Understanding Workgroups and Active Directory Lesson 3.

Slides:



Advertisements
Similar presentations
Managing User, Computer and Group Accounts
Advertisements

Chapter Five Users, Groups, Profiles, and Policies.
By Rashid Khan Lesson 5-Directory Assistance: Administration Using Active Directory Users and Computers.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
6.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 6: Configure and Troubleshoot Local User and Group Accounts.
12.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
5.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
Administering Active Directory
Hands-On Microsoft Windows Server 2003 Administration Chapter 3 Administering Active Directory.
Chapter 4 Introduction to Active Directory and Account Management
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
7.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 7: Introducing Group Accounts.
11 MANAGING USERS AND GROUPS Chapter 13. Chapter 13: MANAGING USERS AND GROUPS2 OVERVIEW  Configure and manage user accounts  Manage user account properties.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
Understanding Active Directory
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
Authentication, Authorization and Accounting
11 WORKING WITH USER ACCOUNTS Chapter 6. Chapter 6: WORKING WITH USER ACCOUNTS2 CHAPTER OVERVIEW Understand the differences between local user and domain.
70-270: MCSE Guide to Microsoft Windows XP Professional Chapter 5: Users, Groups, Profiles, and Policies.
Working with Workgroups and Domains
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
September 18, 2002 Introduction to Windows 2000 Server Components Ryan Larson David Greer.
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
6.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 6: Administering User Accounts.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
Chapter 7: WORKING WITH GROUPS
Designing Active Directory for Security
Windows Server 2003 Overview 1 Windows 2003 Server Overview Ayaz
Security Planning and Administrative Delegation Lesson 6.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Managing Groups, Folders, Files and Security Local Domain local Global Universal Objects Folders Permissions Inheritance Access Control List NTFS Permissions.
1 Chapter Overview Configuring Account Policies Configuring User Rights Configuring Security Options Configuring Internet Options.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
September 18, 2002 Windows 2000 Server Active Directory By Jerry Haggard.
Active Directory Administration Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Creating Users, Computers, and Groups Automate creation.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
70-270: MCSE Guide to Microsoft Windows XP Professional 1 Windows XP Professional User Accounts Designed for use as a network client for: Windows NT Windows.
Introduction to Microsoft Management Console (MMC) MMC is a common console framework for management applications. MMC provides a common environment for.
1 Chapter Overview Publishing Resources in Active Directory Service Redirecting Folders Using Group Policies Deploying Applications Using Group Policies.
1 Administering Shared Folders Understanding Shared Folders Planning Shared Folders Sharing Folders Combining Shared Folder Permissions and NTFS Permissions.
 Identify Active Directory functions and Benefits.  Identify the major components that make up an Active Directory structure.  Identify how DNS relates.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
Working with Workgroups and Domains Lesson 9. Objectives Understand users and groups Create and manage local users and groups Understand the difference.
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
By Rashid Khan Lesson 6-Building a Directory Service.
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 21 Administering User Accounts and Groups 1.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
NetTech Solutions Supporting Local Users and Groups Lesson Three.
Administering Groups Chapter Eight. Exam Objectives In this Chapter:  Plan a security group hierarchy based upon delegation requirements  Plan a security.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
OVERVIEW OF ACTIVE DIRECTORY
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
1 Chapter Overview Using Group Objects Understanding Default Groups Creating Group Objects Managing Administrative Access.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Unit 7 ITT TECHNICAL INSTITUTE NT1330 Client-Server Networking II Date: 2/3/2016 Instructor: Williams Obinkyereh.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Essential Services Lesson 5. Objectives Naming Resolution In today’s networks, you assign logical addresses, such as with IP addressing. Unfortunately,
Authentication, Authorization and Accounting Lesson 2.
Active Directory Administration
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
Security Planning and Administrative Delegation
Presentation transcript:

Understanding Workgroups and Active Directory Lesson 3

Objectives 2

Workgroup A workgroup is usually associated with a peer-to-peer network where user accounts are decentralized and stored on each individual computer. Since each computer has its own security database, when you have several users that need access to the computer (while requiring unique username and passwords), you will need to create a user account for each user on the computer. 3

