LAN Management © Abdou Illia, Fall 2006 School of Business Eastern Illinois University (Week 9, Thursday 10/19/2006)

Slides:



Advertisements
Similar presentations
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Advertisements

When you combine NTFS permissions and share permissions the most restrictive effective permission applies. For example, if you share a folder and assign.
 Overview User Accounts Groups User Rights Permissions.
1 Chapter Overview Understanding NTFS Permissions Assigning NTFS Permissions Assigning Special Permissions.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Review for Exam 3 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
1 File systems security: Shared folders & NTFS permissions, EFS (Week 6, Monday 2/12/2007) © Abdou Illia, Spring 2007.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
Network Management 2 School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 16, Thursday 4/19/2007)
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
A Small PC Network. 2 Small Peer-Peer PC Network No dedicated (full- time) server User PCs supply services to each other So user PCs act both as clients.
Review For Final Spring Network Architecture Models.
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
Review For Final Should consider Review-For-Exam4 for your Final Exam preparation © Abdou Illia, Fall 2006.
Review for Exam 3 School of Business Eastern Illinois University © Abdou Illia, Spring 2007.
Review for Exam 3 School of Business Eastern Illinois University © Abdou Illia, Fall 2004.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Administering Active Directory
LAN Management © Abdou Illia, Spring 2007 School of Business Eastern Illinois University 3/6/2007 Lab.
Lesson 19 – ADMINISTERING WINDOWS 2000 SERVER : THE BASICS.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
Chapter 5: Configuring Users and Groups. Windows Vista User Accounts User accounts are the primary means of authentication Built-in Accounts –Administrator:
By Rashid Khan Lesson 8-Crowd Control: Controlling Access to Resources Using Groups.
Review For Final (Week 16, Monday 12/6/2004) Should consider Review-For-Exam4 for your Final Exam preparation.
1 Securing Network Resources Understanding NTFS Permissions Assigning NTFS Permissions Assigning Special Permissions Copying and Moving Files and Folders.
Group Accounts; Securing Resources with Permissions
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Working with Workgroups and Domains
Sharing Resources Lesson 6. Objectives Manage NTFS and share permissions Determine effective permissions Configure Windows printing.
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
6.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 6: Administering User Accounts.
CIS250 OPERATING SYSTEMS WIN2k Lab # 3 Creating User Accounts Defining User Profiles Creating Groups Setting System Policies.
Chapter 7: WORKING WITH GROUPS
Review for Exam 3 School of Business Eastern Illinois University © Abdou Illia, Fall 2005.
C HAPTER 6 NTFS PERMISSIONS & SECURITY SETTING. INTRODUCTION NTFS provides performance, security, reliability & advanced features that are not found in.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 5: Managing File Access.
XTR Consulting: A SOHO Network with Dedicated Servers Chapter 1b Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.
IOS110 Introduction to Operating Systems using Windows Session 8 1.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
Managing Groups, Folders, Files and Security Local Domain local Global Universal Objects Folders Permissions Inheritance Access Control List NTFS Permissions.
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Introduction to Microsoft Management Console (MMC) MMC is a common console framework for management applications. MMC provides a common environment for.
1 Chapter Overview Understanding User Accounts Planning New User Accounts Creating, Modifying, and Deleting User Accounts Setting Properties for User Accounts.
Review For Final (Week 15, Monday 12/5/2005) Should consider Review-For-Exam4 for your Final Exam preparation.
File Server Systems Administration Set Up Access Rights for Each Directory, File –The ability to even see a directory or file (otherwise, it will be invisible)
Chapter 10: Rights, User, and Group Administration.
Chapter 8 Configuring and Managing Shared Folder Security.
Page 1 NTFS and Share Permissions Lecture 6 Hassan Shuja 10/26/2004.
Page 1 User Accounts Lecture 3 Hassan Shuja 09/21/2004.
Managing Local Users & Groups. OVERVIEW Configure and manage user accounts Manage user account properties Manage user and group rights Configure user.
Lecture 6 File, Folder and Share Security. Objectives Managing file and folder security.
Review for Exam 3 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
1 Introduction to NTFS Permissions Assign NTFS permissions to specify Which users and groups can gain access to folders and files What they can do with.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.
1 Chapter Overview Using Group Objects Understanding Default Groups Creating Group Objects Managing Administrative Access.
Module 4: Managing Access to Resources. Overview Overview of Managing Access to Resources Managing Access to Shared Folders Managing Access to Files and.
HNC COMPUTING - Network Concepts 1 Network Concepts Network Concepts Network Operating Systems Network Operating Systems.
Sharing Resources Lesson 6. Objectives Manage NTFS and share permissions Determine effective permissions Configure Windows printing.
11/06/ أساسيات الأتصال و الشبكات Communication & Networks Fundamentals lab 5.
6/19/2016 أساسيات الأتصال و الشبكات Communication & Networks Fundamentals lab 4.
19 Copyright © 2008, Oracle. All rights reserved. Security.
ITMT Windows 7 Configuration Chapter 6 – Sharing Resource ITMT 1371 – Windows 7 Configuration 1.
Introduction to NTFS Permissions
Introduction to Operating Systems
ACTIVE DIRECTORY ADMINISTRATION
Active Directory Administration
Presentation transcript:

LAN Management © Abdou Illia, Fall 2006 School of Business Eastern Illinois University (Week 9, Thursday 10/19/2006)

2 Learning Objectives n Understand Accounts and Access rights

3 LAN management n It take a few days to set up a PC LAN n The rest of the time, Network administrator must keep it functioning – Using the NOS and – Network management utilities (e.g. Protocol analyzers like Etherpeek or IBM's NetView)

4 LAN management n Definition: Using Network Operating System and utility programs to monitor a Local Area Network in order to keep it functioning. n Common management activities: – Creating and managing user accounts and groups of user accounts (e.g. Accounting group) – Sharing resources (e.g. folders, printers, programs) – Assigning Access rights: What resources users can see and what actions they can take for each resource? – Diagnosing problems in LAN’s operation – Gathering statistics about LAN’s traffic

5 User accounts n A user account is a record that contains – User name – User password – Groups the user belongs to – User’s logon time, etc. n Domain user account: allows users to log on to a domain and gain access to resources anywhere on the network n Local user account: allows users to log on and gain access to resources on the computer where the user account is created n Built-in User accounts: – Administrator, Guest,

6 Group accounts n A Group account is a collection of User accounts n Users can be members of more than one group n Assigning Access rights: – Should be done for each user in each directory (i.e. each folder) – Usually, however, users are assigned to groups – So, we can give access rights to groups – If access rights are assign to a group, all members of the group get those rights Using Groups greatly simplifies the assignment of access rights

7 Access rights n List of Access rights found in most NOS: – Ability to see a directory of file – Ability to get a read-only copy of a file in a directory (i.e. copy that cannot be edited and then saved under the same name) – Ability to edit and then save a file – Ability to create and delete files – Ability to create and delete subdirectories – Ability to assign access rights in a directory to other users. Applications WordProcessings Databases Drive C OracleQuickDB

8 Automatic Inheritance of Access Rights n Assigning rights to user or group accounts in a directory n Rights are automatically inherited in lower-level directories

9 Automatic Inheritance of Access Rights n Assigning rights to users or group in a directory n Rights automatically inherited in lower directories n Simplifies rights assignment Application Word ProcessingDatabase OracleQuickDB Assigned Browse And Read Rights Inherits Browse And Read Rights Inherits Browse And Read Rights

10 Automatic Inheritance of Access Rights n Blocking of Inheritance – If rights explicitly assigned in subdirectory, inheritance is blocked – Only assigned rights are effective Application Word Processing Database (Browse and Execute Only) QuickDB Assigned Browse And Read Rights Inherit Browse And Read Rights Assigned Browse And Execute Rights Oracle

11 Omnibus rights n Users normally have very limited access rights n Administrator normally has omnibus rights, i.e. – Total access rights in every directory (Full Control) – Can read, delete, etc. any file in any directory n Omnibus rights necessary to allow the administrator to fix problems wherever they occur n Problem: No file is hidden from Administrator’s eyes (including encrypted files)

12 Omnibus rights n Administrators often assign Omnibus rights to their assistants n Omnibus rights dangerous but – Eliminating them can create limitations on the Administrator’s abilities to manage the Network.

13 Summary Questions 1. Directory Applications has subdirectories Databases and WordProcessings. The Network administrator assigns user Lee to the group Outer. The administrator assigns Outer the access rights R, S, and T in Directory Applications. (Don’t worry about the meaning of R, S, and T. They are simply types of rights.) The administrator assigns Outer the access rights S, U, and V in subdirectory Databases. a) What access rights does user Lee have in directory Applications? Explain. b) What access rights does user Lee have in directory Databases? Explain. c) What access rights does user Lee have in directory WordProcessings? Explain. Applications WordProcessings Databases

14 Summary Questions 2. (a) What is LAN management ? (b) Name some common management activities. 3. a) What are access rights? b) How does the use of groups simplify the assignment of access rights? c) How does automatic inheritance simplify the assignment of access rights? d) How does explicit assignment modify automatic inheritance?

15 Etherpeek Frame-by-Frame Analysis SourceDestinationSizeTime StampProtocol 100:A0:C9:AC:FE:B000:40:C7:95:6E:EF6413:01:39.581NW IPX 200:A0:C9:AC:FE:B000:40:C7:A1:12:8B6413:01:39.581NW IPX 300:A0:C9:AC:FE:B000:40:05:3E:6F:DC6413:01:39.581NW IPX 4IP IP :01:39.582IP-UDP 500:A0:C9:AC:FE:B000:40:C7:2F:04:616413:01:39.582NW IPX 600:A0:C9:AC:FE:B000:50:DA:29:7A:E96413:01:39.582NW IPX 7IP IP :01:39.589IP-UDP

16 Etherpeek Summary Information