Windows Server 2008 Security

Size: px
Start display at page:

Download "Windows Server 2008 Security"

Transcription

1 UT 11 indows erver ecurity 5-1

2 hat is Group Policy? A group of policies applied directly to Active irectory bjects Policies can be linked to: ites omains Us Policies are applied by assigning them to the objecta do they apply to specific users or groups 5-1

3 Group Policy Functions Control the user environment. Manipulate tart menu options, wallpaper, colors, and so on. Prevent users from using the Control Panel. Control the computer settings. Configure client settings. Configure the time server client computers use. istribute software. Force software installation. Allow for easy optional software installation through Add/emove Programs. 5-1

4 Group Policy ettings egistry-based control the user environment that are stored in HKY_CUT_U and HKY_LCAL_MACH oftware installations and repairs to keep patches up to date and fix broken apps Folder redirection and offline storage force use of network drive for backup isk quotas can enforce quotas ffline file storage works with folder redirection to provide the ability to cache files locally. This allows files to be available even when the network is inaccessible 5-1

5 Group Policy un cripts ncluding logon, logoff, startup, and shutdown scripts indows eployment ervices () rebuilding or deploying workstations quickly and efficiently Microsoft nternet xplorer settings Provide quick links and bookmarks for user accessibility nforce browser options such as proxy use, acceptance of cookies, and caching options ecurity settings Protect resources on computers in the enterprise. 5-1

6 Group Policy Benefits Company benefits educe Total Cost of wnership (TC) mprove eturn on nvestment () User benefits Access to files either offline or online. Consistent environment. Files are centrally backed up. Administrator benefits Centralized management of computer and user settings. Centralized application distribution. Centralized backup. Centralized security enforcement. 5-1

7 efault Group Policies Two efault group policies are created when active directory is installed efault omain Policy - affects all users and computers in the domain efault omain Controllers Policy - affects all domain controllers within this object As domain controllers are added to the domain, they are automatically placed in this U and are affected by any settings 5-1

8 Group Policy bjects (GPs) Contain all of the Group Policy settings that you wish to implement to user and computer objects within a site, domain, or U Must be associated (linking) with the container to which it is applied There are three types of GPs: Local GPs omain GPs tarter GPs 5-1

9 Group Policy bjects (GPs) Local GP Gpedit.msc (Local Computer Policy) Local ecurity Policy on-local Group Policy bjects ot inherited from the domain tored in ysvol Linked to sites, domains, or Us Applied to all users and computers in the container f conflict with local A based group policies, non-local take precedence 5-1

10 Group Policies in Active irectory Linked to site Affects all users and computers in the site to which the policy is linked, regardless of domain membership Linked to domain Affects all users and computers in the domain to which the policy is linked Linked to U Affects all users and computers in the U to which the policy is linked 5-1

11 Group Policy Group Policies can be linked to sites, domains, or Us (not groups) to apply those settings to all users and computers within these Active irectory containers You can use security group filtering, which allows you to apply GP settings to specific users or groups within a container by selectively granting the Apply Group Policy permission to one or more users or security groups 5-1

12 Local GP The local GP settings are stored on the local computer in the %systemroot%/ystem3/grouppolicy folder Local GPs contain fewer options They do not support folder redirection or Group Policy software installation Fewer security settings are available hen a local and a nonlocal (Active irectory based) GP have conflicting settings, the local GP is overwritten by the nonlocal GP 5-1

13 onlocal GPs onlocal GPs are created in Active irectory They are linked to sites, domains, or Us. nce linked to a container, the GP is applied to all users and computers within that container by default GPs are stored in two places: Group Policy container (GPC) An Active irectory object that stores the properties of the GP Group Policy template (GPT) Located in the Policies subfolder of the YL share, the GPT is a folder that stores policy settings, such as security settings and script files 5-1

14 tarter GPs A new feature in indows erver Used as GP templates within Active irectory Allow you to configure a standard set of items that will be configured by default in any GP that is derived from a starter GP 5-1

15 Creating & Managing Group Policies The Group Policy Management Console (GPMC) is the Microsoft Management Console (MMC) snap-in that is used to create and modify Group Policies and their settings hen you configure a GP, you will use the Group Policy Management ditor, which can be accessed through the GPMC or through Active irectory Users and Computers 5-1