Authentication Authentication is the process of identifying an individual, usually based on a username and password. After a user is authenticated, users can access network resources based on the user’s authorization. 4

Authorization and Auditing Authorization is the process of giving individuals access to system objects based on their identity. Auditing is the process of keeping track of a user’s activity while accessing the network resources, including the amount of time spent in the network, the services accessed while there and the amount of data transferred during the session. 5

Authentication Methods A user can authenticate using one or more of the following methods: –What they know: Such as using a password or Personal Identity Number (PIN). –What they own or possess: Such as a passport, smart card, or ID card. –What a user is: Usually using biometric factors based on fingerprints, retinal scans, voice input, or other forms. 6

Password The most common method of authentication with computers and networks is the password. A password is a secret series of characters that enables a user to access a file, computer, or program. To make a password more secure, you need to choose a password that nobody can guess. Therefore, it should be long enough and considered a complex or strong password. 7

Complex Password Cannot contain the user’s account name or parts of the user’s full name that exceed two consecutive characters. Must be at least six characters in length or the number of characters specified in the Minimum password length policy setting. Must contain characters from at least three of the following four categories: English uppercase alphabet characters (A–Z), English lowercase alphabet characters (a–z), base-10 digits (0–9), and non-alphanumeric characters (for example, !$#,%). 8

User Account A user account enables a user to log on to a computer and domain. As a result, it can used to prove the identity of a user, which can then be used to determine what a user can access and what kind of access a user will have (authorization). It can be used for auditing so that if there is a security problem where something was accessed or deleted, it can be determined who accessed or deleted the object. 9

User Account On today’s Windows networks, there are two types of user accounts: –The local user account –The domain user account 10

Local User Account A local user account allows a user to log on and gain access to the computer where the account was created. The security table located on the local computer that stores the local user account is known as the Security Account Manager (SAM) database. 11

User Accounts There are three types of user accounts and each provides the user with different levels of control over the computer. –Administrator –Standard –Guest 12

User Accounts Windows 7 provides two separate interfaces for creating and managing local user accounts: –User Accounts in the Control Panel –Local Users and Groups MMC snap-in Both of these interfaces provide access to the same user and group accounts stored in the SAM, so any changes you make using one interface will appear in the other. 13

User Accounts Control Panel 14

Local Users and Groups Snap-in 15

Local Users and Groups Snap-in 16

User Profile A user profile, which is a collection of folders and data that store the user’s current desktop environment and application settings, is associated with each user account. A user profile also records all network connections that are established so when a user logs on to a computer, it will remember the mapped drives to shared folders. When a user logs on to a computer, they will get the same desktop environment that they previously had on the computer. For Windows 7, the profiles are stored in the C:\Users folder. 17

Credential Manager Credential Manager allows you to store credentials, such as usernames and passwords that you use to log on to websites or other computers, on a network. By storing your credentials, Windows can automatically log you on to websites or other computers. Credentials are saved in special folders on your computer called vaults. Windows and programs (such as web browsers) can securely give the credentials in the vaults to other computers and websites. 18

Active Directory A directory service stores, organizes, and provides access to information in a directory. It is used for locating, managing, administering, and organizing common items and network resources, such as volumes, folders, files, printers, users, groups, devices, telephone numbers, and other objects. A popular directory service used by many organizations is Microsoft’s Active Directory. 19

Active Directory Active Directory is a technology created by Microsoft that provides a variety of network services, including: –Lightweight Directory Access Protocol (LDAP) –Kerberos-based and single sign-on (SSO) authentication –DNS-based naming and other network information –Central location for network administration and delegation of authority Active Directory is often a key component in authentication, authorization, and auditing. 20

Domain a Windows domain is a logical unit of computers and network resources that defines a security boundary. Different from the local security database that was previous discussed, a domain uses a single Active Directory database to share its common security and user account information for all computers within the domain. 21

Domain Controller While domains, trees, and forests are logical representation of your organization, sites and domain controllers represent the physical structure of your network. A domain controller is a Windows server that stores a replica of the account and security information of the domain and defines the domain boundaries. A server that is not running as a domain controller is known as a member server. 22

