Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security Learning Objectives Chapter 9 Set up groups, including local, domain local, global, and universal groups, and convert Windows NT groups to Windows 2000 groups Manage objects, such as folders, through user rights, attributes permissions, share permissions, auditing, and Web permissions Learning Objectives (continued) Chapter 9 Troubleshoot a security conflict Determine how creating, moving, and copying folders and files affect security Managing Resources Chapter 9 Three ways of managing resources and user accounts include: By individual user By resource By group Managing resources by groups is one effective way to reduce time spent on management Scope of Influence Chapter 9 Scope of influence: The reach of a type of group, such as access to resources in a single domain or access to all resources in all domains in a forest Types of Security Groups Chapter 9 Local: Used on standalone servers that are not part of a domain Domain local: Used in a single domain or to manage resources in a domain so that global and universal groups can access those resources Types of Security Groups (continued) Chapter 9 Global: Used to manage accounts from the same domain and to access resources in the same and other domains Universal: Used to provide access to resources in any domain within a forest Local Security Group Chapter 9 Use local groups on a standalone server (Active Directory not implemented), such as to manage multiple accounts in a small office Domain Local Security Group Chapter 9 Typically a domain local security group is on the ACLs of resources such as folders, shared folders, printers, and other resources. Global security groups in the same or in a different domain gain access to those resources by becoming members of the domain local group. Domain local groups can contain accounts, but usually that is not the best approach. Membership Capabilities of a Domain Local Group Chapter 9 Active Directory Objects That Can Be Members of a Domain Local Group User accounts in the same domain Domain local groups in the same domain Global groups in any domain in a tree or forest (as long as there are transitive or two-way trust relationships maintained) Universal groups in any domain in a tree or forest (as long as there are transitive or two-way trust relationships maintained) Active Directory Objects That a Domain Local Group Can Join as a Member Access control lists for objects in the same domain, such as permissions to access a folder, shared folder, or printer Domain local groups in the same domain Table 9-1 Membership Capabilities of a Domain Local Group Implementing Global Groups Chapter 9 Use global groups to contain accounts for accessing resources in the same and in other domains via domain local groups Membership Capabilities of a Global Group Chapter 9 Active Directory Objects That Can Be Members of a Global Group User accounts from the domain in which the global group was created Other global groups that have been created in the same domain Levels of global groups, so that global groups can be nested to reflect the structure of organizational units (OUs) in a domain Active Directory Objects That a Global Group Can Join as a Member Access control lists for objects in any domain in a forest (as long as a transitive trust is maintained between domains) Domain local groups in any domain in a forest Global groups in any domain in a forest Universal groups in a forest Table 9-2 Membership Capabilities of a Global Group Nesting Global Groups Chapter 9 Global groups can be nested to reflect the structure of OUs Nesting Example Chapter 9 *Managers global group (top level global group) Amber Richards Joe Scarpelli Kathy Brown Sam Rameriz **Finance global group (second level global group) Martin LeDuc Sarah Humphrey Heather Shultz Sam Weisenberg Jason Lew ***Budget global group (third level global group) Michele Gomez Kristin Beck Chris Doyle Figure 9-1 Nested global groups Budget*** Finance** Managers* Planning Tip Chapter 9 Plan nesting to take into account that you may want to later convert specific global groups, because a global group cannot be converted if it is a member of another global group Keep in mind that global groups can only be nested in native mode domains Global Group Example Chapter 9 Figure 9-2 Managing security through domain local and global groups students.college.edu LocalExec domain local group research.college.edu LocalExec domain local group college.edu LocalExec domain local group GlobalExec global group Implementing Universal Groups Chapter 9 Use universal groups to provide access to forest-wide resources (to be included on the ACLs of resources such as servers, shared folders, and printers) Universal groups enable the scope of influence to span domains and trees Membership Capabilities of a Universal Group Chapter 9 Active Directory Objects That Can Be Active Directory Objects That a Universal Members of a Universal Group Local Group Can Join as a Member Accounts from any domain in a forest Access control lists for objects in any domain in a forest Global groups from any domain in a forest Any domain local group in a forest Universal