16 Group Policy ettings Configuring Group Policy settings enables you to customize the configuration of a user s desktop, environment, and security settings. The actual settings are divided into two subcategories: Computer Configuration User Configuration 5-1

17 Group Policy ettings The Computer Configuration and the User Configuration nodes contain three subnodes oftware ettings Used to install software indows ettings Used for define security settings and scripts Administrative Templates ncludes thousands of Administrative Template policies, which contain all registry-based policy settings They are used to generate the user interface for the Group Policy setting 5-1

18 GP nheritance You link a GP to a domain, site, or U or create and link a GP to one of these containers in a single step The settings within that GP apply to all child objects within the object 5-1

19 How Group Policies are Used uring computer startup, a list of GPs for the computer is obtained. Computer settings are applied during startup. tartup scripts are run. indows Logon prompt appears when step 3 completes. Upon successful validation of user, the user profile loads. A list of GPs for the user is obtained. Logon scripts are run. The user interface appears. At log off and shutdown any log off and shutdown scripts are run 5-1

20 Processing Group Policy Processing rder 1. Local Policies. ite Policies 3. omain Policies 4. U Policies Multiple policies at the same level applied bottom up f there is a conflict on a particular setting By default, the last policy applied wins xceptions: o verride, Block Policy nheritance, and User Group Policy loopback processing mode 5-1

21 o verride nsures policy is applied, regardless of priority, hierarchy, inheritance blocking, or conflicting settings Configured on a per-policy basis 5-1

22 Block Policy nheritance Prevents policies from being inherited from higher levels in the Active irectory hierarchy Can be used at the omain or U level only not per policy Cannot stop a policy marked as o verride 5-1

23 ecurity ettings Account password and account lock out and user authentication) for the domain Local audit, user rights and security for the local Machine vent Log Policy size, history and accessibility estricted Groups control the members and members of properties in security groups (used to populate local machines groups with the domain values) ystem ervices control service startup mode and access permissions 5-1

24 ecurity ettings egistry & File ystem access permissions and audit setting per key or per file system object ireless network preferred networks, authentication types, etc. Public Key - ncrypted File ystem, automatic request certificate request, trusted root certificates, and an enterprise trust list oftware estriction allow or disallow application redirection for specific applications, folder redirection, offline files control and disk quotas Pec for A assign policies based on P address 5-1

25 Account Policies Account policies influence how a user interacts with a computer or a domain By default, they are linked to the efault omain Policy This account policy is applied to all accounts throughout the domain by default, unless you create one or more Fine-Grained Password Policies (FGPP) that override the domainwide policy. These Fine-Grained Password Policies can be applied 5-1

26 Fine-Grained Password Policy Prior to indows erver Active irectory domain you were only able to configure a single Password Policy Account Lockout Policy The only choice was configuring a separate domain or forcing all users within the domain to conform to a single password policy Beginning in indows erver, you can configure Fine-Grained Password Policies, which allow you to define multiple password policies within a single domain 5-1

27 Kerberos Policy Kerberos is the default mechanism for authenticating domain users in indows erver, indows erver 3, and Microsoft indows Kerberos is a ticket-based system that allows domain access by using a Key istribution Center (KC) These tickets have a finite lifetime and are based in part on system time clocks ote that Kerberos has a 5-minute clock skew tolerance between the client and the domain controller f the clocks are off by more than 5 minutes, the client will not be able to log on 5-1

28 Kerberos Policy nforce User Logon estrictions tells indows erver to validate each request for a session ticket against the rights associated with the user account Although this process can slow the response time for user access to resources, it is an important security feature that should not be overlooked or disabled nforce User Logon estrictions is enabled by default 5-1

29 Local Policies Allow administrators to set user privileges on the local computer that govern what users can do on the computer and determine if these actions are tracked within an event log (auditing): User ights Assignment. ecurity ptions. Audit Policy. 5-1

30 Audit Policy ystem events vents that trigger a log entry include system startups and shutdowns system time changes system event resources exhaustion, such as when an event log is filled and can no longer append entries security log cleaning any event that affects system security or the security log n the efault omain Controllers GP, this setting is set to log successes by default 5-1

31 Policy Change vents By default, this policy is set to audit successes in the efault omain Controllers GP. Policy change audit log entries are triggered by user rights assignment changes establishment or removal of trust relationships Pec policy agent changes grants or removals of system access privileges 5-1

