SlideShare a Scribd company logo
CONFIGURING AND MANAGING NTFS SECURITY Chapter 7
OVERVIEW ,[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
Definition of ACL ,[object Object],[object Object],Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
Definition of ACE ,[object Object],[object Object],Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
Definition of SID ,[object Object],[object Object],Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
MASTER FILE TABLE (MFT) Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
MFT – More Detail ,[object Object],[object Object],[object Object],Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
MFT – More Detail (cont) ,[object Object],[object Object],Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
SECURITY DESCRIPTORS Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
Security descriptors ,[object Object],[object Object],Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
ACCESS CONTROL LISTS (ACLs) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
ACCESS CONTROL ENTRIES (ACEs) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
ACE – more detail ,[object Object],[object Object],Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
‘ Allow’ ACE’s & ‘Deny’ ACE’s ,[object Object],[object Object],[object Object],Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
‘ Audit’ ACE’s ,[object Object],[object Object],Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
STANDARD NTFS PERMISSIONS Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
SPECIAL PERMISSIONS Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
PERMISSION INHERITANCE ,[object Object],[object Object],[object Object],Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
A little more detail… ,[object Object],[object Object],[object Object],Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
COPYING OR MOVING NTFS OBJECTS Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
… A little more detail… ,[object Object],[object Object],Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
PLANNING NTFS PERMISSIONS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
… A little more detail… ,[object Object],[object Object],Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
ASSIGNING STANDARD PERMISSIONS Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
ASSIGNING SPECIAL PERMISSIONS Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
WHY CAN’T I CHANGE PERMISSIONS FOR THIS FOLDER? Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
Answer: ,[object Object],[object Object],Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
TAKING OWNERSHIP OF FILES Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
… A little more detail… ,[object Object],[object Object],Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
CACLS.exe? ,[object Object],[object Object],[object Object],Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
CACLS.EXE Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
CACLS Examples ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
MULTIPLE NTFS PERMISSIONS ,[object Object],[object Object],[object Object],Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
VIEWING EFFECTIVE PERMISSIONS Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
AUDITING NTFS ACCESS Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
Who should have what permissions? Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
SUMMARY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY
SUMMARY (CONTINUED) ,[object Object],[object Object],[object Object],Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY

More Related Content

Viewers also liked

El pensamiento positivo y la mente humana
El pensamiento positivo y la mente humanaEl pensamiento positivo y la mente humana
El pensamiento positivo y la mente humana
Euler Ruiz
 
Building Advanced Web UI in The Enterprise World
Building Advanced Web UI in The Enterprise WorldBuilding Advanced Web UI in The Enterprise World
Building Advanced Web UI in The Enterprise Worldefim13
 
IT103Microsoft Windows XP/OS Chap11
IT103Microsoft Windows XP/OS Chap11IT103Microsoft Windows XP/OS Chap11
IT103Microsoft Windows XP/OS Chap11blusmurfydot1
 
La energia y la relacion con el desarrollo tecnologico
La energia y la relacion con el desarrollo tecnologicoLa energia y la relacion con el desarrollo tecnologico
La energia y la relacion con el desarrollo tecnologico
Euler Ruiz
 
Parking hormigon prefabricado
Parking hormigon prefabricadoParking hormigon prefabricado
Parking hormigon prefabricadoCAMPUS11
 
Zonas erroneas y la salud mental
Zonas erroneas y la salud mentalZonas erroneas y la salud mental
Zonas erroneas y la salud mental
Euler Ruiz
 
El aprendizaje y el cerebro humano
El aprendizaje y el cerebro humanoEl aprendizaje y el cerebro humano
El aprendizaje y el cerebro humano
Euler Ruiz
 
IT103Microsoft Windows XP/OS Chap14
IT103Microsoft Windows XP/OS Chap14IT103Microsoft Windows XP/OS Chap14
IT103Microsoft Windows XP/OS Chap14blusmurfydot1
 
DTA 2011 REV B
DTA 2011 REV BDTA 2011 REV B
DTA 2011 REV B
tynanderek
 
A Track Record of Ingenuity...
A Track Record of Ingenuity...A Track Record of Ingenuity...
A Track Record of Ingenuity...
EricFermin
 
Aparato circulatorio
Aparato circulatorioAparato circulatorio
Aparato circulatorio
Euler Ruiz
 