Active Directory Consoles Several MMC snap-in consoles to manage Active Directory: –Active Directory Users and Computers –Active Directory Domains and Trusts –Active Directory Sites and Services –Active Directory Administrative Center –Group Policy Management Console (GPMC) 23

Finding a Domain Controller When a user logs on, Active Directory clients locate an Active Directory server (using the DNS SRV resource records) known as a domain controller in the same site as the computer. If you receive an error message saying that it cannot locate a domain controller or you get a “RPC Server Unavailable” message, you should make sure you are pointing to the correct DNS server and that the DNS server has the correct SRV resource records for the domain controllers. 24

Organizational Units To help organize objects within a domain and minimize the number of domains, you can use organizational units, commonly seen as OU. OUs can be used to hold users, groups, computers, and other organizational units. An organizational unit can only contain objects that are located in a domain. 25

Delegating Administration By delegating administration, you can assign a range of administrative tasks to the appropriate users and groups. You can assign basic administrative tasks to regular users or groups, and leave domain-wide and forest- wide administration to members of the Domain Admins and Enterprise Admins groups. You also help secure your network from accidental or malicious damage by limiting the membership of administrator groups. 26

Active Directory Objects An object is a distinct, named set of attributes or characteristics that represents a network resource. Common objects used within Active Directory are computers, users, groups, and printers. 27

Active Directory Objects Active Directory objects are assigned a 128- bit unique number called a globally unique identifier (GUID), sometimes referred to as security identifier (SID) to uniquely identify an object. If a user changes his or her name, you can change the name and he or she will still be able to access all objects and have all of the rights as before since those rights are assigned to the GUID. 28

Domain User A domain user account is stored on the domain controller and allows you to gain access to resources within the domain, assuming you have been granted the permissions needed to access those objects. The administrator domain user account is the only account that is created and enabled by default in Windows when you first create a domain. While the administrator domain user account cannot be deleted, it can be renamed. 29

Domain User 30

Domain User 31

Domain User 32

Computer Account Like user accounts, Windows computer accounts provide a means for authenticating and auditing the computer’s access to a Windows network and its access to domain resources. Each Windows computer to which you want to grant access to resources must have a unique computer account. It can also be used for auditing purposes specifying what system was used when something was accessed. 33

Computer Account Like user accounts, computer accounts are assigned passwords when the computer is added to the domain, and those passwords are automatically maintained between the computer and the domain controllers. Unfortunately, from time to time, a computer account can become untrusted where the security identifier (SID) or password is different from those stored in Active Directory. –Unfortunately, you cannot reset the password. Instead, the best thing to do is to rejoin the computer to the domain. 34

Groups A group is a collection or list of user accounts or computer accounts. Different from a container, the group does not store the user or computer, it just lists them. The advantage of using groups is to simplify administration, especially when assigning rights and permissions. 35

Groups Any group, whether it is a security group or a distribution group, is characterized by a scope that identifies the extent to which the group is applied in the domain tree or forest. The three group scopes are: –Domain Local group –Global group –Universal group 36

Group Policies Group Policy is one of the most powerful features of Active Directory that controls the working environment for user accounts and computer accounts. Group Policy provides the centralized management and configuration of operating systems, applications, and users’ settings in an Active Directory environment. 37

Group Policies Group policies can be set locally on the workstation or can be set at different levels (site, domain, or organizational unit) within Active Directory. Group policies are applied in the following order: 1.Local 2.Site 3.Domain 4.OU 38

Group Policies 39

Rights When specifying what a user can do on a system or to a resource is determined by two things: rights and permissions. A user right authorizes a user to perform certain actions on a computer such as logging on to a system interactively or backing up files and directories on a system. User rights are assigned through local policies or Active Directory group policies. 40

Group Policies 41

Permission A permission defines the type of access that is granted to an object (an object can be identified with a security identifier) or object attribute. The most common objects assigned permissions are NTFS files and folders, printers and Active Directory objects. To keep track of which user can access an object and what the user can do is record in the access control list (ACL) which lists all users and groups that have access to the object. 42

Account Lockout Policy An Account Lockout Policy specifies the number of unsuccessful logon attempts that, if made within a pre-defined amount of time, may hint of an unauthorized person trying to access a computer or the network. An Account Lockout Policy can be set to lock the account in question after a specified number of invalid attempts. Additionally, the policy specifies the duration that the account remains locked. 43

