Title: Chapter 6: Configuring Security
1Chapter 6 Configuring Security
2Options for Managing Security Configurations
- LGPO (Local Group Policy Object)
- Used if Computer is not part of a domain
environment - Set of security configuration settings that are
created and stored on the local computer - Users
- Computers
- Stored in \systemroot\System32\GroupPolicyUsers
- GPO (Group Policy Objects)
- Used if Computer is part of an Active Directory
domain - Allows for remote and centrally managed security
- Has a more levels of security structure, and thus
more granular control
3Group Policy and LGPO (Local Group Policy
Objects) Setting Options
- Software Installation
- not available with LGPOs
- Remote Installation Services
- Scripts
- Printers
- Security Settings
- Policy-based QOS
- Administrative Templates
- Folder Redirection
- not available with LGPOs
- Internet Explorer Configuration
4GPO Inheritance
- Order of Inheritance
- Local
- Site (physical location)
- Domain
- Organizational Unit (OU)
- Containers higher are called parents and lower
are called children. - Children inherit from the parent and
non-conflicting settings are additive. If
settings conflict, then the child overrides the
parent. - Two types of Policy Settings
- Computer Settings
- User Settings
- If a conflict occurs than the Computer setting is
applied.
5GPO Inheritance
- Special Options, for overriding the default
behavior of GPO execution. - No Override
- Used to specify that a child can not override the
policy settings of a parent higher level
container. - Block Inheritance
- Used to allow a child container to be able to
block the inheritance of a policy from a parent
container. - If a conflict occurs between No Override and
Block Inheritance than No Override would win
and be applied.
6Group Policy Result Tool
- Because of the overlapping nature of Group
Policies, Vista provides a tool to help determine
what policies will applied. - Tool is accessed through the GPResult.exe
command-line utility. - GPResult displays the Resultant Set of Policy
(RSOP) for the computer and the user who is
currently logged in. - C/gtGPResult.exe /r
7Using Local Group Policies
- Used to manage configuration settings for
workstations in a workgroup environment without
an Active Directory domain - Created and assigned through the Local Group
Policy snap-in in MMC - Microsoft Management Console
- Two types of policies
- Computer Configuration
- User Configuration
8Multiple Local Group Policy Objects (MLGPOs)
- New to Windows Vista
- Enables Vista to apply LGPOs to specific users
rather than apply them to every user on a
computer - Applied in the following order
- Local Computer Policy (User and Computer)
- Administrators and Non-Administrators Local Group
Policy (User only) - User-Specific Group Policy (User only)
- Again, GPO settings applied lower will override
parent settings in the event of a conflict. - AD GPO will override conflicting LGPO
9Setting Computer Configuration Policies
- Three folders within the Computer Configuration
folder - Software Settings
- Windows Settings
- Administrative Templates
- Scripts and Security Settings are found within
the Windows Settings folder.
10Windows Settings
- Scripts
- Logon Startup
- Logoff Shutdown
- Security Settings
- Account Policies
- Local Policies
- Windows Firewall with Advanced Security
- Public Key Policies
- Software Restriction Policies
- IP Security Policies
- Policy-based QOS
11Account Policies
- Password Policy
- Enforce Password History
- No repeated passwords
- Maximum Password Age
- Time until password change
- Minimum Password Age
- Keeps user from immediately changing password
back to what it was - Minimum Password Length
- If not set, then no password is required
- Password Must Meet Complexity Requirements
- Must be 6 characters or longer, can not contain
the username or any part of the full name, and
must contain 3 of the following - English Upper Case Character
- English Lower Case Character
- Decimal Digit
- Symbols
- Store Passwords Using Reversible Encryption
- Higher level of Encryption security
12Account Policies
- Account Lockout Policy
- Account Lockout Duration
- How long the account will remain locked if
Threshold is reached. - Account Lockout Threshold
- Specifies how many invalid attempts can be made
before the account is locked. - Reset Account Lockout Counter After
- How many minutes the counter will remember
unsuccessful login attempts.
13Local PoliciesAfter Login
- Audit Policy (Too many will degrade performance)
- Used to track success or failure of user actions.
