MA194Using WindowsNT1 Topics for the day… WindowsNT Security WindowsNT File System (NTFS) Viewing/Setting Document and Folder Permissions Access Control.

Slides:



Advertisements
Similar presentations
Lecture 10 Sharing Resources. Basics of File Sharing The core component of any server is its ability to share files. In fact, the Server service in all.
Advertisements

Managing User, Computer and Group Accounts
CREATING USER ACCOUNTS Group accounts simplify administration by organizing user accounts into a single administrative unit. They provide a convenient.
 Overview User Accounts Groups User Rights Permissions.
1 Chapter Overview Understanding and Applying NTFS Permissions Assigning NTFS Permissions and Special Permissions Solving Permissions Problems.
1 Chapter Overview Understanding NTFS Permissions Assigning NTFS Permissions Assigning Special Permissions.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
6.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
Chapter 5: Configuring Users and Groups. Types of User Accounts Administrator –Unrestricted access to performing administrative tasks –Use sparingly Standard.
Administering Active Directory
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
11 SHARING FILE SYSTEM RESOURCES Chapter 9. Chapter 9: SHARING FILE SYSTEM RESOURCES2 CHAPTER OVERVIEW  Create and manage file system shares and work.
Chapter 5: Configuring Users and Groups. Windows Vista User Accounts User accounts are the primary means of authentication Built-in Accounts –Administrator:
Lesson 4: Configuring File and Share Access
By Rashid Khan Lesson 8-Crowd Control: Controlling Access to Resources Using Groups.
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
1 Securing Network Resources Understanding NTFS Permissions Assigning NTFS Permissions Assigning Special Permissions Copying and Moving Files and Folders.
Group Accounts; Securing Resources with Permissions
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 7 Configuring File Services in Windows Server 2008.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Chapter 7 WORKING WITH GROUPS.
11 WORKING WITH USER ACCOUNTS Chapter 6. Chapter 6: WORKING WITH USER ACCOUNTS2 CHAPTER OVERVIEW Understand the differences between local user and domain.
11 SHARING FILE SYSTEM RESOURCES Chapter 9. Chapter 9: SHARING FILE SYSTEM RESOURCES2 CHAPTER OVERVIEW Create and manage file system shares and work with.
Chapter 5 File and Printer Services
Access Control Lists and NTFS Permissions INFO333 – Lecture Mariusz Nowostawski Noria Foukia.
Users and Groups Security Architecture Editing Security Policies The Registry File Security Auditing/Logging Network Issues (client firewall, IPSec, Active.
Web Server Administration Chapter 5 Managing a Server.
Sharing Resources Lesson 6. Objectives Manage NTFS and share permissions Determine effective permissions Configure Windows printing.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
User Manager for Domains.  Manages the user accounts in a domain  It is located in the PDC  While User Manager exists in each NT machine, but it is.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
Chapter 7: WORKING WITH GROUPS
1/28/2010 Network Plus Windows Networking Network Identification Identifies name and type of network. Installed adapters –Performed during Windows installation.
CIM6400 CTNW (04/05) 1 CIM6400 CTNW Lesson 6 – More on Windows 2000.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 5: Managing File Access.
Copyright 2000 eMation SECURITY - Controlling Data Access with
IOS110 Introduction to Operating Systems using Windows Session 8 1.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
Module 4 Managing Access to Resources in Active Directory ® Domain Services.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
Managing Groups, Folders, Files and Security Local Domain local Global Universal Objects Folders Permissions Inheritance Access Control List NTFS Permissions.
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
Chapter 9: SHARING FILE SYSTEM RESOURCES1 CHAPTER OVERVIEW  Create and manage file system shares and work with share permissions.  Use NTFS file system.
Publishing Your Web Pages Ann Emmanuel SIUE Web Administrator
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Chapter 10: Rights, User, and Group Administration.
2. SQL Security Objectives –Learn SQL Server 2000 components Contents –Understanding the Authentication Process –Understanding the Authorization Process.
Page 1 User Accounts Lecture 3 Hassan Shuja 09/21/2004.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
NetTech Solutions Security and Security Permissions Lesson Nine.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
1 Introduction to NTFS Permissions Assign NTFS permissions to specify Which users and groups can gain access to folders and files What they can do with.
Understand Permissions LESSON Security Fundamentals.
1 Objectives Discuss File Services in Windows Server 2008 Install the Distributed File System in Windows Server 2008 Discuss and create shared file resources.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
FTP COMMANDS OBJECTIVES. General overview. Introduction to FTP server. Types of FTP users. FTP commands examples. FTP commands in action (example of use).
Sharing Resources Lesson 6. Objectives Manage NTFS and share permissions Determine effective permissions Configure Windows printing.
Upgrade on Windows 7. DownloadSoftware Download Software from link provided in Webliography: e/
19 Copyright © 2008, Oracle. All rights reserved. Security.
ITMT Windows 7 Configuration Chapter 6 – Sharing Resource ITMT 1371 – Windows 7 Configuration 1.
Introduction to NTFS Permissions
Active Directory Administration
Figure 6-13: Managing Permissions
Presentation transcript:

MA194Using WindowsNT1 Topics for the day… WindowsNT Security WindowsNT File System (NTFS) Viewing/Setting Document and Folder Permissions Access Control Lists & Entries

MA194Using WindowsNT2 General Security In general, WindowsNT was designed with an eye towards security, both from a network aspect as well as an individual or user account point of view. When you first log into a WindowsNT system (workstation or server), there are a series of checks that are performed by the system.

