Network Administration and Support Chapter 10. 2 Learning Objectives Manage networked accounts Enhance network performance Create a network security plan.

Slides:



Advertisements
Similar presentations
Chapter Five Users, Groups, Profiles, and Policies.
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
1 Network Administration Network administration involves many areas:  Ensure network performs to specifications  Verify users can easily access resources.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 8: Troubleshooting Storage Devices and Display Devices.
6.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 11: Monitoring Server Performance.
12.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 10: Collect and Analyze Performance Data.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Chapter 16 Chapter 16: Troubleshooting. Chapter 16 Learning Objectives n Develop your own problem-solving strategy n Use the Event Viewer to locate and.
5.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 5: Working with File Systems.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
Chapter 8 Chapter 8: Managing the Server Through Accounts and Groups.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 5: User Environment and Multiple Languages.
Maintaining and Updating Windows Server 2008
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Network and Active Directory Performance Monitoring and Troubleshooting NETW4008 Lecture 8.
1 Chapter Overview Monitoring Server Performance Monitoring Shared Resources Microsoft Windows 2000 Auditing.
Ch 11 Managing System Reliability and Availability 1.
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.
70-270: MCSE Guide to Microsoft Windows XP Professional Chapter 5: Users, Groups, Profiles, and Policies.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
LAN / WAN Business Proposal. What is a LAN or WAN? A LAN is a Local Area Network it usually connects all computers in one building or several building.
Chapter 10: Network Administration and Support. Guide to Networking Essentials, Fourth Edition2 Learning Objectives Manage networked accounts Enhance.
Securing Operating Systems Chapter 10. Security Maintenance Practices and Principles Basic proactive security can prevent many problems Maintenance involves.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
13.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 13: Implementing Data and.
September 18, 2002 Introduction to Windows 2000 Server Components Ryan Larson David Greer.
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
Hands-On Microsoft Windows Server 2008
Guide to Linux Installation and Administration, 2e 1 Chapter 9 Preparing for Emergencies.
Managing User Accounts, Passwords and Logon Chapter 5 powered by dj.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
Chapter Six Windows XP Security and Access Controls.
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 12 Windows 2000 Server.
Chapter Fourteen Windows XP Professional Fault Tolerance.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 14 Managing and Troubleshooting Windows 2000.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Windows Server 2003 Overview 1 Windows 2003 Server Overview Ayaz
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Troubleshooting Windows Vista Security Chapter 4.
Module 7: Fundamentals of Administering Windows Server 2008.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Security Planning and Administrative Delegation Lesson 6.
11 WORKING WITH USER ACCOUNTS Chapter 6. Chapter 6: WORKING WITH USER ACCOUNTS2 UNDERSTANDING USER ACCOUNTS  Local user accounts  stored in the Security.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Module 7 Active Directory and Account Management.
70-270: MCSE Guide to Microsoft Windows XP Professional 1 Windows XP Professional User Accounts Designed for use as a network client for: Windows NT Windows.
Overview Managing a DHCP Database Monitoring DHCP
1 Chapter Overview Understanding User Accounts Planning New User Accounts Creating, Modifying, and Deleting User Accounts Setting Properties for User Accounts.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Guide to MCSE , Second Edition, Enhanced1 The Windows XP Security Model User must logon with: Valid user ID Password User receives access token Access.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Maintaining and Updating Windows Server 2008 Lesson 8.
Configuring the User and Computer Environment Using Group Policy Lesson 8.
Week #12 CIS 173 OBJECTIVES Chapter #10 Network Administration.
Introduction to Operating Systems
Chapter 10: Network Administration and Support
Lesson 16-Windows NT Security Issues
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Network Administration and Support Chapter 10

2 Learning Objectives Manage networked accounts Enhance network performance Create a network security plan Protect servers from data loss

3 Network Administration Network administration involves many areas:  Ensure network performs to specifications  Verify users can easily access resource they are authorized to use  Monitor network traffic  Be responsible for security issues Critical area is managing user accounts and groups  Set permissions and grant rights

4 Managing Networked Accounts Users should be able to access resources they are allowed to access Prevent users from accessing resources they do not have permission to access Many ways to assign permissions  Principles are same, but details differ NOSs have user management utilities

5 Creating User Accounts Windows has two predefined accounts:  Administrator – used to manage network; should create strong password and guard account; good idea to rename it; account cannot be disabled  Guest – for users without personal accounts

6 Creating User Accounts Must make decisions before creating other user accounts:  User Names –how many letters  Passwords – when to change, what restrictions on reusing same password, how to handle account lockouts  Logon Hours – what restrictions  Auditing – what to track

7 Passwords Users should change passwords for security  If require changes too frequently, users may forget password  Can set restrictions about when old password may be reused Combine upper and lower-case letters since most passwords are case sensitive  Include numbers or high-level characters to prevent dictionary attacks

8 Passwords Limit number of times user may enter wrong password before account is locked Longer passwords are better Different NOS have different maximum character limitations for passwords:  Windows 2000 limit is 128 characters  Windows NT limit is 14 characters  Linux limit is 256 characters