groups from any domain in a forest Any universal group in a forest Table 9-3 Membership Capabilities of a Universal Group Guidelines for Using Groups Chapter 9 Use global groups to hold accounts as members. Give accounts access by joining them to a global group and then placing that global group into a domain local or universal group or both. Use domain local groups to provide access to resources in a specific domain by adding them to the ACLs of those resources. Guidelines for Using Groups (continued) Chapter 9 Use universal groups to provide extensive access to resources, such as when the Active Directory contains trees and forests. Make universal groups members of ACLs for objects in any domain, tree, or forest. Manage user account access by placing accounts in global groups and joining those global groups to domain local or universal groups. Example Universal Group Setup Chapter 9 students.college.edu Figure 9-3 Managing security through universal and global groups UniExec a universal group with access to resources in all three domains research.college.edu college.edu GlobalExec global group Creating a Group Chapter 9 To create a group: Click the container in which to create the group Click the Create a new group in current container icon Enter the name of the group Select the group scope Select the group type Click OK Entering the Group Parameters Chapter 9 Figure 9-4 Creating a group Group Properties Tabs Chapter 9 General: Used to enter a description, set the scope, and set the group type Members: Used to add group members Member Of: Used to join another group Managed By: Establishes who will manage the group Object: Provides information about the group as an object (on newer versions of Windows 2000) Security: Enables you to set up security (on newer versions of Windows 2000) Converting NT Groups to Windows 2000 Server Groups Chapter 9 Existing NT local groups on a PDC are converted to domain local groups Existing NT global groups on a PDC are converted to global groups If still running in mixed mode, universal groups are not recognized If running in native mode, but there are still Windows NT servers, the NT servers treat Windows 2000 universal groups as NT global groups Windows 2000 Predefined Security Groups Chapter 9 Security Group Scope Active Directory Description Container Location/Default Members Account Operators Built-in local 1 Builtin Used for administration of user accounts and groups Administrators Backup Operators Built-in local 1 Built-in local 1 Builtin/Administrator account; Provides complete access to all Domain Admins and Enterprise local computer and/or domain Admins groups resources Builtin Enables members to back up any folders and files on the computer Cert Publishers Global 1 Users Used to manage enterprise certification services for security 1The group scope cannot be changed Table 9-4 Windows 2000 Predefined Security Groups Windows 2000 Predefined Security Groups (continued) Chapter 9 Security Group Scope Active Directory Description Container Location/Default Members DCHP Administrators DCHP Users Domain local Domain local Users/Domain Used to manage the DHCP server services Admins group (when DHCP server services are installed) Users Enables users to access DHCP services when DHCP is enabled at the client (when DHCP server services are installed) DNSAdmins Domain local Users Used to manage the DNS server services (when DNS server services are installed) 1The group scope cannot be changed Windows 2000 Predefined Security Groups (continued) Chapter 9 Security Group Scope Active Directory Description Container Location/Default Members DNSUpdateProxy Global Users Enables each user access as an update proxy, so that a DHCP client can automatically update the DNS server information with its IP address Domain Admins Global 1 Users/Administrator account 1The group scope cannot be changed Used to manage resources in a domain Windows 2000 Predefined Security Groups (continued) Chapter 9 Security Group Scope Active Directory Description Container Location/Default Members Domain Computers Global 1 Users Used to manage all workstations and servers that join the domain Domain Controllers Global 1 Users/all DC Used to manage all domain controllers in a domain computers Domain Guests Global 1 Users/Guest account Used to manage all domain guest-type accounts, such as for temporary employees Domain Users Global 1 Users/all user accounts 1The group scope cannot be changed Used to manage all domain user accounts Windows 2000 Predefined Security Groups (continued) Chapter 9 Security Group Scope Active Directory Description Container Location/Default Members Enterprise Admins Everyone Universal 1 Built-in local 1 Users/Administrat Used to manage all resources in an or account enterprise Does not appear Used to manage default access to in a container and local or domain resources and all cannot be deleted user accounts are automatically members Group Policy Creator Global 1 Owners 1The group scope cannot be changed Users/Administrat Enables members to manage group or account policy Windows 2000 Predefined Security Groups (continued) Chapter 9 Security Group Scope Active Directory Description