Lesson 14: Configuring File and Folder Access. MOAC 70-687: Configuring Windows 8.1



Similar documents
Objectives. At the end of this chapter students should be able to:

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

SHARING FILE SYSTEM RESOURCES

Managing and Maintaining a Microsoft Windows Server 2003 Environment

How to Enable the Audit of Active Directory Objects in Windows 2008 R2 Lepide Software

NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment

Create, Link, or Edit a GPO with Active Directory Users and Computers

File systems security: Shared folders & NTFS permissions, EFS Disk Quotas

Deploying a File Server Lesson 2

PLANNING AND DESIGNING GROUP POLICY, PART 1

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide

HP LeftHand SAN Solutions

NTP Software QFS for NAS, Hitachi Edition

Introduction. Activating the CFR Module License. CFR Configuration

Enabling Backups for Windows and MAC OS X

Advanced Audit Policy Configurations for LT Auditor+ Reference Guide

Exam : Administrating Windows Server 2012 R2. Course Overview

RMFT Outlook Add-In User Guide

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

How to Create a Delegated Administrator User Role / To create a Delegated Administrator user role Page 1

6419: Configuring, Managing, and Maintaining Server 2008

CommVault Galaxy 5.0 Using PS Series Groups and Auto-Snapshot Manager

Find the Who, What, Where and When of Your Active Directory

NTFS permissions represent a core part of Windows s security system. Using

Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:

Deploying and Managing a Public Key Infrastructure

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates

DriveLock and Windows 8

Security IIS Service Lesson 6

How To - Implement Clientless Single Sign On Authentication with Active Directory

HP ProtectTools Embedded Security Guide

Xcalibur. Foundation. Administrator Guide. Software Version 3.0

Combining Shared Folder and NTFS Permissions

Sharpdesk V3.5. Push Installation Guide for system administrator Version

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

Configuring Managing and Maintaining Windows Server 2008 Servers (6419B)

StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec

Administrator s Plus. Backup Process. A Get Started Guide

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Web. Security Options Comparison

Instant Medical History QuickStart

ATX Document Manager. User Guide

Audit Policy Subcategories

BIGPOND ONLINE STORAGE USER GUIDE Issue August 2005

Xcalibur Global Version 1.2 Installation Guide Document Version 3.0

Security Explorer 9.5. About Security Explorer 9.5. New features. June 2014

Exchange Outlook Profile/POP/IMAP/SMTP Setup Guide

Lesson Plans Administering Security in a Server 2003 Network

Understand Troubleshooting Methodology

Windows Server 2008/2012 Server Hardening

Group Policy 21/05/2013

DeviceLock Management via Group Policy

StarWind iscsi SAN Software: Using StarWind with MS Cluster on Windows Server 2008

White Paper. PCI Guidance: Microsoft Windows Logging

BACKUP & RESTORE (FILE SYSTEM)

Entrust Managed Services PKI

Quest ChangeAuditor 5.1. For Windows File Servers. Events Reference

CMT Self-Service Archive Migrator 1.2. Comprehensive User Guide

Job Scheduler User Guide IGSS Version 11.0

Microsoft Windows 7. Administration. Instant Reference. William Panek WILEY. Wiley Publishing, Inc.

Copyright

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Online Sharing User Manual

How To Write A Gpmc Script For A Gpc (Windows 2003) On A Windows 2000 (Windows 2000) On Your Computer Or Your Computer (Windows 3) On An Ipad Or Ipad (Windows 2) On The Macbook

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

RMFT Event Viewer Messages

How To Implement A Group Policy Object (Gpo)

Installation Guide - Client. Rev 1.5.0

Public Key Infrastructure for a Higher Education Environment

WS_FTP Server. User s Guide. Software Version 3.1. Ipswitch, Inc.

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Windows Server 2008 (Domain Member Servers and Domain Controllers)

VERITAS Backup Exec TM 10.0 for Windows Servers

Parallels Transporter Agent

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control

ITTEST QUESTION & ANSWER. Guías de estudio precisos, Alta tasa de paso!

This section discusses the protocols available for volumes on Nasuni Filers.

