Sunteți pe pagina 1din 29

Revision no.

: PPT/2K403/02

Files and Folders


(70-290)

Revision no.: PPT/2K403/02

Lesson 1: Setting Up Shared Folders


2

Sharing a Folder

Managing a Shared Folder

Configuring Share Permissions

Managing User Sessions and Open Files

CMS INSTITUTE, 2004. All rights reserved. No part of this material may be reproduced, stored or emailed without the prior permission of Programme Director, CMS Institute

Revision no.: PPT/2K403/02

Sharing a Folder
3

Sharing a Folder Configures the File And Printer Sharing For


Microsoft Networks service to allow network connections to
that folder and its subfolders by clients running the Clients For
Microsoft Networks

To access a shared folder \\servername\sharename

To Hide a Shared Folder


Include a $ after the name of the shared folder
Users can access a hidden shared folder by typing the UNC, for
example, \\servername\sharename$

Share Folder Settings


The Folder Path page
The Name,Description and Settings page
The Permissions page
CMS INSTITUTE, 2004. All rights reserved. No part of this material may be reproduced, stored or emailed without the prior permission of Programme Director, CMS Institute

Revision no.: PPT/2K403/02

Managing a Shared Folder


4

To Manage Shared Folders open the Shared Folders snap-in


through MMC

Right Click any of the shared folders and select properties


General
Publish
Share Permissions
Security

CMS INSTITUTE, 2004. All rights reserved. No part of this material may be reproduced, stored or emailed without the prior permission of Programme Director, CMS Institute

Revision no.: PPT/2K403/02

Configuring Share Permissions


5

Permission
Read
(Default,
applied to the
Everyone
group)
Change
(Includes all
Read
permissions)

Allows the user to:


View data in files and attributes
View file names and subfolder names
Run program files
Add files and subfolders
Change data in files
Delete subfolders and files
Includes all Read and Change permissions

Full Control

Enables you to change NTFS files and folders


permissions

CMS INSTITUTE, 2004. All rights reserved. No part of this material may be reproduced, stored or emailed without the prior permission of Programme Director, CMS Institute

Revision no.: PPT/2K403/02

Managing User Sessions and Open Files


6

The Sessions node of the Shared Folders snap-in allows you


to monitor the number of users connected to a particular
server and if possible disconnect them

The Open Files node lists all the open files and file locks for a
single server

Using Open Files node you can close one open file or
disconnect all open files

CMS INSTITUTE, 2004. All rights reserved. No part of this material may be reproduced, stored or emailed without the prior permission of Programme Director, CMS Institute

Revision no.: PPT/2K403/02

Practice: Setting Up Shared Folders


7

Share a Folder

Connect to a Shared Folder

Simulate Preparing to Take a Server


Offline

CMS INSTITUTE, 2004. All rights reserved. No part of this material may be reproduced, stored or emailed without the prior permission of Programme Director, CMS Institute

Revision no.: PPT/2K403/02

Lesson 2: Configuring File System


Permissions

Configuring Permissions

Inheritance

Effective Permissions

Resource Ownership

CMS INSTITUTE, 2004. All rights reserved. No part of this material may be reproduced, stored or emailed without the prior permission of Programme Director, CMS Institute

Revision no.: PPT/2K403/02

What Are Permissions?


9

Permissions define the type of access granted to a user,


group, or computer for an object
You apply permissions to objects such as files, folders,
shared folders, and printers
You assign permissions to users and groups in
Active Directory or on a local computer

CMS INSTITUTE, 2004. All rights reserved. No part of this material may be reproduced, stored or emailed without the prior permission of Programme Director, CMS Institute

Revision no.: PPT/2K403/02

Configuring Permissions
10

Windows servers support granular or detailed control of


access to files and folders through NTFS Permissions

Windows Explorer is the most common tool used to initiate


management of resource access permissions both locally and
remotely
The Access Control List Editor
Adding and Removing Permissions Entries
Modifying Permissions
New Security Principals
Permissions Templates and Special Permissions

CMS INSTITUTE, 2004. All rights reserved. No part of this material may be reproduced, stored or emailed without the prior permission of Programme Director, CMS Institute

Revision no.: PPT/2K403/02

Inheritance
11

Understanding Inheritance
Overriding Inheritance
Reinstating Inheritance

CMS INSTITUTE, 2004. All rights reserved. No part of this material may be reproduced, stored or emailed without the prior permission of Programme Director, CMS Institute

Revision no.: PPT/2K403/02

Effective Permissions
12

A User can belong to more that one group.Each group has its
own access control rights on a particular resource.

Effective Permissions evaluates the permissions that apply to


a user based on users group membership

Some Rules
File permissions override folder permissions
Allow permissions are cumulative
Deny permissions take precedence over Allow permissions
Explicit permissions take precedence over inherited permissions

Evaluating Effective Permissions


CMS INSTITUTE, 2004. All rights reserved. No part of this material may be reproduced, stored or emailed without the prior permission of Programme Director, CMS Institute

Revision no.: PPT/2K403/02

Resource Ownership
13

Creator Owner

Ownership Rules

CMS INSTITUTE, 2004. All rights reserved. No part of this material may be reproduced, stored or emailed without the prior permission of Programme Director, CMS Institute

Revision no.: PPT/2K403/02

Creator Owner
14

When a user creates a file or folder,the user is the creator and


initial owner of the resource

Creator Owner permissions are explicitly assigned

CMS INSTITUTE, 2004. All rights reserved. No part of this material may be reproduced, stored or emailed without the prior permission of Programme Director, CMS Institute

