Chapter 6: Configuring Security. Options for Managing Security Configurations LGPO (Local Group Policy Object) –Used if Computer is not part of a domain.

Slides:



Advertisements
Similar presentations
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 7: Troubleshoot Security Settings and Local Security.
Advertisements

Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
1 Chapter Overview Understanding and Applying NTFS Permissions Assigning NTFS Permissions and Special Permissions Solving Permissions Problems.
1 Chapter Overview Understanding NTFS Permissions Assigning NTFS Permissions Assigning Special Permissions.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
Hands-On Microsoft Windows Server 2003 Administration Chapter 4 Managing Group Policy.
12.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
10.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
7.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 7: Introducing Group Accounts.
1 Securing Network Resources Understanding NTFS Permissions Assigning NTFS Permissions Assigning Special Permissions Copying and Moving Files and Folders.
Guide to MCSE , Enhanced 1 Activity 9-1: Creating a Group Policy Object Using the MMC Objective: To create a GPO using the Group Policy Object Editor.
Module 8: Implementing Administrative Templates and Audit Policy.
11 WORKING WITH USER ACCOUNTS Chapter 6. Chapter 6: WORKING WITH USER ACCOUNTS2 CHAPTER OVERVIEW Understand the differences between local user and domain.
9.1 © 2004 Pearson Education, Inc. Lesson 9: Implementing Group Policy in Windows 2000 Server Exam Microsoft® Windows® 2000 Directory Services Infrastructure.
70-270: MCSE Guide to Microsoft Windows XP Professional Chapter 5: Users, Groups, Profiles, and Policies.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Securing Windows Servers Using Group Policy Objects
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account.
CH 12 Securing Windows Server Objectives Understand the security enhancements included in Windows Server 2008 Understand how Windows Server 2008.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features.
1 Chapter Overview Understanding Group Policies Implementing Group Policies Using Security Policies Troubleshooting Group Policy Problems.
Corso referenti S.I.R.A. – Modulo 2 07 – Group Policy 20/11 – 27/11 – 05/12 11/12 – 13/12 (gruppo 1) 12/12 – 15/12 (gruppo 2) Cristiano Gentili, Massimiliano.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Using Group Policy to Manage User Environments. Overview Introduction to Managing User Environments Introduction to Administrative Templates Assigning.
September 18, 2002 Introduction to Windows 2000 Server Components Ryan Larson David Greer.
Managing User Accounts, Passwords and Logon Chapter 5 powered by dj.
© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Securing Windows.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Week #7 Objectives: Secure Windows 7 Desktop
With Windows XP, you can share files and documents with other users on your computer and with other users on a network. There is a new user interface.
C HAPTER 6 NTFS PERMISSIONS & SECURITY SETTING. INTRODUCTION NTFS provides performance, security, reliability & advanced features that are not found in.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 5: Managing File Access.
Troubleshooting Windows Vista Security Chapter 4.
MCTS Guide to Microsoft Windows Vista Chapter 7 Windows Vista Security Features.
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 22 Local Security Polcies 1.
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
1 Chapter Overview Configuring Account Policies Configuring User Rights Configuring Security Options Configuring Internet Options.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
September 18, 2002 Windows 2000 Server Active Directory By Jerry Haggard.
Windows Vista Inside Out Ch 10: Ch 10: Security Essentials Last modified
Implementing Group Policy. Overview What is Group Policy Introduction to Group Policy Group Policy Structure How Group Policy Settings Are Applied in.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 7 Windows 7 Security Features.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
Ch 17 Securing the File System. Three Ways to Protect Files NTFS Permissions Encrypting File Service BitLocker full-disk encryption – BitLocker ToGo.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 11: Group Policy for Corporate Policy.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
Module 7: Implementing Security Using Group Policy.
Lecture 6 File, Folder and Share Security. Objectives Managing file and folder security.
NetTech Solutions Security and Security Permissions Lesson Nine.
Managing Applications, Services, Folders, and Libraries Lesson 4.
Module 10: Implementing Administrative Templates and Audit Policy.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 7 Windows 7 Security Features.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
11 SUPPORTING WINDOWS XP FILE AND FOLDER ACCESS Chapter 5.
Introduction to Group Policy Lesson 7. Group Policy Group Policy is a method of controlling settings across your network. – Group Policy consists of user.
Configuring Windows Firewall with Advanced Security
Securing Windows 7 Lesson 10.
Presentation transcript:

