Chapter 4 Windows NT/2000 Overview. NT Concepts  Domains –A group of one or more NT machines that share an authentication database (SAM) –Single sign-on.

Slides:



Advertisements
Similar presentations
COMP091 OS1 Active Directory. Some History Early 1990s Windows for Workgroups introduced peer-to-peer networking based on SMB over netbios (tcp/ip still.
Advertisements

70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 1: Introduction to Active Directory.
Chapter 6 Introducing Active Directory
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Chapter 7 HARDENING SERVERS.
Chapter 4 Chapter 4: Planning the Active Directory and Security.
Introduction to Active Directory
6.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 14: Windows Server 2003 Security Features.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
Administering Active Directory
Hands-On Microsoft Windows Server 2003 Administration Chapter 1 Windows Server 2003 Network Administration.
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
Chapter 4 Introduction to Active Directory and Account Management
7.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 7: Introducing Group Accounts.
Windows 2000 Remote Access. Remote Access Overview With Windows 2000 remote access, remote access clients connect to remote access servers and are transparently.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
Network+ Guide to Networks, Fourth Edition Chapter 8 Network Operating Systems and Windows Server 2003-Based Networking.
© N. Ganesan, Ph.D., All rights reserved. Active Directory Nanda Ganesan, Ph.D.
By Karan Oberoi.  A directory service (DS) is a software application- or a set of applications - that stores and organizes information about a computer.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 7 Configuring File Services in Windows Server 2008.
Understanding Active Directory
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
HalFILE 3.0 Active Directory Integration. halFILE 3.0 AD – What is it? Centralized organization of network objects and security – servers, computers,
Chapter 7 WORKING WITH GROUPS.
Overview of Active Directory Domain Services Lesson 1.
Lesson 17. Domains and Active Directory. Objectives At the end of this Presentation, you will be able to:
(ITI310) SESSIONS : Active Directory By Eng. BASSEM ALSAID.
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
Windows This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added material. Dr. Stephen.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
C HAPTER 6 NTFS PERMISSIONS & SECURITY SETTING. INTRODUCTION NTFS provides performance, security, reliability & advanced features that are not found in.
Designing Active Directory for Security
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
September 18, 2002 Windows 2000 Server Active Directory By Jerry Haggard.
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
Lesson 17-Windows 2000/Windows 2003 Server Security Issues.
Module 7 Active Directory and Account Management.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Active Directory Maryam Izadi. Topics Covered NT Vs 2000/2003 Active Directory LDAP MMC.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Page 1 Active Directory and DNS Lecture 2 Hassan Shuja 09/14/2004.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 11: Managing Access to File System Resources.
Module 1: Implementing Active Directory ® Domain Services.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
Hands-On Microsoft Windows Server 2008 Chapter 4-Part 1 Introduction to Active Directory and Account Manager.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
OVERVIEW OF ACTIVE DIRECTORY
Introduction to Active Directory
Hussain Ali Department of Computer Engineering KFUPM, Dhahran, Saudi Arabia Active Directory.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Windows 2003 Architecture, Active Directory & DNS Lecture # 3 Hassan Shuja 02/14/2006.
Chapter 6 Server Management: Domains Workgroup Domain Trust Relationship Examples.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Overview of Active Directory Domain Services
Overview of Active Directory Domain Services
Active Directory Fundamentals
(ITI310) SESSIONS 6-7-8: Active Directory.
Chapter 4: Planning the Active Directory and Security
Windows Server 2003 使用者群組管理
Presentation transcript:

Chapter 4 Windows NT/2000 Overview

NT Concepts  Domains –A group of one or more NT machines that share an authentication database (SAM) –Single sign-on to access resources and services on various machines within domain –Primary domain controller (PDC) –Backup domain controller (BDC)  Workgroups  Network File Shares –C: net use \\ [IP address or hostname] \ [share name] [username]:[password]  Service Packs (SP) and hot fixes