Revision no.: PPT/2K403/02

Ownership Rules
15

Administrators can Take Ownership

Users can Take Ownership if they are allowed Take Ownership


permission

Administrators can facilitate the transfer of the ownership

Restore Files And Directories user right enables the transfer of


ownership

CMS INSTITUTE, 2004. All rights reserved. No part of this material may be reproduced, stored or emailed without the prior permission of Programme Director, CMS Institute

Revision no.: PPT/2K403/02

Practice: Configuring File System Permissions


16

Configuring NTFS Permissions

Working with Deny Permissions

Effective Permissions

Ownership

CMS INSTITUTE, 2004. All rights reserved. No part of this material may be reproduced, stored or emailed without the prior permission of Programme Director, CMS Institute

Revision no.: PPT/2K403/02

Lesson 3: Auditing File System Access


17

Configuring Audit Settings

Enable Auditing

Examining the Security Log

CMS INSTITUTE, 2004. All rights reserved. No part of this material may be reproduced, stored or emailed without the prior permission of Programme Director, CMS Institute

Revision no.: PPT/2K403/02

What Is Auditing?
18

Auditing tracks user and operating system activities


and records selected events in security logs

What
What occurred?
occurred?

Who
Who did
did it?
it?

When?
When?

What
What was
was the
the result?
result?

Enable auditing to:


Determine damages
Create a baseline
Detect threats and attacks Prevent further
damage
Audit access to objects, management of
accounts, and users logging on and logging off
CMS INSTITUTE, 2004. All rights reserved. No part of this material may be reproduced, stored or emailed without the prior permission of Programme Director, CMS Institute

Revision no.: PPT/2K403/02

Configuring Audit Settings


19

To configure auditing go to files or folders Advanced Security


Settings dialog box

On the Auditing tab add users,groups or computers to audit

You are able to audit for success,failures or both.

CMS INSTITUTE, 2004. All rights reserved. No part of this material may be reproduced, stored or emailed without the prior permission of Programme Director, CMS Institute

Revision no.: PPT/2K403/02

Enable Auditing
20

You need to set up an audit policy.

An audit policy determines the security events that will be


reported to the network administrator

Set up an audit policy to:


Track success or failure of events
Minimize unauthorized use of resources
Maintain a record of activity

Security events are stored in security logs

CMS INSTITUTE, 2004. All rights reserved. No part of this material may be reproduced, stored or emailed without the prior permission of Programme Director, CMS Institute

Revision no.: PPT/2K403/02

Types of Events to Audit


21

Account Logon

Account Management

Directory Service Access

Logon

Object Access

Policy Change

Privilege Use

Process Tracking

System
CMS INSTITUTE, 2004. All rights reserved. No part of this material may be reproduced, stored or emailed without the prior permission of Programme Director, CMS Institute

Revision no.: PPT/2K403/02

Examining the Security Log


22

Once audit entries have been configured on files or folders


and audit policy has been set up the system will begin to log
access according to the audit entries

All the events, success or failure will be logged in the security


log of the event viewer .

CMS INSTITUTE, 2004. All rights reserved. No part of this material may be reproduced, stored or emailed without the prior permission of Programme Director, CMS Institute

Revision no.: PPT/2K403/02

Practice: Auditing File System Access


23

Configure Audit Settings

Enable Audit Policy

Generate Audit Events

Examine the Security Log

CMS INSTITUTE, 2004. All rights reserved. No part of this material may be reproduced, stored or emailed without the prior permission of Programme Director, CMS Institute

Revision no.: PPT/2K403/02

Lesson 4: Administering Internet Information Service


24

Installing IIS 6.0

Administering the Web Environment

Configuring and Managing Web and FTP Sites

Securing Files on IIS

Defining Resources Access with Permissions

CMS INSTITUTE, 2004. All rights reserved. No part of this material may be reproduced, stored or emailed without the prior permission of Programme Director, CMS Institute

Revision no.: PPT/2K403/02

Web Authentication Options


25

Anonymous authentication

Basic authentication

Digest authentication

Advanced Digest authentication

Integrated Windows authentication

Certificate authentication

.NET Passport authentication

CMS INSTITUTE, 2004. All rights reserved. No part of this material may be reproduced, stored or emailed without the prior permission of Programme Director, CMS Institute

Revision no.: PPT/2K403/02

FTP Authentication Options


26

Anonymous FTP authentication

Basic FTP authentication

CMS INSTITUTE, 2004. All rights reserved. No part of this material may be reproduced, stored or emailed without the prior permission of Programme Director, CMS Institute

Revision no.: PPT/2K403/02

Defining Resource Access with Permissions


27

IIS Directory Permissions


Read(default)
Write
Script Source Access
Directory Browsing

Application Execute Permissions


None
Scripts only
Scripts and Executables

CMS INSTITUTE, 2004. All rights reserved. No part of this material may be reproduced, stored or emailed without the prior permission of Programme Director, CMS Institute

Revision no.: PPT/2K403/02

Practice : Administering IIS


28

Install IIS

Prepare Simulated Web Content

Create a Web Site

Create a Secure Virtual Directory

CMS INSTITUTE, 2004. All rights reserved. No part of this material may be reproduced, stored or emailed without the prior permission of Programme Director, CMS Institute

Revision no.: PPT/2K403/02

29

Design & Published by:


CMS Institute, Design & Development Centre, CMS House, Plot No. 91, Street No.7,
MIDC, Marol, Andheri (E), Mumbai 400093, Tel: 91-22-28216511, 28329198
Email: courseware.inst@cmail.cms.co.in
www.cmsinstitute.co.in

CMS INSTITUTE, 2004. All rights reserved. No part of this material may be reproduced, stored or emailed without the prior permission of Programme Director, CMS Institute

S-ar putea să vă placă și