Presentation is loading. Please wait.

Presentation is loading. Please wait.

11 CONFIGURING AND MANAGING SHARED FOLDER SECURITY Chapter 8.

Similar presentations


Presentation on theme: "11 CONFIGURING AND MANAGING SHARED FOLDER SECURITY Chapter 8."— Presentation transcript:

1 11 CONFIGURING AND MANAGING SHARED FOLDER SECURITY Chapter 8

2 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY2 OVERVIEW  Create and remove shared folders  Control access to shared folders  Analyze and troubleshoot combined permissions  Manage and troubleshoot offline files  Manage and troubleshoot Web server resources  Create and remove shared folders  Control access to shared folders  Analyze and troubleshoot combined permissions  Manage and troubleshoot offline files  Manage and troubleshoot Web server resources

3 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY3 SHARED FOLDERS

4 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY4 SHARED FOLDER PERMISSIONS

5 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY5 SHARED FOLDER PERMISSIONS (CONTINUED)  Apply to folders only (not files).  Do not restrict local access to resources.  Only permission available for FAT.  Default permission is Everyone/Read.  Apply to folders only (not files).  Do not restrict local access to resources.  Only permission available for FAT.  Default permission is Everyone/Read.

6 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY6 SHARED FOLDER PERMISSIONS (CONTINUED)

7 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY7 PLANNING SHARED FOLDERS  Consolidate data.  Assign permissions to folders.  Assign most restrictive permissions possible.  Use groups for permission assignment.  Use intuitive share names.  Consolidate data.  Assign permissions to folders.  Assign most restrictive permissions possible.  Use groups for permission assignment.  Use intuitive share names.

8 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY8 PLANNING SHARED FOLDERS (CONTINUED)  Multiple permissions.  Limit use of Deny permission.  Permissions interact with NTFS permissions.  Folder no longer shared if moved or renamed.  Copies of folders are not shared.  Multiple permissions.  Limit use of Deny permission.  Permissions interact with NTFS permissions.  Folder no longer shared if moved or renamed.  Copies of folders are not shared.

9 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY9 SHARED FOLDER REQUIREMENTS  Administrators or Power Users group  Must have NTFS:Read to share folders  Administrators or Power Users group  Must have NTFS:Read to share folders

10 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY10 SHARING FOLDERS  Create Shared Folder Wizard

11 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY11 SHARING FOLDERS (CONTINUED)  Windows Explorer

12 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY12 SHARING FOLDERS (CONTINUED)  NET SHARE

13 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY13 ADMINISTRATIVE SHARES

14 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY14 STOP SHARING FOLDERS  Computer Management: choose Stop Sharing from shortcut menu  Windows Explorer: select Do Not Share This Folder  NET SHARE: NET SHARE /DELETE  Computer Management: choose Stop Sharing from shortcut menu  Windows Explorer: select Do Not Share This Folder  NET SHARE: NET SHARE /DELETE

15 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY15 MULTIPLE SHARES

16 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY16 UNC PATHS

17 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY17 CONNECTING TO SHARED FOLDERS  My Network Places  Mapped drives (Windows Explorer)  Mapped drives (NET USE)  Run dialog box  My Network Places  Mapped drives (Windows Explorer)  Mapped drives (NET USE)  Run dialog box

18 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY18 COMBINING NTFS AND SHARE PERMISSIONS

19 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY19 MONITORING SHARED FOLDERS  Shared Folder snap-in  Must be Administrator or Power User  Monitor connections, open files, and file locks  Might also disconnect users  Shared Folder snap-in  Must be Administrator or Power User  Monitor connections, open files, and file locks  Might also disconnect users

20 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY20 MONITORING SHARED FOLDERS (CONTINUED)

21 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY21 ENABLING OFFLINE FILES (SERVER)

22 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY22 ENABLING OFFLINE FILES (CLIENT)

23 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY23 CONFIGURING OFFLINE FILES

24 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY24 CONFIGURING SYNCHRONIZATION

25 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY25 INTERNET FILE SHARING  Installing Internet Information Services (IIS)  Internet Management console  WebDAV and Web folders  Web folder authentication  Using Web folders  Installing Internet Information Services (IIS)  Internet Management console  WebDAV and Web folders  Web folder authentication  Using Web folders

26 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY26 INSTALLING IIS  Installed from Add/Remove Programs  Apply Windows Updates  Installed from Add/Remove Programs  Apply Windows Updates

27 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY27 INTERNET MANAGEMENT CONSOLE

28 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY28 WEB FOLDERS

29 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY29 CLIENT CONNECTIONS TO WEB FOLDERS

30 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY30 SUMMARY  Share folders to allow remote usage.  Share permissions apply only to folders.  Default share permission is Everyone:Read.  Replace default share permissions to reduce security exposure.  Administrators and Power Users can share folders.  NTFS and share permissions can be combined.  Share folders to allow remote usage.  Share permissions apply only to folders.  Default share permission is Everyone:Read.  Replace default share permissions to reduce security exposure.  Administrators and Power Users can share folders.  NTFS and share permissions can be combined.

31 Chapter 8: CONFIGURING AND MANAGING SHARED FOLDER SECURITY31 SUMMARY (CONTINUED)  Offline files must be enabled before use.  Synchronization Manager synchronizes offline files.  IIS and WebDAV allow Internet file sharing.  WebDAV clients can use Web folders.  Offline files must be enabled before use.  Synchronization Manager synchronizes offline files.  IIS and WebDAV allow Internet file sharing.  WebDAV clients can use Web folders.


Download ppt "11 CONFIGURING AND MANAGING SHARED FOLDER SECURITY Chapter 8."

Similar presentations


Ads by Google