IT103Microsoft Windows XP/OS Chap16
IT103Microsoft Windows XP/OS Chap16IT103Microsoft Windows XP/OS Chap16
IT103Microsoft Windows XP/OS Chap16blusmurfydot1
 
La computadora
La computadoraLa computadora
La computadora
silovera
 
Assistive technology
Assistive technologyAssistive technology
Assistive technologykturne10
 
Stay Out Please
Stay Out PleaseStay Out Please
Stay Out Please
efim13
 
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap13
IT103Microsoft Windows XP/OS Chap13IT103Microsoft Windows XP/OS Chap13
IT103Microsoft Windows XP/OS Chap13blusmurfydot1
 

Viewers also liked (20)

El pensamiento positivo y la mente humana
El pensamiento positivo y la mente humanaEl pensamiento positivo y la mente humana
El pensamiento positivo y la mente humana
 
Building Advanced Web UI in The Enterprise World
Building Advanced Web UI in The Enterprise WorldBuilding Advanced Web UI in The Enterprise World
Building Advanced Web UI in The Enterprise World
 
IT103Microsoft Windows XP/OS Chap11
IT103Microsoft Windows XP/OS Chap11IT103Microsoft Windows XP/OS Chap11
IT103Microsoft Windows XP/OS Chap11
 
La energia y la relacion con el desarrollo tecnologico
La energia y la relacion con el desarrollo tecnologicoLa energia y la relacion con el desarrollo tecnologico
La energia y la relacion con el desarrollo tecnologico
 
Parking hormigon prefabricado
Parking hormigon prefabricadoParking hormigon prefabricado
Parking hormigon prefabricado
 
Zonas erroneas y la salud mental
Zonas erroneas y la salud mentalZonas erroneas y la salud mental
Zonas erroneas y la salud mental
 
El aprendizaje y el cerebro humano
El aprendizaje y el cerebro humanoEl aprendizaje y el cerebro humano
El aprendizaje y el cerebro humano
 
IT103Microsoft Windows XP/OS Chap14
IT103Microsoft Windows XP/OS Chap14IT103Microsoft Windows XP/OS Chap14
IT103Microsoft Windows XP/OS Chap14
 
DTA 2011 REV B
DTA 2011 REV BDTA 2011 REV B
DTA 2011 REV B
 
A Track Record of Ingenuity...
A Track Record of Ingenuity...A Track Record of Ingenuity...
A Track Record of Ingenuity...
 
Aparato circulatorio
Aparato circulatorioAparato circulatorio
Aparato circulatorio
 
Javascript for Wep Apps
Javascript for Wep AppsJavascript for Wep Apps
Javascript for Wep Apps
 
IT103Microsoft Windows XP/OS Chap16
IT103Microsoft Windows XP/OS Chap16IT103Microsoft Windows XP/OS Chap16
IT103Microsoft Windows XP/OS Chap16
 
La computadora
La computadoraLa computadora
La computadora
 
Assistive technology
Assistive technologyAssistive technology
Assistive technology
 
Stay Out Please
Stay Out PleaseStay Out Please
Stay Out Please
 
Organizadores
OrganizadoresOrganizadores
Organizadores
 
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
 
IT103Microsoft Windows XP/OS Chap13
IT103Microsoft Windows XP/OS Chap13IT103Microsoft Windows XP/OS Chap13
IT103Microsoft Windows XP/OS Chap13
 

Similar to IT103 Microsoft Windows XP/OS Chap07

Chapter07 Advanced File System Management
Chapter07      Advanced  File  System  ManagementChapter07      Advanced  File  System  Management
Chapter07 Advanced File System ManagementRaja Waseem Akhtar
 
IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06blusmurfydot1
 
Description Of A Network Administrator
Description Of A Network AdministratorDescription Of A Network Administrator
Description Of A Network Administrator
Gina Alfaro
 
Chapter05 Managing File Access
Chapter05      Managing  File  AccessChapter05      Managing  File  Access
Chapter05 Managing File AccessRaja Waseem Akhtar
 
