Section 0 and Section 1 Intro, Access Control, and more Namuo – CIS 160.

Slides:



Advertisements
Similar presentations
ADManager Plus Simplify Your Active Directory Management.
Advertisements

Policing the Power of Identity Controls Power Behavior Verify that controls are in place and functioning Monitor user behavior and verify that people.
Module 4: Implementing User, Group, and Computer Accounts
Access Control Intro, DAC and MAC System Security.
Chapter 7 HARDENING SERVERS.
11 MANAGING USERS AND GROUPS Chapter 13. Chapter 13: MANAGING USERS AND GROUPS2 OVERVIEW  Configure and manage user accounts  Manage user account properties.
Sharing and Accessing Network Resources By Nanda Ganesan, Ph.D. © All Rights Reserved.
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
Authentication and authorization Access control consists of two steps, authentication and authorization. Subject Do operation Reference monitor Object.
Understanding Group Policy on Windows Server 2003 John Howard, IT Pro Evangelist, Microsoft UK
Users and Groups Security Architecture Editing Security Policies The Registry File Security Auditing/Logging Network Issues (client firewall, IPSec, Active.
Using Active Directory for Authorizations CSG, September 2002.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Security features of Windows What is computer security ? Computer security refers to the protection of all components—hardware, software, and stored.
Working with Workgroups and Domains
Chapter 4 Windows NT/2000 Overview. NT Concepts  Domains –A group of one or more NT machines that share an authentication database (SAM) –Single sign-on.
Implementing Secure Shared File Access
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
Part I.  NOS  Directory Data Store(directory service, database)  Located on Domain Controllers (DCs), globally distributed, replicated (no longer PDCs/BDCs)
Section 7: Implementing Security Using Group Policy Exploring the Windows Security Architecture Securing User Accounts Exploring Security Policies Hardening.
Designing Group Security Designing security groups Designing user rights.
Department of Library and Information Studies Orientation 2010.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
11.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 11: Planning.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Implementing Group Policy. Overview What is Group Policy Introduction to Group Policy Group Policy Structure How Group Policy Settings Are Applied in.
Formula? Unit?.  Formula ?  Unit?  Formula?  Unit?
Active Directory Travis Favors Ryan Manuel Robert Rayer.
Networking and Health Information Exchange Unit 9b Privacy, Confidentiality, and Security Issues and Standards.
Some overlap exists between the settings of the MMC and the settings of the registry. The MMC is extensible. Policies and properties can be edited via.
Security Windows 2000 Richard Goldman © December 4, 2001.
Page 1 System and Group Policies Lecture 7 Hassan Shuja 11/02/2004.
Permissions and User Rights
Component 9 – Networking and Health Information Exchange Unit 9-2 Privacy, Confidentiality, and Security Issues and Standards This material was developed.
Company Confidential 1 A Course on Planning A Group Policy Management And Implementation Strategy Prepared for: *Stars* New Horizons Certified Professional.
Windows 2000 Security Yingzi Jin. Introduction n Active Directory n Group Policy n Encrypting File System.
© Wiley Inc All Rights Reserved. MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition.
Authorization vs. Authentication Authentication is the process of proving identity to the system –login Authorization happens after authentication. It.
11 PLANNING A GROUP POLICY MANAGEMENT AND IMPLEMENTATION STRATEGY Chapter 10.
Impersonation Bharat Kadia CS-795. What is Impersonation ? Dictionary-: To assume the character or appearance of someone ASP.NET-: Impersonation is the.
Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze Unit OS7: Security 7.4. Lab Manual.
Chapter 4 Sharing Files. FIGURE 4.0.F01: Sharing files for reading on Microsoft Windows 8.1. Used with permission from Microsoft.
MICROSOFT WINDOWS 2000 NT ADVANCED SERVER Esra Tanrisever&Ozgur Topcu.
Privilege Management Chapter 22.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Review on Active Directory. Aim Enable users to find network resources easily Central and easy administration of users and resources in a domain Improve.
Microsoft Active Directory Presented by Sherese Harrell, Rebecca Meinhold, and Brenden Tourelle
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Chapter 7: Managing and Troubleshooting Group Policy.
Introduction to Microsoft Windows 2000 Security Microsoft Windows 2000 Security Services Overview Security subsystem components Local security authority.
11 DESIGNING AN ADMINISTRATIVE SECURITY STRUCTURE Chapter 7.
Securing Network Resources with NTFS Permissions.
10.1 © 2004 Pearson Education, Inc. Lesson 10: Specifying Group Policy Settings Exam Microsoft® Windows® 2000 Directory Services Infrastructure.
11 SECURITY PLANNING AND ADMINISTRATIVE DELEGATION Chapter 6.
DCE Deployment at PSU Steven Kellogg Director, Advanced Information Technologies Center for Academic Computing
Lesson 14: Configuring File and Folder Access MOAC : Configuring Windows 8.1.
Secured Services Best Practices on ArcGIS for Server Patrick Jackson & Thomas Noble.
Secure Connected Infrastructure
Chapter One: Mastering the Basics of Security
SECURITY PLANNING AND ADMINISTRATIVE DELEGATION
CompTIA Security+ Study Guide (SY0-401)
My 7-Point Plan for Windows Security
Group Policy Inheritance
Deploy Software with Group Policy
Troubleshooting Group Policy
Group Policy Overview Group Policy 5.1
Delegation of Control Manage Active Directory Objects 3.7
Using Active Directory for Authorizations
Active Directory Assessment Results
I have… I have… Who has 3:40? Who has 12:20? I have… I have…
Presentation transcript:

Section 0 and Section 1 Intro, Access Control, and more Namuo – CIS 160

Section 0  Feedback?  Layered/Barrier approach  Host-based security Host-based security Host-based security  Disable USB.adm Disable USB.adm Disable USB.adm  Security formula  Active Directory  X.500 standard (ITU)  Novell 1993  Microsoft 1999

Section 1  Group Policy Management  1.1 Access Control Models  NTFS is DAC  1.2 Tokens, SmartCards (CAC cards)  1.2 Single Sign-on (college portal)  1.3 Active Directory Users and Computers  GPO inheritance

Section 1 continued  1.4 Authorization  ACL and inheritance  Security group vs Distribution group  1.5 Physical security  1.6 Principle of least privilege