9 Logon Hours Can restrict logon hours by time, day, or both  Prevents intruder break-in after working hours Determine what happens when user is logged in and authorized time expires  Can disconnect user or just prevent connection to new resources

10 Auditing Records certain actions for security and troubleshooting  Can log only failed access attempts or all accesses Should use auditing sparingly  Can adversely affect availability of system resources

11 Setting User Rights Simplify network administration by assigning rights to groups Two general kinds of groups:  Local groups – use only single machine Table 10-1 shows rights assigned to default local groups for Windows 2000  Global groups – use within or across domain boundaries Universal group is new type in Windows 2000 Users may belong to more than one group

12 Windows 2000 Server Default Local Groups

13 Setting User Rights Some group memberships are automatic  See Table 10-2 All users belong to Everyone group May want to change rights  In Windows NT, changes written to Registry in files Security and Security Accounts Manager (SAM)  In Windows 2000, changes written to Active Directory database

14 Windows 2000 Automatic Groups

15 Managing Group Accounts Can add and delete rights for groups Can nest groups within other groups  Windows 2000 must use native mode to do so Local groups can include global groups, but not vice-versa  Allows cross-domain communication  Trust relationship is when members of one domain access resources in another domain

16 Trust Relationships Manage cross-domain communications  In Windows NT, use Trust Relationships dialog box, as seen in Figure 10-1  For Windows 2000, trust relationships automatically extend to interrelated domains Three types of trusts:  One-way trust  Two-way trust  Universal trust

17 Trust Relationships Dialog Box for Windows NT

18 Disabling and Deleting User Accounts Windows 2000 has two options to make user account inactive:  Disable it – temporarily turning account off; retains all assigned rights and may be restored  Delete it – removes account completely Cannot disable or delete Administrator account

19 Renaming and Copying User Accounts Two options when new user replaces existing user:  Rename old account – must change password In Windows 2000/XP Professional, use Users and Passwords utility, shown in Figure 10-2 In Windows 2000 Server, use Active Directory Users and Computers management console, shown in Figure 10-3  Copy old account into new one with different username; then disable old account

20 Users and Passwords Utility

21 Active Directory Users and Computer Management Console

22 Managing Network Performance Monitor these parameters:  Data read from and written to server each second  Queued commands  Number of collisions per second on Ethernet network  Security errors  Connections currently maintained to other servers (server sessions)  Network performance

23 Network Performance Three tools monitor system performance for Windows NT or Windows 2000 Server:  Event Viewer  Performance Monitor  Network Monitor Numerous open source and shareware utilities for Linux servers

24 Event Viewer Event Viewer, shown in Figure 10-4, creates three log files:  System Log – records information about operating system services and hardware  Security Log – records security events based on audit filters or policy settings  Application Log – maintains information about applications

25 Event Viewer in Windows 2000

26 Event Viewer With Active Directory, Event Viewer creates three more logs:  Directory Service  DNS Server  File Replication Service

27 Performance Monitor Records individual events to show trends Keeps track of certain counters for system objects  Object is portion of software that works with other portions to provide services  Counter is part of object that tracks particular aspect of its behavior Figure 10-5 shows % Processor Time and % Interrupt Time per second

28 Tracking Processor Time and Interrupts with Performance Monitor

29 Performance Monitor Monitor these system objects to identify bottlenecks:  Logical or physical disk on server  Network interface  Protocol counters, such as IP packets per second  Redirector  Server  Server work queues Monitor when everything works well to establish baseline for comparison

30 Network Monitor Must install separately from CD-ROM with Windows Becomes part of Administrative Tools menu  Works as software-based protocol analyzer  Monitors network traffic and creates reports  See Figure 10-6  Apply filters to monitor only data you want Gives reading on overall network performance

31 Network Monitor Session Specifics

32 Total System Management Monitor server hard drive and memory and CPU usage  Hard Drive Performance - Use Performance Monitor to see remaining disk space, how fast requests are serviced, and how often disk is busy  Memory Use – Monitor paging file, including soft and hard page faults  CPU Utilization – Monitor %Process Time counter to get average utilization over past second

33 Network Statistics Check network interface and protocol stack objects using Performance Monitor Monitor network utilization with Network Monitor or Bytes Total/Sec in Performance Monitor to get measure of network’s health Acceptable utilization rates vary  With token ring network, 80% utilization is acceptable  With Ethernet network, utilization rate should stay below 56-60% range

34 Maintaining a Network History Keep long-term records of network performance and events  Use them to determine trends and identify new problem Do not keep more data than you can analyze

35 Managing Network Data Security Two elements of data security  Ensure that data is safe from intruders  Ensure that damaged data can be replaced Plan for network security  Identify threats  Consider cost-effectiveness of security  Communicate with other managers in office to make sure security system meets needs

36 Security Models Two security viewpoints:  Physical security – based on hardware  Data security – based on software Two security models for software security  Share-oriented model – attach security information to object; apply to everyone who may access object  User-oriented model – focuses on rights and permissions of each user

37 Implementing Security Two-stage process  Set up security system and make it as foolproof as possible; includes setting up passwords  Train users about system, how to use it, and consequences of failure to comply