CH11.pdf
CH11.pdfCH11.pdf
CH11.pdf
ImranKhan880955
 
SNAW-Assignment.docx
SNAW-Assignment.docxSNAW-Assignment.docx
SNAW-Assignment.docx
AbdulHafeez423332
 
Lecture 4 FreeBSD Security + FreeBSD Jails + MAC Security Framework
Lecture 4 FreeBSD Security + FreeBSD Jails + MAC Security FrameworkLecture 4 FreeBSD Security + FreeBSD Jails + MAC Security Framework
Lecture 4 FreeBSD Security + FreeBSD Jails + MAC Security Framework
Mohammed Farrag
 
CIT173_Ch15_Mnstr_23.pdf
CIT173_Ch15_Mnstr_23.pdfCIT173_Ch15_Mnstr_23.pdf
CIT173_Ch15_Mnstr_23.pdf
LilyMorningstar1
 
OS Unit IV.ppt
OS Unit IV.pptOS Unit IV.ppt
OS Unit IV.ppt
FarhanaMariyam1
 
10.file system interface
10.file system interface10.file system interface
10.file system interface
Senthil Kanth
 
Guide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File SystemsGuide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File Systems
Gene Carboni
 
ch12-File-System Implementation (1).pptx
ch12-File-System Implementation (1).pptxch12-File-System Implementation (1).pptx
ch12-File-System Implementation (1).pptx
Tulasi72
 
File system security
File system securityFile system security
File system security
AmmAr mobark
 
file management
 file management file management
file management
Sweta Kumari Barnwal
 
Model of file system
Model of file systemModel of file system
Model of file system
Ishucs
 
Running head Identifying Potential Malicious Attacks1IDEN.docx
Running head Identifying Potential Malicious Attacks1IDEN.docxRunning head Identifying Potential Malicious Attacks1IDEN.docx
Running head Identifying Potential Malicious Attacks1IDEN.docx
cowinhelen
 
6 Elements_Permissions.pdf
6 Elements_Permissions.pdf6 Elements_Permissions.pdf
6 Elements_Permissions.pdf
Jeff Smith
 

Similar to IT103 Microsoft Windows XP/OS Chap07 (20)

Chapter07 Advanced File System Management
Chapter07      Advanced  File  System  ManagementChapter07      Advanced  File  System  Management
Chapter07 Advanced File System Management
 
IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06IT109 Microsoft Operating Systems Unit 05 lesson 06
IT109 Microsoft Operating Systems Unit 05 lesson 06
 
Description Of A Network Administrator
Description Of A Network AdministratorDescription Of A Network Administrator
Description Of A Network Administrator
 
G Mac Chapter05
G Mac Chapter05G Mac Chapter05
G Mac Chapter05
 
Chapter05 Managing File Access
Chapter05      Managing  File  AccessChapter05      Managing  File  Access
Chapter05 Managing File Access
 
70-272 Chapter09
70-272 Chapter0970-272 Chapter09
70-272 Chapter09
 
CH11.pdf
CH11.pdfCH11.pdf
CH11.pdf
 
SNAW-Assignment.docx
SNAW-Assignment.docxSNAW-Assignment.docx
SNAW-Assignment.docx
 
Lecture 4 FreeBSD Security + FreeBSD Jails + MAC Security Framework
Lecture 4 FreeBSD Security + FreeBSD Jails + MAC Security FrameworkLecture 4 FreeBSD Security + FreeBSD Jails + MAC Security Framework
Lecture 4 FreeBSD Security + FreeBSD Jails + MAC Security Framework
 
CIT173_Ch15_Mnstr_23.pdf
CIT173_Ch15_Mnstr_23.pdfCIT173_Ch15_Mnstr_23.pdf
CIT173_Ch15_Mnstr_23.pdf
 
70 271 Stu Chap05
70 271 Stu Chap0570 271 Stu Chap05
70 271 Stu Chap05
 
OS Unit IV.ppt
OS Unit IV.pptOS Unit IV.ppt
OS Unit IV.ppt
 
10.file system interface
10.file system interface10.file system interface
10.file system interface
 
Guide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File SystemsGuide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File Systems
 
ch12-File-System Implementation (1).pptx
ch12-File-System Implementation (1).pptxch12-File-System Implementation (1).pptx
ch12-File-System Implementation (1).pptx
 