MA194Using WindowsNT3 Internal vs. External Security Security can be broken into two areas, internal and external. By external, we refer to the set of security issues that deal with networked environments. User authentication, machine and domain relationships and trusts and user profile storage come into play here. To better understand these, we would need to look at the NT approach networking first. Today, we’ll instead look at the internal security issues.

MA194Using WindowsNT4 Internal security issues User identity verification –The operating system must have some way of uniquely identifying you from another user –The operating system also needs a way to insure that it IS you and not someone else Filesystem permissions –Controlling access to various documents, programs and functions of the system you use

MA194Using WindowsNT5 Steps taken to try to login CTRL-ALT-DEL brings up login window User account and password are entered User’s input is passed to the Security Account Manager (SAM) SAM looks up entry in the Security Accounts Database (SAD) System returns an access token for the user or an error message indicating failure.

MA194Using WindowsNT6 Steps taken after login The system creates a process for the user and associates the access token to it and starts up the initial programs for the user. The access token contains the information the system will use to grant or deny access to various files, programs and functions. Thus, getting the access token right is a must.

MA194Using WindowsNT7 Access Token information User’s ID (SID) - Assigns a user’s ID for this token. Group ID (GID) - Lists the groups to which the user belongs. Privileges - System functions the user is allowed to do (print queues, backups, etc) Primary group - Default entry of GIDs Default ACL

MA194Using WindowsNT8 Object Permissions An object (a file, program, folder, printer, etc.) has a list of permissions associated with it that determines who has the ability to access, use or modify the object. Each entry in the list is called an Access Control Entry (ACE). All of the entries are collectively known as an Access Control List (ACL).

MA194Using WindowsNT9 Assigning Permissions Assigning permissions to a file, for example, means generating an ACL and listing who has permission to do what to the file. The who part of an ACL may be a user or a group (of users), whichever youi prefer. The what part of the ACL is a little trickier.

MA194Using WindowsNT10 Users vs. Groups For easier administration, a list of users can be put into a group and permissions assigned to the group instead of each individual user. As a result, each user (account) belongs to at least one group. Often, a user will be assigned to several groups, based on the administrator’s preference, the common tasks and resources for some users, etc.

MA194Using WindowsNT11 File Access Permissions Read - Access or view the file contents Write - Modify the contents of the file Execute - Execute (that is, run) the program Delete - Delete the file (different than write) Change Permissions - Change these Take Ownership - Change the owner to you

MA194Using WindowsNT12 File Access Types No Access - Nothing is granted (El Zilcho) Read - Actually allows Read and Execute Change - Read, Write, Execute and Delete Full - Everything listed in the previous slide Certain sets of permissions are commonly used and, as a result, are listed as Access Types in a pull down menu. They are:

MA194Using WindowsNT13 Folder Access Types No Access - Nothing is granted (El Zilcho) List - Actually allows Read and Execute Read - Same as list but may include the files within the directory as well. Add - Write and Execute Add & Read - Read, Write, Execute. It may also includes the files within the folder. Change - Read, Write, Execute and Delete Full - Everything listed in the previous slide

MA194Using WindowsNT14 Setting a file’s permissions Bring up the file’s Permissions Screen –Highlight the file (left mouse click) –Bring up the Properties screen (right click) –Choose Security (left click on tab) –Choose Permissions Choose either a group or an individual user Select the Access Type or choose Special to set the permissions individually.

MA194Using WindowsNT15 Notes about file permissions If the Security tab doesn’t show up in the Properties section, the filesystem may not be an NTFS (that is, it doesn’t support the security features of NTFS) If clicking on the Security tab results in an error message (“Access Denied” or “Nice Try, Shnookums”), that means the ACL denies you access to the file.

MA194Using WindowsNT16 Steps taken to open an object WindowsNT has bundled security throughout the levels of the OS. The Security Reference Monitor (SRM), besides sounding important, is in charge of verifying/granting access to files, directories, etc. The first time you access a file, the system checks with the SRM first. The SRM checks the access token against the ACL for the object and either grants or denies access to the object.

MA194Using WindowsNT17 Fun HTTP sites Choose ‘Danews’ from the top The IRS Home page (it’s that time again)

MA194Using WindowsNT18 Resolving access conflicts What if a user is granted access but the group they belong to is denied access? Or if the user belongs to ten groups, nine of which has access and one of which doesn’t? Denied. NT checks the ‘Deny’ list first and stops looking as soon as it finds a hit.