Container Location/Default Members Guests Pre-windows 2000 Built-in local 1 Built-in local 1 Compatible Access Builtin/Guest and IIS Used to manage guest accounts and accounts, Domain to prevent access to install software Guests group or change system settings Builtin/pre-Windows Used for backward compatibility to 2000 Everyone group the Everyone group on Windows NT servers and limits access to read Print Operators Built-in local 1 Builtin Members can manage printers on the local computer or in the domain 1The group scope cannot be changed Windows 2000 Predefined Security Groups (continued) Chapter 9 Security Group Scope Active Directory Description Container Location/Default Members RAS and IAS Servers Domain local 1 Users Enables member servers to have access to remote access properties that are associated with user accounts, such as security properties Replicator Built-in local 1 Builtin Used with the Windows File Replication service to replicate designated folders and files 1The group scope cannot be changed Windows 2000 Predefined Security Groups (continued) Chapter 9 Security Group Scope Active Directory Description Container Location/Default Members SchemaAdmins Universal 1 Users/Administrator account Members have access to modify schema in the Active Directory Server Operators Built-in local 1 Builtin Used for common day-to-day server management tasks Users Built-in local 1 Builtin/Domain Users group Used to manage general user access, including the ability to be authenticated as a user and to communicate interactively 1The group scope cannot be changed Rights Security Chapter 9 User rights: Enable an account or group to perform predefined tasks, such as the right to access a server or to increase disk quotas Rights Security Chapter 9 Privileges Logon Rights Act as part of the operating system (a program process can gain Access this computer from the security access as a user) network Add workstations to a domain Deny access to this computer from the network Backup files and directories Deny logon as a batch job Bypass traverse checking (enables a user to move through a Deny logon as a service folder that the user has no permission to access, if it is on the route to one that they do have permission to access) Change the system time Deny logon locally Table 9-5 Rights Security Rights Security (continued) Chapter 9 Privileges Logon Rights Create a pagefile Log on as a batch job Create a token object (a process can create a security access token to Log on as a service use any local resource; normally should be reserved for administrators) Create permanent shared objects Debug programs (can install and use a process debugger to trace problems; normally should be reserved for administrators) Enable computer and user accounts to be trusted for delegation Force shutdown from a remote system Generate security audits Log on locally Rights Security (continued) Chapter 9 Privileges Increase quotas Increase scheduling priority Load and unload device drivers Lock pages in memory (included for backward compatibility with Windows NT and should not be used because it degrades performance) Manage auditing and security log Modify firmware environment variables Profile single process (can monitor non-system processes) Profile system performance (can monitor system processes) Logon Rights Rights Security (continued) Chapter 9 Privileges Remove computer from docking station Replace a process level token (enables a process to replace a security token on one or more of its subprocesses) Restore files and directories Shut down the system Synchronize directory service data Take ownership of files or other objects Logon Rights Inherited Rights Chapter 9 Inherited rights: User rights that are assigned to a group and that automatically apply to all members of that group Configuring Rights Chapter 9 To configure rights in a domain: Open the Active Directory Users and Computers tool Right-click a domain or OU, for example Click Properties, click the Group Policy tab, click the group policy, and click Edit Double-click (if necessary) Computer Configuration,Windows Settings, Security Settings, and Local Policies Double-click User Rights Assignment Double-click any policies to configure them Configuring Rights (continued) Chapter 9 Figure 9-6 Configuring user rights as part of group policy File and Folder Attributes Chapter 9 Attributes: A characteristic associated with a folder or file used to help manage access and backups FAT Attributes Chapter 9 Read-only Hidden Archive FAT Attributes (continued) Chapter 9 Figure 9-7 Attributes of a folder on a FAT-formatted disk NTFS Attributes Chapter 9 Regular attributes Read-only Hidden Archive Extended attributes Index Compress Encrypt NTFS Attributes (continued) Chapter 9 Figure 9-8 Attributes of a folder on an NTFS-formatted disk Troubleshooting Tip Chapter 9 If you configure the Index attribute, but indexing it is not working check the following: Make sure that the Indexing Service is installed Makes sure that the Indexing Service is started and set to start automatically Troubleshooting Tip Chapter 9 Files that are compressed cannot be encrypted Encrypting File System Chapter 9 The encrypt