Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 14 – Windows Security.

Slides:



Advertisements
Similar presentations
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Advertisements

11 CONFIGURING AND MANAGING SHARED FOLDER SECURITY Chapter 8.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
1 Distributed File System, and Disk Quotas (Week 7, Thursday 2/21/2007) © Abdou Illia, Spring 2007.
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
Network Printing. Printer sharing Saves money by only needing one printer Increases efficiency of managing resources.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
Unit 11 - Computer Networks Assignment B: Design a Computer Network
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
1 Using Compressed Files and Folders Applications and operating systems read and write to compressed files. NTFS uncompresses the file before making it.
Microsoft ® Official Course Module 7 Configuring File Access and Printers on Windows ® 8 Clients.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
MS System Setup Securing A System. Use Automatic Updates For a workstation or server, schedule the updates to occur regularly. –Control panel click on.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Chapter 4: Operating Systems and File Management 1 Operating Systems and File Management Chapter 4.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 21 – Control Panel Managers.
1 Chapter Overview Planning an Audit Policy Implementing an Audit Policy Using Event Viewer.
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 7: Advanced File System Management.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 7: Advanced File System Management.
1/28/2010 Network Plus Windows Networking Network Identification Identifies name and type of network. Installed adapters –Performed during Windows installation.
C HAPTER 6 NTFS PERMISSIONS & SECURITY SETTING. INTRODUCTION NTFS provides performance, security, reliability & advanced features that are not found in.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 5 Windows XP Professional McGraw-Hill.
Hands-On Microsoft Windows Server 2008 Chapter 5 Configuring, Managing, and Troubleshooting Resource Access.
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 4 Microsoft Windows XP.
IOS110 Introduction to Operating Systems using Windows Session 8 1.
Managing Groups, Folders, Files and Security Local Domain local Global Universal Objects Folders Permissions Inheritance Access Control List NTFS Permissions.
Module 7: Managing the User Environment by Using Group Policy.
1 Administering Shared Folders Understanding Shared Folders Planning Shared Folders Sharing Folders Combining Shared Folder Permissions and NTFS Permissions.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
Configuring Data Protection Chapter 12 powered by dj.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
Module 3: Configuring File Access and Printers on Windows 7 Clients
Chapter 8 Configuring and Managing Shared Folder Security.
Ch 17 Securing the File System. Three Ways to Protect Files NTFS Permissions Encrypting File Service BitLocker full-disk encryption – BitLocker ToGo.
Minimizing your vulnerabilities. Lets start with properly setting up your servers which includes… Hardening your servers Setting your file and folder.
NetTech Solutions Supporting Users and Troubleshooting Desktop Applications on Microsoft Windows XP Instructor Richard Fredrickson.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 6 Implementing Infrastructure Controls.
1 Introduction to Auditing Auditing allows you to track User activities. Microsoft Windows 2000 activities. Windows 2000 records events in the security.
Module 5: Configuring and Managing File Systems. Overview Working with File Systems Managing Data Compression Securing Data by Using EFS.
Managing Applications, Services, Folders, and Libraries Lesson 4.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
1 Introduction to NTFS Permissions Assign NTFS permissions to specify Which users and groups can gain access to folders and files What they can do with.
Module 4: Managing Access to Resources. Overview Overview of Managing Access to Resources Managing Access to Shared Folders Managing Access to Files and.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 6 Today’s Windows Windows Vista and Windows 7 McGraw-Hill.
Lesson 18: Configuring Security for Mobile Devices MOAC : Configuring Windows 8.1.
Module 11: Managing Data Storage. Overview Managing File Compression Configuring File Encryption Configuring EFS Recovery Agents Implementing Disk Quotas.
Module 4: Managing Access to Resources. Overview Overview of Managing Access to Resources Managing Access to Shared Folders Managing Access to Files and.
1 Chapter Overview Understanding Shared Folders Planning, Sharing, and Connecting to Shared Folders Combining Shared Folder Permissions and NTFS Permissions.
1 Chapter Overview Monitoring Access to Shared Folders Creating and Sharing Local and Remote Folders Monitoring Network Users Using Offline Folders and.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 44 – Exploring Network Properties.
1 Introduction to Shared Folders Shared folders provide network users access to files. Users connect to the shared folder over the network. Users must.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Introduction to Networking.
Joe Knight’s Company VPN Policy. What is VPN? Virtual Private Network (VPN) will allow you all as users to remote into the network from home or anywhere.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
11 SUPPORTING WINDOWS XP FILE AND FOLDER ACCESS Chapter 5.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
Mesa Wi-Fi 802.1x PEAP and EAP-TLS Authentication for Wi-Fi.
HARDENING CLIENT COMPUTERS
Using a Computer Network
Bethesda Cybersecurity Club
How To Password Protect A PDF Free With or Without Acrobat.
Presentation transcript:

Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 14 – Windows Security

2 Objectives At the end of this presentation, you will be able to:

3 Define shares, permissions, and rights as the terms apply to computer resources. Demonstrate how to share a computer resource using Windows. Define encryption and discuss several common sense rules for using encryption. Demonstrate how to encrypt a file using Windows.

4 Shares, Permissions, and Rights Share: A file or folder publicly posted on a network for access by anyone on the network. Permission: Controlling access to shared resources. Rights: The authorization with which a user is entitled to perform certain actions on a computer network.

5 Before Sharing can occur: You must have a network connection installed and configured. You must have File and Printer Sharing for Microsoft Networks installed.

7

8

11

12 Non-Shared Folder Icon Versus Shared Folder Icon Shared Not Shared

13 Share Permissions Share Permissions do not affect local users Share Permissions control access from the network

14 Share Permissions

15

16 Share Permissions Access Local and Network Users Local and Network Users Network Users Network Users The Local PC NTFS Permissions Files and Folders

17 Windows isn’t completely secure… NTFS volumes may be opened with special software tools These tools are useful after crashes or virus attacks Files are vulnerable!

18 Encryption Encryption is optional Encryption is transparent to the creator of the encrypted object Only NTFS volumes support encryption

20

21 Encryption Issues Encryption is lost if a file is moved or copied to a FAT/FAT32 volume Encrypted files can be viewed, moved, deleted, or renamed Save the recovery certificate on a removable disk

22 Encryption Suggestions Don’t encrypt the operating system files!

23 Encryption Suggestions Don’t encrypt My Documents!

24 Encryption Suggestions Encrypt Folders, not just files. Make the encryption obvious

25 Encryption Suggestions Use encryption along with a strict account policy

26 Encryption Suggestions Export the Recovery Certificate

27 Encryption Suggestions If you plan to use encryption, study the subject and become an encryption expert.

28 Security summary Accounts and Passwords Rights and permissions Encryption Recovery Certificates

Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals End