Ch 17 Securing the File System. Three Ways to Protect Files NTFS Permissions Encrypting File Service BitLocker full-disk encryption – BitLocker ToGo.

Slides:



Advertisements
Similar presentations
1 Chapter Overview Understanding and Applying NTFS Permissions Assigning NTFS Permissions and Special Permissions Solving Permissions Problems.
Advertisements

1 Chapter Overview Understanding NTFS Permissions Assigning NTFS Permissions Assigning Special Permissions.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Configuring Windows Vista Security Chapter 3. IE7 Pop-up Blocker Pop-up Blocker prevents annoying and sometimes unsafe pop-ups from web sites Can block.
1 File systems security: Shared folders & NTFS permissions, EFS (Week 6, Monday 2/12/2007) © Abdou Illia, Spring 2007.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
Chapter 6: Configuring Security. Options for Managing Security Configurations LGPO (Local Group Policy Object) –Used if Computer is not part of a domain.
A+ Guide to Software, 4e Chapter 4 Supporting Windows 2000/XP Users and Their Data.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
Chapter 6: Configuring Security. Group Policy and LGPO Setting Options Software Installation not available with LGPOs Remote Installation Services Scripts.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
11 SHARING FILE SYSTEM RESOURCES Chapter 9. Chapter 9: SHARING FILE SYSTEM RESOURCES2 CHAPTER OVERVIEW  Create and manage file system shares and work.
Chapter 5: Configuring Users and Groups. Windows Vista User Accounts User accounts are the primary means of authentication Built-in Accounts –Administrator:
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 24 NTFS Permissions and Sharing Printers 1.
By Rashid Khan Lesson 8-Crowd Control: Controlling Access to Resources Using Groups.
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
1 Securing Network Resources Understanding NTFS Permissions Assigning NTFS Permissions Assigning Special Permissions Copying and Moving Files and Folders.
1 Using Compressed Files and Folders Applications and operating systems read and write to compressed files. NTFS uncompresses the file before making it.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
1 Chapter Overview Managing Data Storage Creating Dynamic Disks Implementing Storage Quotas Managing Compression and Encryption.
11 SHARING FILE SYSTEM RESOURCES Chapter 9. Chapter 9: SHARING FILE SYSTEM RESOURCES2 CHAPTER OVERVIEW Create and manage file system shares and work with.
Chapter 5 File and Printer Services
Working with Workgroups and Domains
Troubleshoot Access, Authentication, and User Account Control Issues Lesson 8.
NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account.
®® Microsoft Windows 7 for Power Users Tutorial 5 Comparing Windows 7 File Systems.
Sharing Resources Lesson 6. Objectives Manage NTFS and share permissions Determine effective permissions Configure Windows printing.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
© 2012 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Fourth Edition NTFS, Users,
Managing User Accounts, Passwords and Logon Chapter 5 powered by dj.
© 2010 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to Managing and Troubleshooting PCs Third Edition Securing Windows.
6.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 6: Administering User Accounts.
With Windows XP, you can share files and documents with other users on your computer and with other users on a network. There is a new user interface.
A+ Guide to Software Managing, Maintaining and Troubleshooting THIRD EDITION Chapter 8 Managing and Supporting Windows XP.
C HAPTER 6 NTFS PERMISSIONS & SECURITY SETTING. INTRODUCTION NTFS provides performance, security, reliability & advanced features that are not found in.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 5: Managing File Access.
Troubleshooting Windows Vista Security Chapter 4.
IOS110 Introduction to Operating Systems using Windows Session 8 1.
Managing Groups, Folders, Files and Security Local Domain local Global Universal Objects Folders Permissions Inheritance Access Control List NTFS Permissions.
1 Chapter Overview Configuring Account Policies Configuring User Rights Configuring Security Options Configuring Internet Options.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Chapter 9: SHARING FILE SYSTEM RESOURCES1 CHAPTER OVERVIEW  Create and manage file system shares and work with share permissions.  Use NTFS file system.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
Configuring Data Protection Chapter 12 powered by dj.
Module 3 Configuring File Access and Printers on Windows 7 Clients.
MCSE Guide to Microsoft Windows Vista Professional Chapter 5 Managing File Systems.
Page 1 NTFS and Share Permissions Lecture 6 Hassan Shuja 10/26/2004.
Working with Disks Lesson 4. Skills Matrix Technology SkillObjective DomainObjective # Configuring Data Protection Configure data protection6.4 Using.
Lecture 6 File, Folder and Share Security. Objectives Managing file and folder security.
NetTech Solutions Security and Security Permissions Lesson Nine.
Managing Applications, Services, Folders, and Libraries Lesson 4.
1 Introduction to NTFS Permissions Assign NTFS permissions to specify Which users and groups can gain access to folders and files What they can do with.
Understand Permissions LESSON Security Fundamentals.
Understand Encryption LESSON 2.5_A Security Fundamentals.
Sharing Resources Lesson 6. Objectives Manage NTFS and share permissions Determine effective permissions Configure Windows printing.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Classify file systems, file organization, and libraries. Objective Course Weight 5%
11/06/ أساسيات الأتصال و الشبكات Communication & Networks Fundamentals lab 5.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
11 SUPPORTING WINDOWS XP FILE AND FOLDER ACCESS Chapter 5.
NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account.
Managing User Desktops with Group Policy
Introducing, Installing, and Upgrading Windows 7
Introduction to NTFS Permissions
Managing Data by Using NTFS
Bethesda Cybersecurity Club
Chapter 9: Managing Groups, Folders, Files, and Object Security
Windows Vista Inside Out
Presentation transcript:

Ch 17 Securing the File System

Three Ways to Protect Files NTFS Permissions Encrypting File Service BitLocker full-disk encryption – BitLocker ToGo

Controlling Access with NTFS Permissions With NTFS permissions, you can: – Control access to any file or folder on any NTFS- formatted volume – Allow different types of access for different users or groups

Applying Advanced Security Settings Right-click file or folder Properties Security tab This is the Access Control List

Editing Permissions Click Edit in an object's Properties to change permissions

Permissions

Be careful with the Deny box Deny permissions take precedence over Allow permissions It's safer to just Allow, or nor Allow, permissions – There is an exception to this rule: an explicit Allow can take precedence over an inherited Deny

Security Groups Logo+R to open Run box CONTROL USERPASSWORDS2 Click a user, Properties Group Membership tab

Assigning a User to Multiple Security Groups Use the "Local Users and Groups" snap- in in Computer Management

Using Special Permissions Click Advanced on the Security tab, click Edit, select a user or group name, click Edit

Special Permissions

Leave Special Permissions Alone The basic permissions like Full Control, Modify, etc. are almost always complex enough for any purpose Don't adjust the special permissions unless you really need to

Not in Textbook Ownership and Inheritance

Discretionary Access Control In Windows 7, the owner of a file or folder (typically the person who creates the file) has the right to allow or deny access to that resource In addition, members of the Administrators group and other authorized users can grant or deny permissions

Demonstration of Ownership Create a folder, so you are the owner Click Advanced button, then Change Permissions, and clear "Include heritable permissions" check box Remove all permissions You cannot open the folder, but you can still change the permissions because you are the owner

Automated Permission and Ownership Changes Windows 7 will automatically change permissions for you, if you are an Administrator It will even guide you through the process of Taking Ownership

Applying Permissions to Subfolders Through Inheritance Files and subfolders inherit permissions from a parent folder – Right-click the folder icon, Properties, Security tab, Advanced button

Applying Permissions to Subfolders Through Inheritance To block inheritance – Click Edit – Uncheck "Include Inheritable Permissions From This Object’s Parent" – Choose Copy or Remove

Taking or Assigning Ownership of Files and Folders When you create a file or folder on an NTFS drive, you become its owner Owner can allow or deny permissions Any member of the Administrators group can take or give ownership of any file or folder

How to Take or Assign Ownership of Files and Folders Right-click, Properties Security tab, Advanced Owner tab, Edit

Encrypting Files and Folders

Logon Passwords are Not Enough If a computer is stolen, or booted from a CD, the data can be copied from the hard drive without using any logon password NTFS permissions don't protect the data from this attack Encryption is an essential defense, especially for laptops

Encrypting File System In file or folder Properties, click the Advanced button This encryption is only available on NTFS volumes

Converting FAT32 to NTFS You can convert a FAT32 volume to NTFS from an Administrator Command prompt – CONVERT d: /FS:NTFS d: is the drive letter of the volume to convert Data is preserved in the conversion process There is no way to convert from NFTS to FAT, however – Except by erasing all data and reformatting the partition

Encryption Key When you first encrypt a file or folder, Windows will create an encryption key You will be prompted to back up the key If you lose the key, your encrypted files will be unreadable

Exporting your Encryption Key It is saved as a PFX file

Viewing Your Encryption Keys In Internet Options, on the Content tab, click the Certificates button

Green Names Encrypted files and folders show up in green font Except on the Desktop Best practice: encrypt whole folders, not files For security, encrypt your whole profile folder: – C:\Users\Yourname Because programs often make temporary copies of documents in other folders

Encrypting a Disk with BitLocker

Encrypting Folders is Not Enough The operating system makes copies of your data – Page file – Hibernation file It also has information that can compromise your EFS-encrypted files – Password hashes – LM Secrets – Stored Internet Explorer passwords For real safety, encrypt the whole hard disk

Trusted Platform Module (TPM) BitLocker encrypts the whole hard disk It stores the encryption key in the TPM If your computer doesn't have a TPM, you can store the key on a USB flash drive or floppy disk But BitLocker is not available in Windows 7 Business Edition – You need Corporate or Ultimate Edition

BitLocker To Go Video Link Ch 17a

Ch 18 Setting Up User Security

Protecting Users From Each Other on a Shared Machine Create an account for each user Remove unused accounts Limit the number of administrators Rename the Administrator account Put all other accounts in the Users group Use strong passwords on every account Set screen saver to resume to the Welcome screen Lock your computer Use disk quotas

User Account Control (UAC) Users in the Administrators group have two tokens A low-privilege token that is used normally A high-privilege token that is used only after elevation through the User Account Control process

Shield Icon The shield icon indicates administrative acts that will require elevation Elevation does not always require the user to click (unlike Vista)

UAC Prompt You don't see many of these when using Windows 7, but sometimes they still pop up Standard users are required to type in an Administrator password

Secure Desktop The whole desktop turns gray Only the UAC prompt is active This prevents "Clickjacking"--tricking the user into approving an elevation while showing other choices on the screen

File and Registry Virtualization A Standard user can install software But he or she cannot change the contents of %SystemRoot%, %ProgramFiles%, or the Registry Virtual changes are made in the user's profile folder, and they only affect that user IE's Protected Mode works the same way

Configuring User Account Control

UAC Policies Start, SECPOL.MSC – UIAccess- accessibility applications for disabled persons

Account Password Options In Computer Management, open Local Users and Groups, open Users, and double-click a user

Password Policies Start, SECPOL.MSC Security Settings, Account Policies, Password Policies Double-click an item to see explanation

Recovering From a Forgotten Password Password Hint (in User Accounts) Password Reset Disk In the real world: Ultimate Boot CD!

Managing User Accounts Start, User, click "User Accounts" Manage another account Click the account name – Note: "Guest Mode" mentioned on page 385 in the book was removed from Windows 7 RTM

Account Policies Here you can rename the Administrator Account

User Rights Assignment

Account Lockout Policies

Managing Users and Groups from the Command Line NET USER username password /ADD NET USER username password /DELETE – There are options to set password expiration, home directory, etc. NET LOCALGROUP groupname username /ADD NET LOCALGROUP groupname username /DELETE

Parental Controls

Family Safety Part of Windows Live

Disk Quotas In a disk's Properties sheet, click the Quotas tab