Chapter 6: Configuring Security

Options for Managing Security Configurations LGPO (Local Group Policy Object) –Used if Computer is not part of a domain environment –Set of security configuration settings that are created and stored on the local computer Users Computers Stored in \systemroot\System32\GroupPolicyUsers GPO (Group Policy Objects) –Used if Computer is part of an Active Directory domain –Allows for remote and centrally managed security –Has a more levels of security structure, and thus more granular control 2/22

Group Policy and LGPO (Local Group Policy Objects) Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts Printers Security Settings Policy-based QOS Administrative Templates Folder Redirection not available with LGPOs Internet Explorer Configuration 3/22

GPO Inheritance Order of Inheritance –Local –Site (physical location) –Domain –Organizational Unit (OU) Containers higher are called parents and lower are called children. Children inherit from the parent and non- conflicting settings are additive. If settings conflict, then the child overrides the parent. Two types of Policy Settings –Computer Settings –User Settings If a conflict occurs than the Computer setting is applied. 4/22

GPO Inheritance Special Options, for overriding the default behavior of GPO execution. –No Override Used to specify that a child can not override the policy settings of a parent higher level container. –Block Inheritance Used to allow a child container to be able to block the inheritance of a policy from a parent container. If a conflict occurs between “No Override” and “Block Inheritance” than “No Override” would win and be applied. 5/22

Group Policy Result Tool Because of the overlapping nature of Group Policies, Vista provides a tool to help determine what policies will applied. –Tool is accessed through the GPResult.exe command-line utility. –GPResult displays the Resultant Set of Policy (RSOP) for the computer and the user who is currently logged in. C:/>GPResult.exe /r 6/22

Using Local Group Policies Used to manage configuration settings for workstations in a workgroup environment without an Active Directory domain Created and assigned through the Local Group Policy snap-in in MMC –Microsoft Management Console Two types of policies: –Computer Configuration –User Configuration 7/22

Multiple Local Group Policy Objects (MLGPOs) New to Windows Vista Enables Vista to apply LGPOs to specific users rather than apply them to every user on a computer Applied in the following order: –Local Computer Policy (User and Computer) –Administrators and Non-Administrators Local Group Policy (User only ) –User-Specific Group Policy (User only) Again, GPO settings applied lower will override parent settings in the event of a conflict. AD GPO will override conflicting LGPO 8/22

Setting Computer Configuration Policies Three folders within the Computer Configuration folder: –Software Settings –Windows Settings –Administrative Templates Scripts and Security Settings are found within the Windows Settings folder. 9/22

Windows Settings Scripts –Logon – Startup –Logoff – Shutdown Security Settings –Account Policies –Local Policies –Windows Firewall with Advanced Security –Public Key Policies –Software Restriction Policies –IP Security Policies Policy-based QOS 10/22

Account Policies Password Policy –Enforce Password History No repeated passwords –Maximum Password Age Time until password change –Minimum Password Age Keeps user from immediately changing password back to what it was –Minimum Password Length If not set, then no password is required –Password Must Meet Complexity Requirements Must be 6 characters or longer, can not contain the username or any part of the full name, and must contain 3 of the following –English Upper Case Character –English Lower Case Character –Decimal Digit –Symbols –Store Passwords Using Reversible Encryption Higher level of Encryption security – 11/22

Account Policies Account Lockout Policy –Account Lockout Duration How long the account will remain locked if Threshold is reached. –Account Lockout Threshold Specifies how many invalid attempts can be made before the account is locked. –Reset Account Lockout Counter After How many minutes the counter will remember unsuccessful login attempts. 12/22