32 Account Management vents This policy setting is set to audit successes in the efault omain Controllers GP This setting triggers an event based on changes to account and group properties user or group account creation eletion enaming nabling isabling 5-1

33 Logon vents This setting logs events related to successful user log-ons on a computer The event is logged on the computer that processes the request The default setting is to log successes in the efault omain Controllers GP. 5-1

34 Audit Policy Audit irectory ervice Access logs user access to Active irectory objects, such as other user objects or Us Audit bject Access logs user access to files, folders, registry keys, and printers, etc. You MUT enable Audit bject Access Then specify what objects you want to audit Audit results are written to the vent iewer security log 5-1

35 Configuring bject Access Auditing ight-click the file or folder you want to audit. elect Properties n the ecurity tab, click Advanced n the Advanced ecurity ettings dialog box, select the Auditing tab elect the appropriate user or group 5-1

36 estricted Groups Policy Allows an administrator to specify group membership lists You can control membership in important groups, such as the local Administrators 5-1

37 Folder edirection Policy Folder redirection redirects the contents of certain folders to a network location or to another location on the user s local computer Contents of folders on a local computer located in the ocuments and ettings folder can be redirected Basic edirects veryone's Folder To The ame Location and you must specify the Target folder location in the ettings dialog box Advanced can pecify Locations For arious User Groups and you must specify the target folder location for each group that you add in the ettings dialog box 5-1

38 ffline Files Policy Can allow files to be available to users, even when the users are disconnected from the network. The ffline Files feature works well with Folder edirection hen ffline Files is enabled, users can access necessary files as if they were connected to the network hen the network connection is restored, changes made to any documents are automatically updated to the server Folders can be configured so that either all files or only selected files within the folder are available for offline use hen it is combined with Folder edirection, users have the benefits of being able to redirect files to a network location and still have access to the files when the network connection is not present 5-1

39 Limit the amount of space available on the server for user data Can be enforce on all users domain wide isk Quotas 5-1

40 Group Policy efresh Computer configuration group policies are refreshed every 9 minutes (+/- 3 minutes) by default omain controller group policies are refreshed every minutes You can force group policies by using the gpupdate command: gpupdate /force 5-1

41 GPUpdate Command f you make changes to a group policy, users may not see changes take effect until They log off or log back in They eboot the computer They wait 9 minutes (+/- 3 minutes) for stand-alone servers/workstations and minutes for domain controllers To manually push group policies, you need to use the gpupdate command Gpupdate /force 5-1

42 A ights Management A new feature that allows users to provide better security for Microsoft applications Basically a second level of protection beyond the normal access list permission restrictions t chief advantage is the ability to block document forwarding and printing 5-1

43 Feature Attests to the identity of the publisher ifferentiates permissions by a user A M ecure/multipurp ose nternet Mail xtension (/MM) igning /MM ncryption Access control lists (ACLs) ncrypting File ystems (F) Prevents unauthorized viewing ncrypts protected content ffers content expiration Controls content reading Modifying, or printing by user xtends protection beyond initial publication 5-1

44 oftware Lifecycle 5-1

45 Group Policy oftware Management Group Policy can be used to nstall Upgrade Patch remove software applications Under the following conditions when a computer is started when a user logs on to the network when a user accesses a file associated with a program that is not currently on the user s computer Group Policy can be used to fix problems associated with applications 5-1

46 indows nstaller ervice.m File s a relational database file that is copied to the target computer system with the program files it deploys Assists in the self-healing process for damaged applications and clean application removal Consists of external source files that may be required for the installation or removal of software ncludes summary information about the software and the package ncludes reference point to the path where the installation files are located is responsible for automating the installation and configuration of the designated software 5-1

47 .MT File You may need to modify indows nstaller files to better suit the needs of your corporate network. Modifications to.msi files require transform files, which have an.mst extension 5-1

48 Patch file (.msp) Patch files are used to apply service packs and hot fixes to installed software nstead, it contains, at minimum, a database transform procedure that adds patching information to the target installation package database.msp files should be located in the same folder as the original.msi file when you want the patch to be applied as part of the Group Policy software installation This allows the patch file to be applied to the original package or.msi file 5-1