- Login Attempts
- Object Access
- User Rights Assessment
- User rights as they apply to the system, not file
permissions - Change System Time
- Add workstations to the Domain
- Backup files and directories
- Security Options
- Security as it relates to the computer, not the
user. - Contains new policies relating to User Account
Control (UAC) - Require approval for administrative operations
- Specifies the method of approval
- Prompt for Consent
- Prompt for Credentials
14User Account Control
- New to Windows Vista
- Protects computers by requiring privilege
elevation for all users including local
Administrators (except the built-in Administrator
account) - Local Administrative users act as standard users,
until doing something which requires
administrative privileges - Standard users, will be prompted for the
credentials of an admin user. - Privilege escalation is required whenever the
four-color shield icon is present
15Windows Security Center
- Used to monitor and configure critical settings
through a centralized dialogue box for - Windows Firewall
- Automatic Updating
- Malware Protection
- Other Security Settings
- Will list whether the security feature is enabled
and whether it is up to date.
16Windows Firewall
- Protects computer from unauthorized users or
malicious software. It does not allow
unsolicited traffic to pass that was not
requested. - Configuration
- General Tab
- On or Off, as well as Block all Incoming
- Exceptions Tab
- Define which programs and services can pass
through the firewall - Advanced Tab
- Specify firewall settings at a more granular
level by reducing control to the specific
connection. - Windows Firewall with Advanced Security is used
to configure advanced settings, including inbound
and outbound rules
17Windows Defender
- Formerly Microsoft AntiSpyware
- Protects computer from spyware threats
- Tools and Settings
- Options
- Default Actions
- Automatic Scans
- Realtime Protection
- Microsoft SpyNet
- Online Community for such things as what to do
with non-classified software - Quarantined Items
- Allowed recovery of software found to be ok
- Allowed Items
- List of trusted applications
- Software Explorer
- Lists installed software and its classification
- Windows Defender website
18BitLocker Drive Encryption
- Included with Vista Enterprise and Vista Ultimate
- Used to encrypt the system drive
- The security key is stored on the systems TPM
(Trusted Platform Module) chip. If no TPM is
present, it can be store on a thumb drive. The
USB thumb drive will be required each time you
boot the system. - The 48 digit BitLocker recovery password, must
not be lost so as to recover from a lost or
corrupted USB drive. - Files on other drives must be encrypted with
another method, such as Encrypting File System
(EFS), as BitLocker only does the System Drive
19File and Folder Access Security
- Vista allows you to very easily share and secure
files and folders. - A users access rights to specific folders will
be based on their logon name and group
associations by applying NTFS (New Technology
File System) permissions.
20NTFS Permissions
- If permissions are not explicitly granted in
NTFS, then they are implicitly denied.
Explicitly denied, overrides explicitly granted
permissions - Six levels of permissions
- Full Control
- Modify
- Read Execute
- List Folder Contents
- Read
- Write
21Controlling Inheritance
- By default, subfolders and files inherit the
permissions assigned to the parent folder. - Prevent permissions from propagating to
subfolders and files by clearing the Include
Inheritable Permissions from This Objects Parent
check box.
22Determining Effective Permissions
- To determine a users effective rights to a file
or folder - Add all the permissions that are allowed to the
user to all permissions granted to the groups of
which the user is a member. - Subtract any permissions similarly denied to the
user or the users groups.
23Determining NTFS Permissions for Copied and Moved
Files
Move File Copy File
Same Partition Retains original NTFS permissions Inherits permissions from destination folder
Different Partition Inherits permissions from destination folder Inherits permissions from destination folder
24Managing Network Access
- Share folders that contain files you want to be
accessible over the network - Configure sharing from the Sharing tab of the
folder properties dialog box
25Configuring Share Permissions
- Permissions can be assigned to users and groups
- Full Control
- Allows full access to the folder
- Change
- Allows users to change data in files or to delete
files - Read
- Allows users to view and execute files
26NTFS Permissions Shared Permissions
- NTFS security and shared folder security work
together - The most restrictive permissions are the
effective permissions - NTFS security more restrictive than shared folder
security NTFS permissions are effective - Shared folder security more restrictive than NTFS
security Shared folder permissions are
effective