File system security
File system securityFile system security
File system security
 
file management
 file management file management
file management
 
Model of file system
Model of file systemModel of file system
Model of file system
 
Running head Identifying Potential Malicious Attacks1IDEN.docx
Running head Identifying Potential Malicious Attacks1IDEN.docxRunning head Identifying Potential Malicious Attacks1IDEN.docx
Running head Identifying Potential Malicious Attacks1IDEN.docx
 
6 Elements_Permissions.pdf
6 Elements_Permissions.pdf6 Elements_Permissions.pdf
6 Elements_Permissions.pdf
 

More from blusmurfydot1

IT103Microsoft Windows XP/OS Chap05
IT103Microsoft Windows XP/OS Chap05IT103Microsoft Windows XP/OS Chap05
IT103Microsoft Windows XP/OS Chap05blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap15
IT103Microsoft Windows XP/OS Chap15IT103Microsoft Windows XP/OS Chap15
IT103Microsoft Windows XP/OS Chap15blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap12
IT103Microsoft Windows XP/OS Chap12IT103Microsoft Windows XP/OS Chap12
IT103Microsoft Windows XP/OS Chap12blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap04
IT103Microsoft Windows XP/OS Chap04IT103Microsoft Windows XP/OS Chap04
IT103Microsoft Windows XP/OS Chap04blusmurfydot1
 
Microsoft Windows XP/OS Chapt03
Microsoft Windows XP/OS Chapt03Microsoft Windows XP/OS Chapt03
Microsoft Windows XP/OS Chapt03blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap02
IT103Microsoft Windows XP/OS Chap02IT103Microsoft Windows XP/OS Chap02
IT103Microsoft Windows XP/OS Chap02blusmurfydot1
 
IT103Microsoft Windows XP/OS Chap01
IT103Microsoft Windows XP/OS Chap01IT103Microsoft Windows XP/OS Chap01
IT103Microsoft Windows XP/OS Chap01blusmurfydot1
 
IT109 Microsoft Windows Operating Systems Unit 09 lesson12
IT109 Microsoft Windows Operating Systems Unit 09 lesson12IT109 Microsoft Windows Operating Systems Unit 09 lesson12
IT109 Microsoft Windows Operating Systems Unit 09 lesson12blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 02
IT109 Microsoft Windows 7 Operating Systems Unit 02IT109 Microsoft Windows 7 Operating Systems Unit 02
IT109 Microsoft Windows 7 Operating Systems Unit 02blusmurfydot1
 
IT109 Microsoft Windows 7 Operating Systems Unit 01
IT109 Microsoft Windows 7 Operating Systems Unit 01IT109 Microsoft Windows 7 Operating Systems Unit 01
IT109 Microsoft Windows 7 Operating Systems Unit 01blusmurfydot1
 

More from blusmurfydot1 (15)

IT103Microsoft Windows XP/OS Chap05
IT103Microsoft Windows XP/OS Chap05IT103Microsoft Windows XP/OS Chap05
IT103Microsoft Windows XP/OS Chap05
 
IT103Microsoft Windows XP/OS Chap15
IT103Microsoft Windows XP/OS Chap15IT103Microsoft Windows XP/OS Chap15
IT103Microsoft Windows XP/OS Chap15
 
IT103Microsoft Windows XP/OS Chap12
IT103Microsoft Windows XP/OS Chap12IT103Microsoft Windows XP/OS Chap12
IT103Microsoft Windows XP/OS Chap12
 
IT103Microsoft Windows XP/OS Chap04
IT103Microsoft Windows XP/OS Chap04IT103Microsoft Windows XP/OS Chap04
IT103Microsoft Windows XP/OS Chap04
 
Microsoft Windows XP/OS Chapt03
Microsoft Windows XP/OS Chapt03Microsoft Windows XP/OS Chapt03
Microsoft Windows XP/OS Chapt03
 
IT103Microsoft Windows XP/OS Chap02
IT103Microsoft Windows XP/OS Chap02IT103Microsoft Windows XP/OS Chap02
IT103Microsoft Windows XP/OS Chap02
 
IT103Microsoft Windows XP/OS Chap01
IT103Microsoft Windows XP/OS Chap01IT103Microsoft Windows XP/OS Chap01
IT103Microsoft Windows XP/OS Chap01
 
