Presentation is loading. Please wait.

Presentation is loading. Please wait.

© Wiley Inc. 2006. All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.

Similar presentations


Presentation on theme: "© Wiley Inc. 2006. All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition."— Presentation transcript:

1 © Wiley Inc. 2006. All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition (70-294) Chapter 6: Planning Security for Active Directory

2 Active Directory Security 2 © Wiley Inc. 2006. All Rights Reserved. Permissions are assigned to AD objects. Through the use of permissions, you can control all aspects of network security.

3 Security Principals 3 © Wiley Inc. 2006. All Rights Reserved. User accounts Groups Computer accounts

4 Types of Groups 4 © Wiley Inc. 2006. All Rights Reserved. Security groups – considered security principals; can contain user accounts Distribution groups – not considered security principals; used only for sending e-mail In Windows 2000 native or Server 2003 functional level domains, you can convert security groups to or from distribution groups

5 Group Scope 5 © Wiley Inc. 2006. All Rights Reserved. Domain local – extends as far as the local machine Global – limited to a single domain Universal – can contain users from any domain within an AD forest

6 Limitations on Group Functionality in Mixed Level 6 © Wiley Inc. 2006. All Rights Reserved. Universal security groups are not available. Changing the scope of groups is not allowed. Group nesting is limited.

7 Native Mode Scope Changes 7 © Wiley Inc. 2006. All Rights Reserved. A domain local group can be changed to a universal group (only if the domain local group does not contain any other domain local groups) A global group can be changed to a universal group (only if the global group is not a member of any other global groups)

8 Built-in Local Groups 8 © Wiley Inc. 2006. All Rights Reserved. Account Operators Administrators Backup Operators Guests Print Operators Replicator Server Operators Users

9 Predefined Global Groups 9 © Wiley Inc. 2006. All Rights Reserved. Cert Publishers Domain Computers Domain Admins Domain Controllers Domain Guests Domain Users Enterprise Admins Group Policy Creator Owners Schema Admins

10 Foreign Security Principles 10 © Wiley Inc. 2006. All Rights Reserved. Allow you to grant permissions to users who reside in domains that are not part of the same forest Process is automatic and does not require intervention of systems administrators

11 Active Directory Object Permissions 11 © Wiley Inc. 2006. All Rights Reserved. Control Access Create Child Delete Child Delete Tree List Contents List Object Read Write

12 ACLs and ACEs 12 © Wiley Inc. 2006. All Rights Reserved. Access Control Lists (ACLs) exist for each object in Active Directory Access Control Entries (ACEs) exist for each ACL, define what a user or group can actually do with the resource

13 Delegating Control 13 © Wiley Inc. 2006. All Rights Reserved. Delegation is the process by which a higher-level security administrator assigns permissions to other users The Delegation of Control Wizard walks through the steps for selecting objects to delegate their permissions, and specifying the allowed permissions and the users who have them

14 Group Policy Security Setting Sections 14 © Wiley Inc. 2006. All Rights Reserved. Account Policies > Password Policy Account Policies > Account Lockout Policy Local Policies > Security Options

15 Smart Card Authentication 15 © Wiley Inc. 2006. All Rights Reserved. Smart cards store user certificate information in a magnetic strip Provide the system with a double- verification secure logon (smart card and accompanying PIN)

16 Security Configuration and Analysis Utility 16 © Wiley Inc. 2006. All Rights Reserved. Simplifies creation and application of security settings Can be used to create, modify, and apply security settings in the Registry through the use of security templates

17 Process for Security Configuration and Analysis 17 © Wiley Inc. 2006. All Rights Reserved. 1.Open or create a security database file 2.Import the existing template file 3.Analyze the local computer 4.Make any setting changes 5.Save any template changes 6.Export the new template (optional) 7.Apply the changes (optional)

18 Working with secedit.exe 18 © Wiley Inc. 2006. All Rights Reserved. Switches include: /analyze /configure /export /validate Has all the functionality of the Security Configuration and Analysis tool

19 Windows Server 2003 Auditing Steps 19 © Wiley Inc. 2006. All Rights Reserved. Configure the size and storage settings for the audit logs Enable categories of events to audit Specify which objects and actions should be recorded in the audit log

20 Main Auditing Categories 20 © Wiley Inc. 2006. All Rights Reserved. Audit account logon events Audit account management Audit directory service access Audit logon events Audit object access Audit policy change Audit privilege use Audit process tracking Audit system events


Download ppt "© Wiley Inc. 2006. All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition."

Similar presentations


Ads by Google