attribute uses Microsoft Encrypting File System (EFS) that sets a unique private encryption key that is associated with the user account that encrypted the file or folder. Only that account has access to the encrypted file or folder contents. Troubleshooting Tip Chapter 9 De-encrypt an encrypted file or folder before you move it to another location, or else the file or folder remains encrypted in the new location Permissions Chapter 9 Permissions: Privileges to access and manipulate resource objects, such as folders and printers; for example, privilege to read a file, or to create a new file Auditing Chapter 9 Auditing: Tracking the success or failure of events associated with an object, such as writing to a file, and recording the audited events in an event log of a Windows 2000 server or workstation Ownership Chapter 9 Ownership: Having the privilege to change permissions and to fully manipulate an object. The account that creates an object, such as a folder or printer, initially has ownership. Design Tip Chapter 9 If possible, set permissions on folders and not on individual files, so you can minimize the number of permission exceptions to remember One variance from this recommendation is large database files that may require individual security Security Options Chapter 9 Figure 9-9 Configuring security options Inherited Permissions Chapter 9 Inherited permissions: Permissions of a parent object that also apply to child objects of the parent, such as to subfolders within a folder Configuring Permissions Chapter 9 Figure 9-10 Configuring permissions by groups and users Configuring Inherited Permissions Chapter 9 Figure 9-11 Configuring inherited permissions NTFS Folder and File Permissions Chapter 9 Permission Description Applies to Full Control Can read, add, delete, execute, and modify files plus Folders and files change permissions and attributes, and take ownership List Folder Can list (traverse) files in the folder or switch to a Contents subfolder, view folder attributes and permissions, and Folders only execute files, but cannot view file contents Modify Can read, add, delete, execute, and modify files; but Folders and files cannot delete subfolders and their file contents, change permissions, or take ownership Table 9-6 NTFS Folder and File Permissions NTFS Folder and File Permissions (continued) Chapter 9 Permission Description Applies to Read Can view file contents, view folder attributes and Folders and files permissions, but cannot traverse folders or execute files Read & Execute Implies the capabilities of both List Folder Contents Folders and files and Read (traverse folders, view file contents, view attributes and permissions, and execute files) Write Can create files, write data to files, appended data to files, create folders, delete files (but not subfolders and their files), and modify folder and file attributes Folders and files Special Permissions Chapter 9 You can customize permissions to meet particular security needs by using special permissions Configuring Special Permissions Chapter 9 Figure 9-12 Configuring special permissions NTFS Folder and File Special Permissions Chapter 9 Permission Description Applies to Traverse Folder/Execute File Can list the contents of a folder and execute program files in Folders/files that folder; keep in mind that all users are automatically granted Table 9-7 this permission via the Everyone and Users groups, unless it is removed or denied by you List Folder/Read Data Can list the contents of folders and subfolders and read the Folders/files contents of files Read Attributes Can view folder and file attributes (Read-only and Hidden) Folders and files Read Extended Attributes Enables the viewing of extended attributes (Archive, Index, Folders and files Compress, Encrypt) Create Files/Write Data Can add new files to a folder and modify, append to, or write Folders/files over file contents Create Folders/Append Data Can add new folders and add new data at the end of files (but otherwise not delete, write over, or modify data) Folders/files NTFS Folder and File Special Permissions (continued) Chapter 9 Permission Description Applies to Write Attributes Can add or remove the Read-only and Hidden attributes Folders and files Write Extended Can add or remove the Archive, Index, Compress, and Encrypt Folders and files Attributes attributes Delete Subfolders and Can delete subfolders and files (the following Delete Files permission is not required) Delete Can delete the specific subfolder or file to which this Folders and files Folders and files permission is attached Read Permissions Can view the permissions (ACL information) associated with a Folders and files folder or file (but does not imply you can change them) Change Permissions Can change the permissions associated with a folder or file Folders and files Take Ownership Can take ownership of the folder or file (Read Permissions and Folders and files Change Permissions automatically accompany this permission) Example Guidelines for Setting Permissions Chapter 9 Protect the Winnt folder by allowing limited access, such as Read & Execute Protect server utility folders, such as folders containing backup