IT109 Microsoft Windows Operating Systems Unit 09 lesson12
IT109 Microsoft Windows Operating Systems Unit 09 lesson12IT109 Microsoft Windows Operating Systems Unit 09 lesson12
IT109 Microsoft Windows Operating Systems Unit 09 lesson12
 
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
IT109 Microsoft Windows 7 Operating Systems Unit 08 lesson 11
 
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 08
 
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
IT109 Microsoft Windows 7 Operating Systems Unit 04 lesson 04
 
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 02
 
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
IT109 Microsoft Windows 7 Operating Systems Unit 03 lesson 01
 
IT109 Microsoft Windows 7 Operating Systems Unit 02
IT109 Microsoft Windows 7 Operating Systems Unit 02IT109 Microsoft Windows 7 Operating Systems Unit 02
IT109 Microsoft Windows 7 Operating Systems Unit 02
 
IT109 Microsoft Windows 7 Operating Systems Unit 01
IT109 Microsoft Windows 7 Operating Systems Unit 01IT109 Microsoft Windows 7 Operating Systems Unit 01
IT109 Microsoft Windows 7 Operating Systems Unit 01
 

Recently uploaded

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 

Recently uploaded (20)

Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 

IT103 Microsoft Windows XP/OS Chap07

Editor's Notes

  1. This lesson helps to demystify the inner workings of the NTFS file system. Without getting highly technical, it provides enough information to help students understand how NTFS manages security. Students should become familiar with the use of access control lists (ACLs) and access control entries (ACEs). A good understanding of these concepts is fundamental to understanding how permissions are validated during operation.
  2. This slide depicts the MFT in NTFS. It is a common misconception that security descriptors (ACLs) reside in the MFT. Beginning with NTFS 5, they are stored in a separate metadata file ($Secure) in the NTFS volume. This provides, in essence, single-instance storage of ACLs so they can be reused wherever the same permissions are applied. This allows one security descriptor to be used for every folder and file in a folder tree that has the same permissions. The result is a great savings in space formerly required to store an ACL for each file and folder in the tree. These security descriptors are referenced in the MFT record as a security index value ($SII).
  3. Security descriptors, stored in the $Secure metadata file, contain the ACLs for files and folders. When a user wants to open a file, the user’s application packages a request containing the requested operation and the user’s access token. This is compared with the ACL for the requested resource; if the user has the required permissions, the operation is allowed.
  4. ACLs are assigned to the security descriptor for an object stored in NTFS, and they contain ACEs that define the allowed permissions for each user and group that is assigned access to the object. The two types of ACLs are discretionary ACLs (DACLs), which control access permissions to objects, and system ACLs (SACLs), which control security auditing for the object.
  5. ACEs are the basic building blocks of NTFS security. They map user or group identities with assigned permissions and control file system security auditing by listing which file system operations will be audited for the assigned object. Allow ACEs define which operations are allowed on an object for the specified user or group. Deny ACEs list which operations are specifically denied. Deny ACEs always override Allow ACEs and are used to define exceptions to the general Allow rules for the object. Audit ACEs are stored in SACLs to define which operations will be audited by file system auditing. Audit entries are added to the system’s Security event log when audited operations are performed.
  6. This slide shows the standard NTFS permissions. As you describe them, be sure to explain the operations allowed by each permission. When we discuss special permissions in the next slide, you can show students how the operations are aggregated into the standard permissions. List Folder Contents and Read & Execute appear to be the same, but they differ in how they allow inheritance. List Folder Contents can be inherited only by subfolders, while Read & Execute can be inherited by both subfolders and files.
  7. This slide lists the special permissions that make up each of the standard NTFS permissions. If classroom equipment permits, display the Advanced Security Settings dialog box while you discuss special permissions so students can see where special permissions are configured and you can demonstrate the effects of setting custom combinations of special permissions.
  8. Permissions are inherited by all subfolders and files unless they are prevented or blocked. When blocking inheritance, you can copy existing permissions or remove all permissions and start anew. Only by blocking inherited permissions can you modify the permissions of a folder. Discuss scenarios in which a user might see unexpected effects of permission blocking (such as when the user expects new permissions applied on a top-level folder to be inherited, but they are not).