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

AV-006: Installing, Administering and Configuring Windows Server 2012

MCSE Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

User Guidance. CimTrak Integrity & Compliance Suite

PigCHAMP Knowledge Software. Enterprise Edition Installation Guide

User Guide. SysMan Utilities. By Sysgem AG

Configuring, Managing and Maintaining Windows Server 2008 Servers

Configuring, Managing and Maintaining Windows Server 2008 Servers

Migrating Your Windows File Server to a CTERA Cloud Gateway. Cloud Attached Storage. February 2015 Version 4.1

HP External Hard Disk Drive Backup Solution by Seagate User Guide. November 2004 (First Edition) Part Number

NTP Software File Auditor for NAS, EMC Edition

9 Administering Shared Folders

EPM Performance Suite Profitability Administration & Security Guide


NetVault : Backup. for Exchange Server. Recovery Manager Integration Guide. Application Plugin Module (APM) version 4.5 MEG

Citrix Access Gateway Plug-in for Windows User Guide

How to Connect to Berkeley College Virtual Lab Using Windows

Configuring, Managing and Maintaining Windows Server 2008 Servers

ACE STUDY GUIDE. 3. Which Imager pane shows information specific to file systems such as HFS+, NTFS, and Ext2? - Properties Pane

Active Directory. Users & Computers. Group Policies

SQL Server Hardening

Transcription:

Lesson 14: Configuring File and Folder Access MOAC 70-687: Configuring Windows 8.1

Overview Exam Objective 4.2: Configure file and folder access o Encrypt files and folders by using Encrypting File System (EFS) o Configure NTFS permissions o Configure disk quotas o Configure file access auditing 2013 John Wiley & Sons, Inc. 2

Security Principal: Managing Permissions Lesson 14: Configuring File and Folder Access 2013 John Wiley & Sons, Inc. 3

Permissions Permissions are privileges granted to specific system entities, such as users, groups, or computers, enabling them to perform a task or access a resource. As an administrator, you should be familiar with the operation of the following four permission systems: o NTFS permissions o Share permissions o Registry permissions o Active Directory permissions 2013 John Wiley & Sons, Inc. 4

Understanding the Windows Permission Architecture To store permissions, each of these elements has an access control list (ACL). An ACL is a collection of individual permissions, in the form of access control entries (ACEs). To manage permissions in Windows 8.1, you use the controls in the Security tab of the element s Properties dialog box with the security principals listed at the top and the permissions associated with them at the bottom. 2013 John Wiley & Sons, Inc. 5

Understanding the Windows Permission Architecture The Security tab of a Properties dialog box 2013 John Wiley & Sons, Inc. 6

Understanding Basic and Advanced Permissions When you open the Properties dialog box for a system element and look at its Security tab, the permissions you are seeing are called basic permissions. Basic permissions are combinations of advanced permissions, which provide the most granular control over the element. 2013 John Wiley & Sons, Inc. 7

Understanding Basic and Advanced Permissions The Advanced Security Settings dialog box 2013 John Wiley & Sons, Inc. 8

Allowing and Denying Permissions When you assign permissions to a system element, you are, in effect, creating a new ACE in the element s ACL. There are two basic types of ACEs: o Allow o Deny This makes it possible to approach permission management tasks from two directions: o Additive o Subtractive 2013 John Wiley & Sons, Inc. 9

Inheriting Permissions The most important principle in permission management is that permissions tend to run downwards through a hierarchy. The tendency of permissions to flow downwards through a file system or other hierarchy is called permission inheritance. Permission inheritance means that parent elements pass their permissions down to their subordinate elements. 2013 John Wiley & Sons, Inc. 10

Inheriting Permissions A sample xfer directory structure 2013 John Wiley & Sons, Inc. 11

Inheriting Permissions Granting Allow permissions to the xfer folder 2013 John Wiley & Sons, Inc. 12

Inheriting Permissions Granting Full Control to individual user folders 2013 John Wiley & Sons, Inc. 13

Copying NTFS Files and Folders When you copy NTFS files or folders from one location to another, whether the destination is on the same or a different NTFS volume, the new copy does not take the permissions from its original location with it. Instead, the new copy new inherits permissions from its parent folder at the new location. 2013 John Wiley & Sons, Inc. 14

Moving NTFS Files and Folders If you move files or folders to a new location on the same NTFS volume, their existing permissions move with them. If you move files or folders to a different volume, they leave their existing permissions behind and inherit permissions from the parent folder at the new location. 2013 John Wiley & Sons, Inc. 15

Understanding Effective Access Effective access is the combination of Allow permissions and Deny permissions that a security principal receives for a given system element, whether explicitly assigned, inherited, or received through a group membership. 2013 John Wiley & Sons, Inc. 16

Understanding Effective Access The Effective Access tab of the Advanced Security Settings dialog box 2013 John Wiley & Sons, Inc. 17

Managing NTFS Permissions New Technology File System (NTFS), the primary Windows file system, is required to implement various security and administrative features in Windows. NTFS permissions are available to drives formatted with NTFS. The advantage with NTFS permissions is that they affect local users as well as network users and they are based on the permission granted to each individual user at the Windows logon, regardless of where the user is connecting. 2013 John Wiley & Sons, Inc. 18

Assigning Basic NTFS Permissions Most Windows system administrators work with basic NTFS permissions almost exclusively. This is because there is no need to work directly with advanced permissions for most common access control tasks. 2013 John Wiley & Sons, Inc. 19