Windows NT Architecture

Security Subsystem  Aka Local Security Authority (LSA) –User mode subsystem verifying validity of user logon attempts  Security Accounts Manager (SAM) database –Each line contains user name, SID, LM password representation, NT password hash –C:\winnt\system32\config\SAM

User Accounts  Default Accounts –Administrator –Guest  Securing Accounts –Renaming administrator account –keep guest account disabled –Create non-privileged account named Administrator to act as decoy

Groups  Local Groups –Administrator –Account Operators –Server Operators –Backup Operators –Print Operators –Replicator –Users –Guests  Global Groups –Domain Administrators –Domain Users  Principle of Least Privilege

Figure 4.3 Account Policy for Windows NT

Windows NT DomaintTrust Models  No Trust  Complete Trust  Master Domain –Accounts Domain –Resource Domain  Multiple Master Domain –multiple Accounts Domain

Auditing  Seven audit categories  Event log

Windows NT Supported File Systems  FAT –No access control  NTFS –Supports access control

NTFS File Permissions –No access –Read access –Change –Full control

NTFS Share Permissions  Used for remote access to file systems  Based on Server Message Block (SMB) protocol (aka CIFS)  Share Permissions types –No access –Read access –Change –Full control  Null sessions –Remote SMB sessions requiring no username/password

Windows NT/2000 Network Security  Supports challenge-response authentication  Securing NT: A Step-by-Step Guide at  Windows 2000 Security Checklist at  VPN using Microsoft PPTP

Remote Access Service (RAS)  Allows remote dial-in of Windows clients  RAS servers rely on SAM database for user authentication  War dialers

Windows 2000 Features  Windows NT 5.0  Kerberos server (KDC) for user authentication  IPSec  Layer 2 Tunneling Protocol (L2TP)  Encryption File System (EFS)  Mixed Mode vs Native Mode  Authoritative domain controllers (no BDC)  Active Directory

Tree vs Forest Domain  Tree –A linking of domains via trust resulting in a continuous name space that supports locating resources easily via Active Directory –Root domain Topmost domain Name of child domain ends with the parent domain name  Forest –Produces a non-contiguous name space by cross-linking domains via trus

Figure 4.7 Depiction of a Windows 2000 tree

Active Directory  Based on Lightweight Directory Access Protocol (LDAP)  Massive data repository –Account info –Organization units (OU) –Security policies –Files/Directories –Printers –Services –Domains –Inheritance rules  Supports Dynamic DNS (DDNS)  User account passwords stored in file ntds.nit –grabbed by pwdump3 and cracked via L0phtCrack

Windows 2000 Security  install Active Directory in separate partition –C: Boot and system files –D: Active Directory –E: User files and applications  Physically secure Kerberos authentication server (Key Distribution Center)

Figure 4.8 Windows 2000 security settings

Securing Windows 2000  Windows 2000 Security Configuration Tools GUI  secedit command-line tool  \%systemroot%\security\templates contains nine templates to set system security to highly secure, secure or basic  3 security groups –Domain Local (access restricted to resources within same local domain) –Global (allows resources in one domain to be accessed by users from another domain) –Universal (can contain users and groups from any domain in any forest)

Organizational Units (OU)  Supports delegation of privileges  Each OU can be assigned a level of privileges  Inheritance of rights in OUs  Children OUs below the parent can never be given more rights than the parent has  Three levels of OUs should be maximum for optimal performance

Figure 4.10 User Rights in Windows 2000

RunAs command in Windows 2000  Allows privileged users to execute programs in a non-privileged context

Windows 2000 Trust  Based on Kerberos instead of challenge- response in NT  When new domain is added to tree or forest, that domain automatically trusts all other domains and is trusted by all other domains within that tree or forest

Windows 2000 Encrypted File System (EFS)  Automatically and transparently encrypts any stored files using DES encryption  Files transmitted over the network are not encrypted  DES encryption algorithm old

Network Security in Windows 2000  Windows NT PPTP –For Windows 2000 Mixed mode –Described in  Windows 2000 PPTP –For Windows 2000 Native mode –Not interoperable with other PPTP implementations  IPsec –Works only from Windows 2000 host to Windows 2000 host