Security Windows 2000 Richard Goldman © December 4, 2001.

Slides:



Advertisements
Similar presentations
Chapter 7 – Managing Windows XP. Control Panel The main tool for configuring your system. Most of the tools to configure the system come with the normal.
Advertisements

Managing User, Computer and Group Accounts
Tutorial EBSCOadmin User Groups support.ebsco.com.
Members Only & Login Modules Members Only works with the Login module to provide password protection to Web pages and files. Login Groups may be created.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Lesson 17: Configuring Security Policies
Chapter 8 Chapter 8: Managing Accounts and Client Connectivity.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 4: Troubleshoot System Startup and User Logon Problems.
Chapter 5: Configuring Users and Groups. Types of User Accounts Administrator –Unrestricted access to performing administrative tasks –Use sparingly Standard.
10.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Chapter 5: Configuring Users and Groups. Windows Vista User Accounts User accounts are the primary means of authentication Built-in Accounts –Administrator:
Panasonic Computer Products Europe CF-08 Live Set up.
11 MANAGING USERS AND GROUPS Chapter 13. Chapter 13: MANAGING USERS AND GROUPS2 OVERVIEW  Configure and manage user accounts  Manage user account properties.
Ch 9 Managing Active Directory User Accounts. Objectives Create Organizational Unit Creating User Accounts in Active Directory Disabling, Enabling, and.
11 WORKING WITH COMPUTER ACCOUNTS Chapter 8. Chapter 8: WORKING WITH COMPUTER ACCOUNTS2 CHAPTER OVERVIEW Describe the process of adding a computer to.
Guide to MCSE , Enhanced 1 Activity 9-1: Creating a Group Policy Object Using the MMC Objective: To create a GPO using the Group Policy Object Editor.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Implementing RADIUS AAA Phil & Rick. Content Terms and Concepts Access Control What is AAA? Benefits of AAA What is RADIUS? Microsoft IAS Overview Installation.
Working with Drivers and Printers Lesson 6. Skills Matrix Technology SkillObjective DomainObjective # Understanding Drivers and Devices Install and configure.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Working with Workgroups and Domains
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
CH 12 Securing Windows Server Objectives Understand the security enhancements included in Windows Server 2008 Understand how Windows Server 2008.
Using Group Policy to Manage User Environments. Overview Introduction to Managing User Environments Introduction to Administrative Templates Assigning.
70-270: MCSE Guide to Microsoft Windows XP Professional Second Edition, Enhanced Chapter 6: Windows XP Security and Access Controls.
September 18, 2002 Introduction to Windows 2000 Server Components Ryan Larson David Greer.
CIS250 OPERATING SYSTEMS WIN2k Lab # 3 Creating User Accounts Defining User Profiles Creating Groups Setting System Policies.
User Manager for Domains.  Manages the user accounts in a domain  It is located in the PDC  While User Manager exists in each NT machine, but it is.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Chapter Six Windows XP Security and Access Controls.
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
Creating a Web Site to Gather Data and Conduct Research.
Once you have contacted me to set up a new account, your computer needs to be configured to dial into.DevlinEx and use our servers for things like .
Installing and Using Active Directory Written by Marc Zacharko.
1 Chapter Overview Configuring Account Policies Configuring User Rights Configuring Security Options Configuring Internet Options.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
How to configure DNS for a Windows 2000 domain? 1.Start the Install/Remove Programs Control Panel Applet (Start - Settings - Control Panel - Add/Remove.
1 Chapter Overview Understanding User Accounts Planning New User Accounts Creating, Modifying, and Deleting User Accounts Setting Properties for User Accounts.
1 Part-1 Chap 5 Configuring Accounts Definitions.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Working with Workgroups and Domains Lesson 9. Objectives Understand users and groups Create and manage local users and groups Understand the difference.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
2. SQL Security Objectives –Learn SQL Server 2000 components Contents –Understanding the Authentication Process –Understanding the Authorization Process.
Security Planning and Administrative Delegation Lesson 6.
Page 1 User Accounts Lecture 3 Hassan Shuja 09/21/2004.
Managing Local Users & Groups. OVERVIEW Configure and manage user accounts Manage user account properties Manage user and group rights Configure user.
Guide to MCSE , Enhanced1 Activity 1-1: Determining the Windows Server 2003 Edition Installed on a Server Objective is to determine the edition of.
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 21 Administering User Accounts and Groups 1.
ARMS Advanced Risk Management System User Documentation.
CheckPoint Reporting System for Seismic Surveys Setting Up for Multiple Users December 2012 Mid Point Geo Limited PO Box 7437 Reading Berkshire RG27 7HQ,
1 Active Directory Administration Tasks And Tools Active Directory Administration Tasks Active Directory Administrative Tools Using Microsoft Management.
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
Go to Start >> Programs >> Outlook Express ( as shown)
Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.
Review on Active Directory. Aim Enable users to find network resources easily Central and easy administration of users and resources in a domain Improve.
Chapter 7 Server Management Policies –User accounts –Groups Rights and permissions Examples.
1 Chapter Overview Using Group Objects Understanding Default Groups Creating Group Objects Managing Administrative Access.
IOAP Setup and Maintenance of Assessment Laptop. Introduction In order to have smooth functioning of laptops during ion assessments, a few setup activities.
Passwords New Policies and You. New Password Policies Passwords Must Be Unique. (cannot be reused within 1 year) Minimum Password Length: 6 Maximum Password.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Ch 10 Security Group Management 1. Objectives 1.Understand Local security groups 2. Understand Domain local groups 3.Understand Global groups 4.Understand.
How to Join IIT Indore Active Directory. 1. Please note that these steps will create a new user in your computer. 2. You can use both user accounts or.
19 Copyright © 2008, Oracle. All rights reserved. Security.
Nassau Community College
Dynamic Web Page A dynamic web page is a kind of web page that has been prepared with fresh information (content and/or layout), for each individual viewing.
• What it is • How to create • How to use
Presentation transcript:

Security Windows 2000 Richard Goldman © December 4, 2001

Local or Domain Logon Before a user can access any resource the user must successfully logon to either the local computer or to a domain. To logon locally, the user must have a user account set up on the specific computer that is to be accessed. –Windows 2000 Professional uses the registry and internal security systems to authenticate a local logon. To logon to the domain, the user must have a user account set on the domain that is to be accessed. –Windows 2000 servers uses Active Directory to authenticate a domain logon.

Logon To logon locally, the user must enter: 1.Identification (I.D. or User Name) 2.Authentication (Password) – Case Sensitive To logon to the domain, the user must enter: 1.Identification (I.D. or User Name) 2.Authentication (Password) – Case Sensitive 3.Domain Name

Access Token When the logon is successfully completed, an Access Token is created that identifies: –The user (user’s SID) –The groups that the user belongs to (group SIDs) –The user’s rights and privileges The access token is attached to all process run by the user and accompanies all requests for access to computer or network resources.

Access Control List (ACL) All computer and network objects have an ACL. The ACL defines: –Who has access to the resource. –What type of access is provided for each user.

Accessing an Object When a user (or process) requests access to a resource – the request is accompanied by the user’s Access Token. The Access Token and the type of request is compared with the ACL. If the Access Token and the type of request is allowed then the request is granted.

MyDocument.DOC Read request for access to MyDocument.DOC by a user in the student group. ACL Staff Group Y Read Y Write N Delete Student Group: Y Read N Write N Delete Read Request Access Token User: John Smith Groups: Student Request: Read Match X

MyDocument.DOC Read request for access to MyDocument.DOC by a user in the student group. ACL Staff Group Y Read Y Write N Delete Student Group: Y Read N Write N Delete Read Request Access Token User: John Smith Groups: Student Request: Read Read Access Granted

Customizing Windows 2000 Professional Logon Select: –Control Panel –Administrative Tools –Local Security Policy

Customizing Windows 2000 Professional Logon

To Disable the display of the last username: –From Within Local Security Policy 1.Expand Local Security Settings 2.Expand Local Policies 3.Select Security Options 4.Double-click Do not display last user name in logon screen 5.Set the value to Enable.

Customizing Windows 2000 Professional Logon Disabling the display of the last username

Customizing Windows 2000 Professional Logon Adding a Security Message The two elements of the Security Warning Message are: –Legal Notice Caption – 30 characters on the title bar of the Security Warning Message window. –Legal Notice Text – up to 65K of text to go inside the Security Warning Message window.

Customizing Windows 2000 Professional Logon To use the Local Computer Policy you must add the Group Policy (not “Global Policy”) snap-in to an MMC. –Click the Start button –Select Run –Enter MMC –Select Add/Remove Snap-in –Click on Add button –Select Group Policy –Click on the Add button –Click on the Finish button –The “Local Computer Policy” is then added to the MMC. –Click on the Close button –Click on the OK button –Save the MMC as Local Computer Policy –The MMC called Local Computer Policy will now appear in the Administrative Tools group.

Customizing Windows 2000 Professional Logon Adding a Security Message