49 oftware istribution Point Before deploying software using Group Policy, you must create a distribution share/oftware distribution point Users who are affected by the Group Policy assignment should be assigned TF ead permission to the folder containing the application and package files 5-1

50 Assigning and Publishing oftware Assigning oftware f you assign the program to a user, it is installed when the user logs on to the computer f you assign the program to a computer, it is installed when the computer starts, and it is available to all users who log on to the computer hen a user first runs the program, the installation is finalized. Publishing oftware You can publish a program distribution to users. hen the user logs on to the computer, the published program is displayed in the Add or emove Programs dialog box, and it can be installed from there 5-1

51 oftware estrictions Policies Provides methods to control the use of software applications through Group Policy trategy Unrestricted - Allow all except explicitly denied (default) isallowed - eny all except explicitly allowed Basic User block applications that require administrative rights, but allows programs that are accessible by normal users efault oftware estriction Policy - Unrestricted 5-1

52 oftware estrictions Policies Four types of software restriction exist Hash rule - attaches hash that governs whether it can run Certificate rule allows execution to specific file types Path rule - can bypass default security setting for specific files etwork zone rule determine if the application is allowed to be installed (.msi only) 5-1

53 F ncrypting File ystem (F) sets up a unique, private encryption key associated with the user account that encrypted the folder or file hen you move an encrypted fi le to another folder on the same computer, that file remains encrypted, even if you rename it The cipher command line utility can encrypt or decrypt folders and files 5-1

54 BitLocker Trusted Platform Module (TPM) must be available (chip or controller on motherboard) transparent to user Can also use a UB drive with the necessary identification info to access hard disks You must create an operating system partition no less than 1.5 GB in size A second primary partition for bitlocker Bit locker has it own control panel 5-1

55 etwork Access Protection psec - can prevent non-co,pliant computers from communication with complient computers using a network policy server AT prevents outsiders from knowing a computer s P address P secure encrypted network access through the internet HCP configured through the network policy server Terminal ervices Gateway uses a network policy server.1x verifies client and provides a secure port 5-1

56 Case tudy You are a computer consultant The Park Publishing network consists of a single Active irectory domain with four domain controllers running indows erver, three file servers, and 3 clients that are evenly divided between indows XP Professional and indows 7 ecently, data was lost when an employee's laptop was stolen and other data was lost during a fire sprinkler system incident in which the employee's computer was destroyed 5-1

57 Case tudy (cont) mployees typically store documents in their My ocuments folder All client computers have P drive mappings that are supposed to be used for storing files ditors frequently work on sensitive documents that should not be accessible to anyone else Given Park Publishing's concerns, answer the following questions: 5-1

58 Case tudy (cont) 1. How would you assure that employees store their data on the server in the future?. How can you address the situation concerning the sensitive data editors use? 3. How would you address the users with mobile computers so that they could work on their files while traveling while keeping the files safe on the server? 4. hat could you do about the existing data in employees My ocuments folder? 5-1

59 ummary Microsoft provides several security options to protect both protect data nad monitor who is accessing it Group Policies can be assigned to sites, domains, and us By default, there is one local policy per computer and a efault omain Policy and a efault omain Controller Policy 5-1

60 ummary Group Policy processing order Local ite omain U Group Policies applied to parent containers are inherited by all child containers and objects nheritance xceptions o veride, Block Policy nheritance, or Loopback settings 5-1

61 ummary Auditing object access and user rights Account policies bject auditing Bit Locker A ights management (A M) ffline file protection isk quotas etwork Access Protection 5-1

62 Lab 11 o all the activities in chapter 13 of the text book Take a screen shot of the results of each activity and paste it into a word document titles Lab 11 mail you completed lab 11 document to donna.warren@comcast.net 5-1

C UNIT 7. Using Group Policy

C UNIT 7. Using Group Policy UN 7 Using Group Policy 2005-2010 opics for this Unit Group policy security settings Audit policies in Windows Server 2008 Folder redirection Managing software using Group Policy he software life cycle

More information

Introduction to Active Directory

Introduction to Active Directory UT ntroduction to Active irectory 5-1 Topics for this Unit irectory ervices Active irectory Forests omains rganizational Units Groups A features ites Accounts 5-1 irectory ervice A directory service is