Local Policies After Login Audit Policy (Too many will degrade performance) –Used to track success or failure of user actions. Login Attempts Object Access User Rights Assessment –User rights as they apply to the system, not file permissions Change System Time Add workstations to the Domain Backup files and directories Security Options –Security as it relates to the computer, not the user. –Contains new policies relating to User Account Control (UAC) Require approval for administrative operations Specifies the method of approval –Prompt for Consent –Prompt for Credentials 13/22

User Account Control New to Windows Vista Protects computers by requiring privilege elevation for all users including local Administrators (except the built-in Administrator account) –Local Administrative users act as standard users, until doing something which requires administrative privileges –Standard users, will be prompted for the credentials of an admin user. Privilege escalation is required whenever the four-color shield icon is present: 14/22

Windows Security Center Used to monitor and configure critical settings through a centralized dialogue box for: –Windows Firewall –Automatic Updating –Malware Protection –Other Security Settings Will list whether the security feature is enabled and whether it is up to date. 15/22

Windows Firewall Protects computer from unauthorized users or malicious software. It does not allow unsolicited traffic to pass that was not requested. Configuration –General Tab On or Off, as well as Block all Incoming –Exceptions Tab Define which programs and services can pass through the firewall –Advanced Tab Specify firewall settings at a more granular level by reducing control to the specific connection. Windows Firewall with Advanced Security is used to configure advanced settings, including inbound and outbound rules 16/22

Windows Defender Formerly Microsoft AntiSpyware Protects computer from spyware threats Tools and Settings –Options: Default Actions Automatic Scans Realtime Protection –Microsoft SpyNet Online Community for such things as what to do with non-classified software –Quarantined Items Allowed recovery of software found to be ok –Allowed Items List of trusted applications –Software Explorer Lists installed software and it’s classification –Windows Defender website 17/22

BitLocker Drive Encryption Included with Vista Enterprise and Vista Ultimate Used to encrypt the system drive –The security key is stored on the systems TPM (Trusted Platform Module) chip. If no TPM is present, it can be store on a thumb drive. The USB thumb drive will be required each time you boot the system. –The 48 digit BitLocker recovery password, must not be lost so as to recover from a lost or corrupted USB drive. Files on other drives must be encrypted with another method, such as Encrypting File System (EFS), as BitLocker only does the System Drive 18/22

File and Folder Access Security 19/22 Vista allows you to very easily share and secure files and folders. A user’s access rights to specific folders will be based on their logon name and group associations by applying NTFS (New Technology File System) permissions.

NTFS Permissions If permissions are not explicitly granted in NTFS, then they are implicitly denied. Explicitly denied, overrides explicitly granted permissions Six levels of permissions –Full Control –Modify –Read & Execute –List Folder Contents –Read –Write 20/22

Controlling Inheritance By default, subfolders and files inherit the permissions assigned to the parent folder. Prevent permissions from propagating to subfolders and files by clearing the Include Inheritable Permissions from This Object’s Parent check box. 21/22

Determining Effective Permissions To determine a user’s effective rights to a file or folder: –Add all the permissions that are allowed to the user to all permissions granted to the groups of which the user is a member. –Subtract any permissions similarly denied to the user or the user’s groups. 22/22

Determining NTFS Permissions for Copied and Moved Files Move File Copy File Same Partition Retains original NTFS permissions Inherits permissions from destination folder Different Partition Inherits permissions from destination folder 23/22

Managing Network Access Share folders that contain files you want to be accessible over the network Configure sharing from the Sharing tab of the folder properties dialog box 24/22

Configuring Share Permissions Permissions can be assigned to users and groups –Full Control Allows full access to the folder –Change Allows users to change data in files or to delete files –Read Allows users to view and execute files 25/22

NTFS Permissions + Shared Permissions NTFS security and shared folder security work together The most restrictive permissions are the effective permissions: –NTFS security more restrictive than shared folder security = NTFS permissions are effective –Shared folder security more restrictive than NTFS security = Shared folder permissions are effective 26/22