Account Lockout Policy 44

Password Control Group policies can be used to control passwords including how often a user changes a password, how long the password is, and if the password is a complex password. To help manage passwords, you can configure settings in the Computer Configuration\Windows Settings\Security Settings\Account Policies\Password Policy node of a group policy. 45

Password Control 46

Auditing It is important that you protect your information and service resources from people who should not have access to them, and at the same time make those resources available to authorized users. Auditing is not enabled by default. To enable auditing, you specify what types of system events to audit using group policies or the local security policy (Security Settings\Local Policies\Audit Policy). 47

Auditing 48

Auditing To audit NTFS files, NTFS folders, and printers is a two-step process. You must first enable Object Access using group policies. Then you must specify which objects you want to audit. 49

Troubleshooting Authentication Issues Authentication issues are a common problem that everyone has to deal with. The simplest and easiest mistake for users is forgetting their password, which then needs to be reset. A common but easy mistake to make when typing a username or password is to have the caps lock or num lock key on. 50

Troubleshooting Authentication Issues Other items that you should check include: –When typing in your username and password, always check the caps lock and num lock keys first. –Make sure you have the correct language defined and that the keyboard is operating fine where all of the buttons click properly. –If the time is off, authentication can fail. –If your computer is no longer part of the domain or is no longer trusted, you will not be able to log in to the domain. 51

Skill Summary A workgroup is usually associated with a peer-to-peer network in which user accounts are decentralized and stored on each individual computer. When you create a local user account on a computer running Windows 7, it is stored in the Security Accounts Manager (SAM). SAM is a database stored as a registry file. A user account enables a user to log on to a computer and domain. As a result, it can be used to prove the identity of a user, which can then be used to determine what a user can access and what kind of access a user will have (authorization). 52

Skill Summary Associated with a user account is the user profile, which is a collection of folders and data that store the user’s current desktop environment and application settings. Credential Manager allows you to store credentials, such as usernames and passwords that you use to log on to websites or other computers on a network. 53

Skill Summary Authentication is the process of identifying an individual, usually based on a username and password. After a user is authenticated, users can access network resources based on the user’s authorization. Authorization is the process of giving individuals access to system objects based on their identity. Auditing is the process of keeping track of a user’s activity while accessing the network resources, including the amount of time spent in the network, the services accessed while there, and the amount of data transferred during the session. 54

Skill Summary Active Directory is a directory service and technology created by Microsoft that provides a variety of network services, including LDAP, Kerberos-based and single sign-on authentication, DNS-based naming, and other network information, as well as a central location for network administration and delegation of authority. 55

Skill Summary A Windows domain is a logical unit of computers and network resources that define a security boundary. A domain uses a single Active Directory database to share its common security and user account information for all computers within the domain, allowing centralized administration of all users, groups, and resources on the network. 56

Skill Summary A server that is not running as a domain controller is known as a member server. A domain controller is a Windows server that stores a replica of the account and security information of the domain and defines the domain boundaries. To help organize objects within a domain and minimize the number of domains, you can use organizational units (OUs). 57

Skill Summary A server that is not running as a domain controller is known as a member server. A domain controller is a Windows server that stores a replica of the account and security information of the domain and defines the domain boundaries. To help organize objects within a domain and minimize the number of domains, you can use organizational units (OUs). 58

Skill Summary Like user accounts, Windows computer accounts provide a means for authenticating and auditing the computer’s access to a Windows network and its access to domain resources. A group is a collection or list of user accounts or computer accounts. Group Policy provides the centralized management and configuration of operating systems, applications and users’ settings in an Active Directory environment. 59

Skill Summary A user right authorizes a user to perform certain actions on a computer such as logging on to a system interactively or backing up files and directories on a system. A permission defines the type of access that is granted to an object (an object can be identified with a security identifier) or object attribute. 60

Skill Summary An Account Lockout Policy specifies the number of unsuccessful logon attempts that, if made within a pre-defined amount of time, may hint of an unauthorized person trying to access a computer or the network. To help protect against someone guessing a user’s login password, users should change their passwords regularly. 61