Assign Basic NTFS Permissions The Permissions for Test Folder dialog box 2013 John Wiley & Sons, Inc. 20

Assign Advanced NTFS Permissions The Permission Entry for Test Folder dialog box 2013 John Wiley & Sons, Inc. 21

Using Icacls.exe Using Icacls.exe, you can grant or revoke basic or advanced permissions by allowing or denying them to specific security principals. The syntax for granting permissions is: icacls.exe filespec /grant[:r] security_id:(permissions) [/T][/C][/L][/Q] 2013 John Wiley & Sons, Inc. 22

Understanding Resource Ownership Every file and folder on an NTFS drive has an owner. The owner can always modify the permissions for the file or folder, even if the owner has no permissions. By default, the owner of a file or folder is the user account that created it. However, any account possessing the Take Ownership advanced permission (or the Full Control basic permission) can take ownership of the file or folder. 2013 John Wiley & Sons, Inc. 23

Using the Encrypting File System Lesson 14: Configuring File and Folder Access 2013 John Wiley & Sons, Inc. 24

Encrypting File System (EFS) The EFS is a feature of NTFS that encodes the files on a computer so that even if an intruder can obtain a file, he or she will be unable to read it. The entire system is keyed to a specific user account, using the public and private keys that are the basis of the Windows public key infrastructure (PKI). The user who creates a file is the only person who can read it. 2013 John Wiley & Sons, Inc. 25

Encrypting a Folder with EFS In Windows 8.1, you can use File Explorer to encrypt or disable EFS on any individual files or folders, as long as they are on an NTFS drive. 2013 John Wiley & Sons, Inc. 26

Encrypt a Folder The Advanced Attributes dialog box 2013 John Wiley & Sons, Inc. 27

Determining Whether a File or Folder Is Encrypted Administrators commonly receive calls from users who are unable to access their files because they have been encrypted using EFS and the user is unaware of this fact. To resolve the problem, you must first determine whether their files are encrypted or not, and whether the user has the proper NTFS permissions. File Explorer displays the names of encrypted files in green, by default, but this setting is easily changed in the Folder Options dialog box. 2013 John Wiley & Sons, Inc. 28

Configuring Disk Quotas Lesson 14: Configuring File and Folder Access 2013 John Wiley & Sons, Inc. 29

NTFS Quotas NTFS quotas enable administrators to set a storage limit for users of a particular volume. Depending on how you configure the quota, users exceeding the limit can be denied disk space, or just receive a warning. The space consumed by individuals users is measured by the size of the files they own or create. 2013 John Wiley & Sons, Inc. 30

Configure Disk Quotas The Quota tab of a volume s Properties sheet 2013 John Wiley & Sons, Inc. 31

Configuring Object Access Auditing Lesson 14: Configuring File and Folder Access 2013 John Wiley & Sons, Inc. 32

Auditing Tracking events that take place on the local computer, a process referred to as auditing, is an important part of monitoring and managing activities on a computer running Windows 8.1. The Audit Policy section of a Group Policy object (GPO) enables administrators to log successful and failed security events, such as logons and logoffs, account access, and object access. You can use auditing to track both user activities and system activities. 2013 John Wiley & Sons, Inc. 33

Configuring Object Access Auditing Audit Policies in the Windows 8 Local Computer Policy 2013 John Wiley & Sons, Inc. 34

Audit Policy You must decide which computers, resources, and events you want to audit. The following guidelines can help you to plan your audit policy: o Audit only pertinent items. o Archive security logs to provide a documented history. o Configure the size of your security logs carefully. 2013 John Wiley & Sons, Inc. 35

Configure an Audit Policy The Properties sheet for a policy setting 2013 John Wiley & Sons, Inc. 36

Configure Files and Folders for Auditing The Auditing tab in a folder s Properties sheet 2013 John Wiley & Sons, Inc. 37

Lesson Summary Windows 8.1 has several sets of permissions, which operate independently of each other, including NTFS permissions, share permissions, registry permissions, and Active Directory permissions. NTFS permissions enable you to control access to files and folders by specifying just what tasks individual users can perform on them. The Encrypting File System (EFS) is a feature of NTFS that encodes the files on a computer so that even if an intruder can obtain a file, he or she will be unable to read it. NTFS quotas enable administrators to set a storage limit for users of a particular volume. Depending on how you configure the quota, users exceeding the limit can be denied disk space, or just receive a warning. 2013 John Wiley & Sons, Inc. 38

Copyright 2013 John Wiley & Sons, Inc.. All rights reserved. Reproduction or translation of this work beyond that named in Section 117 of the 1976 United States Copyright Act without the express written consent of the copyright owner is unlawful. Requests for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc.. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.