software, with access for Administrators only Protect software application folders with access such as Read & Execute (and Write if necessary for temporary or configuration files) Example Guidelines for Setting Permissions (continued) Chapter 9 Set up publicly used folders with Modify for broad user access Give users Full Control of their own home folders Remove groups such as Everyone and Users from confidential folders Planning Tip Chapter 9 Err on the side of too much security at first, because it is easier to give users more permissions later than to take away permissions after users are used to having them Configuring Auditing Chapter 9 Start by configuring a group policy for auditing Configure auditing on an as needed basis for particular objects, such as a folder or file Folder Auditing Chapter 9 Figure 9-13 Configuring folder auditing Setting an Audit Policy Chapter 9 Figure 9-14 Configuring audit policy as part of the default domain policy Ownership Chapter 9 Guidelines for ownership: The account that creates an object is the initial owner Ownership is changed by first having permission to take ownership and then by taking ownership Full Control permissions are required to take ownership (or the special permission, Take Ownership) Share Permissions Chapter 9 Share permissions: Limited permissions that apply to a particular shared object, such as a shared folder or printer Configuring Share Permissions Chapter 9 Figure 9-15 Configuring a shared folder Share Permissions for a Folder Chapter 9 Read: Permits groups or users to read and execute files Change: Enables users to read, add, modify, execute, and delete files Full Control: Permits full access to the folder, including the ability to take ownership control or change permissions Offline Access to a Folder through Caching Chapter 9 Use the Caching button in the folder Properties dialog box on the the Sharing tab to set up a folder for offline access via caching Caching a folder means that it can be accessed by a client even when the client computer is not connected to the network Folder Caching Options Chapter 9 Automatic Caching for Documents: Documents are cached without using intervention – all files in the folder that are opened by the client are cached automatically Manual Caching for Documents: documents are cached only per the user’s request Automatic Caching of Programs: document and program files are automatically cached when opened, but cannot be modified Troubleshooting Tip Chapter 9 If the Sharing tab is not displayed, make sure that the Server service is started Web Sharing Chapter 9 Use the Web Sharing tab in a folder’s properties to configure that folder for Web access Configuring Web Sharing Chapter 9 Figure 9-16 Entering Web sharing permissions Web Sharing Access Permissions Chapter 9 Access Permission Description Read Enables clients to read and display the contents of folders and files via an Internet or intranet Write Enables clients to modify the contents of folders and files; including the ability to upload files through FTP Script source Enables clients to view the contents of scripts containing access commands to execute Web functions Directory browsing Enables clients to browse the folder and subfolders, such as for FTP access Table 9-8 Web Sharing Access Permissions Web Sharing Application Permissions Chapter 9 Application Description Permission None No access to execute a script or application Scripts Enables the client to run scripts to perform Web-based functions Execute (includes Enables clients to execute programs and scripts via an Internet or scripts) intranet connection Table 9-9 Web Sharing Application Permissions Troubleshooting a Security Conflict Chapter 9 Check the groups to which a user or group belongs Look for group permissions that conflict, particularly because the Deny box is checked for a permission Moving and Copying Files and Folders Chapter 9 A newly created file inherits the permissions already set up in a folder A file copied from one folder to another on the same volume inherits the permissions of the folder to which it is copied A folder that is moved from one folder to another on the same volume takes with it the permissions it had in the original folder Moving and Copying Files and Folders (continued) Chapter 9 A file or folder that is moved or copied to a folder on a different volume inherits the permissions of the folder to which it is moved or copied A file or folder that is moved or copied from an NTFS volume to a shared FAT folder inherits the share permissions of the FAT folder A file or folder moved from a FAT to an NTFS folder inherits the NTFS permissions of that folder Chapter Summary Chapter 9 Without the Active Directory, use local groups to manage access to resources With the Active Directory implemented, use domain local, global, and universal groups to manage resources Chapter Summary Chapter 9 Windows 2000 Server objects are secured through ACLs, user rights, permissions, inherited rights and permissions, share permissions, Web permissions, auditing, and ownership Troubleshoot permissions conflicts by examining the security assigned to all groups to which a user account or group belongs