38 New Security Features in Windows 2000 Many significant changes in Windows 2000 involve security, including:  Kerberos v5 for login authentication  Public Key Infrastructure (PKI) for exchange of “digital signatures” and “digital certificates”  Enhanced security policy mechanisms consolidated within Group Policy mechanism managed in Active Directory  Improved IP security mechanisms and protocols Unix and Linux previously included most of these features

39 Maintaining Security Make sure plan accomplishes goals and works as intended. Modify plan to cover omissions

40 Security Against Viruses Computer virus is big security threat Implement virus protection at these locations:  Workstation – protects a single computer by scanning files from server or messages  Server – scans data read from or written to server; prevents virus from server spreading throughout network  Internet gateway – scans all Web browser, FTP, and traffic; stops viruses before they enter network

41 Using Firewalls to Prevent Internet Attacks Advantages of using firewalls  Protect against outside attempts to access unauthorized resources  Protect against malicious network packets that disable network and its resources  Restrict access to Internet resources by corporate users Corporate firewalls may be expensive and complicated to configure Personal firewall for home users guards against Internet attacks

42 Avoiding Data Loss Hard drive failure more likely than risk of break- in Use three-tiered scheme to protect data  Reduce chance of data loss  Make quick recovery from data loss easy  Completely rebuild lost or corrupted data

43 Tape Backup Most popular backup method Offers speed, capacity, and cost-effectiveness Five types of backups  Full  Incremental  Differential  Copy  Daily

44 Tape Backup Good model is full weekly backup and daily differential backup  Allows restoration from only two types Be sure to post schedule and assign one person to perform backups Test to verify that backups can be restored Store tapes in cool, dry, dark place Rotate tapes

45 Repairing or Recovering Windows Systems Network operating systems include repair utilities  Windows NT uses Emergency Repair (ERD) disk  Windows 2000 Recovery Console is more powerful, supporting 26 commands First step in restoration is to boot from CD-ROM or from set of boot floppies

46 Uninterruptible Power Supply Has built-in battery to allow orderly shutdown and includes other capabilities:  Power conditioning cleans power, removing noise  Surge protection protects computer from sags and spikes Two categories of UPS  Stand-by – must switch from wall to battery power  Online – continually supplies power through battery; no switching

47 Fault-Tolerant Systems Fault-tolerant disk configurations, implemented through hardware or software Two popular types:  Disk mirroring (or duplexing)  Disk striping with parity Based on Redundant Array of Inexpensive Disks (RAID)  Table 10-3 describes Raid levels

48 RAID Levels

49 RAID 1: Disk Mirroring Mirroring requires writing data to two disks, working in tandem Duplexing uses two disks and two controllers Main disadvantage is using twice as much disk space as data

50 RAID 5: Disk Striping with Parity More space-efficient Requires at least three disks  Windows NT and Windows 2000 Server support arrays up to 32 disks, treated as single logical drive Figure 10-7 illustrates stripe set with parity Can recovery only from single failed disk Disadvantage is extra memory required for parity calculation

51 Stripe Set with Parity

52 Intellimirror Client-server application introduced with Windows 2000 as part of Microsoft Zero Administration initiative for Windows (ZAW)  Creates “smart back-up copy’ of system on server  Works from domain policy settings and user account permissions  Recreates user’s desktop on whatever machine user logs onto  Can deploy, recover, restore, or replace user data, software, and personal settings

53 Chapter Summary Network maintenance is continuing process, not just installing hardware and software Network administrator must be vigilant about network management Main task of network management is to ensure that users can access what they are allowed to access but cannot access resources they don’t have permission to access

54 Chapter Summary Windows NT and Windows 2000 use User Manager for Domains and Active Directory Users and Computers utilities, respectively, to manage users and groups Groups may be either local or global Users are automatically added to some groups, such as Everyone, at log on Rights can be granted to individual user accounts or to groups to control access to various objects and resources on network

55 Chapter Summary Passwords should be changed regularly and the same password should not be used repeatedly To make password less immune to dictionary attacks, pick two words plus a punctuation mark, combine upper- and lowercase letters, or combine letters with two or more numbers Cross-domain communications are managed through trust relationship in Windows NT and Windows 2000

56 Chapter Summary Trust relationship lets members from one domain access resources of another domain In Windows NT, you can establish one-way or two-way “trust” between domains Automatic trust relationships are all two-way trusts in Windows 2000 Monitor performance of a Windows NT or Windows 2000 Server network using Event Viewer, Performance Monitor, and Network Monitor

57 Chapter Summary Use various tools to audit system, driver, security, and application information Both physical security, based on hardware, and data security, based on software, are important network security issues Share-oriented security and user-oriented are two types of software security

58 Chapter Summary Important new security features in Windows 2000 include Kerberos v5 authentication, Public Key Infrastructure (PKI), enhanced security policy mechanisms, and improved IP security mechanisms and protocols Virus protection is critical part of maintaining security on a network Virus protection can be implemented at workstation, server, or Internet gateway, and preferably at all three locations Chapter 11