name for this template (for example, Opsmgr Template). Also set the validity and renewal periods for the certificate if required.

Page 13: Step-by-step installation guide for monitoring untrusted ... · PDF fileStep-by-step installation guide for monitoring untrusted servers using Operations ... located in the DMZ as

13 www.pkjayan.wordpress.com Jayachandran PK

On the Request Handling tab, set the Minimum Key Size and select the Allow private key to be exported check box.

If you have a specific cryptographic service provider that falls in line with your business policies, you may change the same by clicking on the CSPs box. That will open the CSP Selection window to change the cryptographic service provider. Otherwise leave the default settings.

Page 14: Step-by-step installation guide for monitoring untrusted ... · PDF fileStep-by-step installation guide for monitoring untrusted servers using Operations ... located in the DMZ as

14 www.pkjayan.wordpress.com Jayachandran PK

On the Extensions tab, under Extensions included in this template: select Application Policies, and then click Edit

In the Edit Application Policies Extension box, click IP security IKE intermediate, and then click Remove.

Page 15: Step-by-step installation guide for monitoring untrusted ... · PDF fileStep-by-step installation guide for monitoring untrusted servers using Operations ... located in the DMZ as

15 www.pkjayan.wordpress.com Jayachandran PK

Click Add, and in the Application policies list, hold down the CTRL key to multi-select items from the list, click Client Authentication and Server Authentication, and then click OK

In the Edit Application Policies Extension dialog box, click OK

Page 16: Step-by-step installation guide for monitoring untrusted ... · PDF fileStep-by-step installation guide for monitoring untrusted servers using Operations ... located in the DMZ as

16 www.pkjayan.wordpress.com Jayachandran PK

On the Security tab, ensure that the Authenticated Users group has Read and Enroll permissions, and then click OK to complete

If you are using Windows Server 2008 R2 Certificate Authority, The Computer object for the Certificate Authority must have Read and Enroll permissions within the Security tab. Following additional steps need to be completed in order to meet the additional security requirements in Windows Server 2008 R2 Certificate Authority. Select the Add button from the screen above and then click on the Object Types button from the next screen that pops up.

Page 17: Step-by-step installation guide for monitoring untrusted ... · PDF fileStep-by-step installation guide for monitoring untrusted servers using Operations ... located in the DMZ as

17 www.pkjayan.wordpress.com Jayachandran PK

This will open the Object Types window from which you will select the box beside Computers as shown below and then click on OK

In the Select Users, Computers, Service Accounts or Groups window, type the name of your Certificate Authority server and then click OK

Notice the Certificate Authority computer listed under the Security tab. Select the Certificate Authority computer name and then select the Read and Enroll permissions. Once you have selected the correct permissions for the Authenticated Users and Certificate Authority Computer accounts, click OK to close the Opsmgr Template properties window.

Page 18: Step-by-step installation guide for monitoring untrusted ... · PDF fileStep-by-step installation guide for monitoring untrusted servers using Operations ... located in the DMZ as

18 www.pkjayan.wordpress.com Jayachandran PK

Since we have the Opsmgr Template created and configured with the correct permissions, we need to add that template into the Certificate Authority Templates folder in order to be available for the clients to use it. From the Certification Authority snap-in, right-click the Certificate Templates folder, point to New, and then click Certification Template to Issue.

Page 19: Step-by-step installation guide for monitoring untrusted ... · PDF fileStep-by-step installation guide for monitoring untrusted servers using Operations ... located in the DMZ as

19 www.pkjayan.wordpress.com Jayachandran PK

From the Enable Certificate Templates box, select the certificate template that you created, and then click OK

Page 20: Step-by-step installation guide for monitoring untrusted ... · PDF fileStep-by-step installation guide for monitoring untrusted servers using Operations ... located in the DMZ as

20 www.pkjayan.wordpress.com Jayachandran PK

Notice that the new Opsmgr Template is appeared in the result pane of Certificate Templates.

This will now enable the new Opsmgr Template to be used when requesting future certificates for Operation Manager through the Certificate Authority Web Browser enrolment tool.