  9. When you move or copy files or folders, the only time permissions are preserved without the aid of Xcopy.exe is when the object is moved within an NTFS volume. In all other operations, the object inherits permissions from the destination folder (even when the permissions are “None” in the case of a FAT volume). There is a registry hack (ForceCopyAclWithFile) that causes Windows Explorer to preserve permissions, but this causes all move or copy operations to copy ACLs and might result in unintended consequences if not properly documented. Discuss how moving or copying files might complicate effective permissions (moving files into folders and then wondering why users cannot access them or wondering why users can access files they should be locked out of).
  10. By using these best practices, students can plan effective permission policies for their folders. By consolidating data that requires like permissions into folders and assigning permissions to groups of users, you can greatly simplify the process of assigning permissions. Advise students to carefully document any blocked inheritance or use of the Deny ACE. If time permits, construct a fictional folder tree and discuss permissions assignment as a class exercise.
  11. Use the Security tab of an object’s Properties dialog box to assign NTFS standard permissions. If time and classroom equipment permit, demonstrate the assignment of permissions to a folder. Browse for a security group, and apply permissions. As you apply permissions, discuss which permissions are most effective for the resource for the group you selected. Try to inject real-world factors into the exercise.
  12. If you need to assign special permissions to an NTFS folder, you can do so by editing permissions in the Advanced Settings dialog box. This slide depicts the editing of special permissions for the Administrators group on the Syllabi folder. The last frame depicts the clearing of the Write Extended Attributes permission.
  13. When permissions are inherited, you must block inheritance to apply new permissions to a folder. You do this in the Advanced Security Settings dialog box. Demonstrate this, and make note of the option to copy or remove existing permissions. Show students how this dialog box also indicates which folder the inherited permissions are coming from.
  14. If a user is not the owner of a folder or does not have at least Read permission to it, she cannot see what permissions have been assigned. If she is an administrator, she must take ownership of the folder in order to be able to set permissions on it. Demonstrate taking ownership if time permits, and discuss how you might “give” ownership to another user by assigning him the Take Ownership permission and having him take ownership of the folder. Be sure to emphasize that there is no other way to transfer ownership.
  15. CACLS.exe is a powerful command-line tool that you can use to change ACLs for a folder or multiple folders. It is especially effective for automating periodic permission changes, such as locking users out of a folder during backups or special processing. Demonstrate the following CACLS commands on a data folder: CACLS <foldername> Lists permissions CACLS <foldername> /G Adminisrators:F Removes all permissions and assigns Full Control to Administrators CACLS <foldername> /E /G Users:R Grants Users Read permission without modifying other permissions CACLS <foldername> /E /R Users Revokes access to Users Discuss how /R and /D differ: /R removes a specific ACE but allows access from other ACEs that the user or group might have. /D creates a Deny ACE for the user or group.
  16. This slide deals with calculating effective permissions from multiple ACEs for a user or group. The effective permission is the most lenient of all the permissions from ACEs the user or group is associated with. A Deny ACE, however, overrides all Allow ACEs for the Deny permission.
  17. This slide depicts the Effective Permissions tab of the Advanced Security Settings dialog box. This feature helps you troubleshoot effective permissions issues.
  18. This slide depicts the setting and monitoring of NTFS object access auditing. Be sure to mention the two steps to enable auditing: enabling object access auditing and enabling the auditing for the object in question. Discuss how auditing, combined with permissions, might be used to provide security for a highly secure folder.
  19. Lead a discussion about planning permissions for the folder tree on this slide. For each folder, select groups likely to be used for permissions on each folder, and discuss how to assign permissions to each folder (block inheritance, etc.). Finally, discuss how you might configure auditing to ensure that privacy of the personnel records is not breached by anyone (even Administrators).
  20. This and the next slide recap the chapter. As you discuss each point, answer any questions students might have. NTFS security is the basis for many aspects of system operation, and NTFS-like security dialog boxes are used for DACLs in other areas, such as Active Directory security.
  21. Remind students that transferring ownership requires giving the permission to take ownership rather than giving ownership directly. Also emphasize the importance of documenting use of the Deny ACE.