-
Users, Groups, and Permissions
- User accounts can be added to individual computers or to networks.
-
In a Microsoft domain, users are added in Active Directory Users and Computers (ADUC)
-
Users can be added in one of two places:
- In the Users folder
- In an OU (Organizational Unit)
- Users cannot log on to a network after their account has expired. The Account Expiration date in Windows controls this.
- Users can log on to the network only during their configured logon hours.
-
Permissions:
- Also known as access modes
- Actions that may be taken by entities (users and/or groups).
-
In Windows, there are two types of permissions:
-
Sharing Permissions:
- Full Control
- Change
- Read
-
NTFS (Security) Permissions:
- Full Control
- Modify
- Read and Execute
- List Folder Contents
- Read
- Write
- NTFS Permissions are usually chosen over Sharing Permissions.
- The Administrators group has full control of the folder.
- You can allow particular permissions, or specifically deny those permissions. If a permission is not set to Allow, it will be implicitly denied.
-
Permission Inheritance and Propagation
- If you create a folder, the default action it takes is to inherit permissions from the parent folder, which ultimately come from the root folder.
- Any permissions set in the parent are inherited by the subfolder.
- You can also propagate permission changes to subfolders not inheriting from the current folder. To do so, select the Replace All Child Object Permission Entries… checkbox.
-
Usernames and Passwords Policies
-
Provide guidelines for properly configuring user accounts, passwords, and logons:
- Rename and password protect the Administrator account
- Verify that the Guest account (and other unnecessary accounts) is disabled
- Use Ctrl+Alt+Del to manage logons.
-
Use policies to manage UAC
-
List the four configurable policies that may be written or defined for users within your domain:
- Enforce password history
- Maximum and minimum password age
- Minimum password length
- Password must meet complexity requirements
-
Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA):
- A type of challenge-response mechanism used primarily in websites to tell whether or not the user is human.
-
User Account Control (UAC)
-
User Account Controls (UAC):
- A security component of Windows that keeps every user (besides the actual Administrator account) in standard user mode instead of as an administrator with full administrative rights—even if they are a member of the administrators group.
-
UAC was created with two goals in mind:
- To eliminate unnecessary requests for excessive administrative-level access to Windows resources
- To reduce the risk of malicious software using the administrator's access control to infect operating system files