More information

Updating The Operating System & User Accounts

Updating The Operating System & User Accounts U Updating he perating ystem & User Accounts P PAG YM UPA Update A minor revision to a software product, usually intended to address specific performance issues rather than add new features Upgrade A major

More information

Windows Server 2012 r2

Windows Server 2012 r2 indows erver r P P onna arren 5- onna P. arren ducation A Accounting B lectrical ngineering M Computer cience ork xperience years as Telecommunications etwork ngineer and owner of a small T consulting

More information

File and Print Services

File and Print Services UT 5 File and Print ervices onna arren 5-1 Topics for this Unit File ervers File ystems Physical Hard isks irtual Hard disks istributed File system Printing ervices onna arren 5-1 TF File ystem onna arren

More information

Below is the list of Windows Server Group Policy Interview Questions Asked in Windows System Administrator / L1/l2/l3 Support Engineer Interviews.

Below is the list of Windows Server Group Policy Interview Questions Asked in Windows System Administrator / L1/l2/l3 Support Engineer Interviews. Below is the list of Windows Server Group Policy Interview Questions Asked in Windows System Administrator / L1/l2/l3 Support Engineer Interviews. What is group policy in active directory? What are Group

More information

Advanced Security Measures for Clients and Servers

Advanced Security Measures for Clients and Servers Advanced Security Measures for Clients and Servers Wayne Harris MCSE Senior Consultant Certified Security Solutions Importance of Active Directory Security Active Directory creates a more secure network

More information

Managing Windows Environments with Group Policy

Managing Windows Environments with Group Policy Managing Windows Environments with Group Policy 50255D; 5 Days, Instructor-led Course Description In this course, you will learn how to reduce costs and increase efficiencies in your network. You will

More information

Managing Group Policy application and infrastructure

Managing Group Policy application and infrastructure CHAPTER 5 Managing Group Policy application and infrastructure There is far more to managing Group Policy than knowing the location of specific policy items. After your environment has more than a couple

More information

COPYRIGHTED MATERIAL. Configuring, Deploying, and Troubleshooting Security Templates. Chapter MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:

COPYRIGHTED MATERIAL. Configuring, Deploying, and Troubleshooting Security Templates. Chapter MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Chapter 1 Configuring, Deploying, and Troubleshooting Security Templates MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Configure security templates. Configure registry and file system permissions.

More information

Part I. Windows XP Overview, Installation, and Startup COPYRIGHTED MATERIAL

Part I. Windows XP Overview, Installation, and Startup COPYRIGHTED MATERIAL Part I Windows XP Overview, Installation, and Startup COPYRIGHTED MATERIAL Chapter 1 What s New in Windows XP? Windows XP suffers somewhat from a dual personality. In some ways it is a significant release,

More information

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network Chapter 17 Windows Resources on a Network Objectives Learn how to support some client/server applications Learn how to share and secure files and folders on the network Learn how to troubleshoot network

More information

COPYRIGHTED MATERIAL. Contents. Assessment Test

COPYRIGHTED MATERIAL. Contents. Assessment Test Contents Introduction Assessment Test xxvii xxxvii Chapter 1 Installing Windows 7 1 Introducing Windows 7 2 Windows 7 Architecture 5 Preparing to Install Windows 7 6 Windows 7 Starter 7 Windows 7 Home

More information

MU2b Authentication, Authorization and Accounting Questions Set 2

MU2b Authentication, Authorization and Accounting Questions Set 2 MU2b Authentication, Authorization and Accounting Questions Set 2 1. You enable the audit of successful and failed policy changes. Where can you view entries related to policy change attempts? Lesson 2

More information

Chapter 1: Windows Platform and Architecture. You will learn:

Chapter 1: Windows Platform and Architecture. You will learn: Chapter 1: Windows Platform and Architecture Windows 2000 product family. New features/facilities of. Windows architecture. Changes to the kernel and kernel architecture. New features/facilities. Kernel

More information

x CH03 2/26/04 1:24 PM Page

x CH03 2/26/04 1:24 PM Page 03 078973107x CH03 2/26/04 1:24 PM Page 45 3............................................. Setting Up, Managing, and Troubleshooting Security Accounts and Policies 1. You re a help desk technician for your

More information

Managing and Maintaining a Microsoft Windows Server 2003 Environment

Managing and Maintaining a Microsoft Windows Server 2003 Environment COURSE OVERVIEW This course combines five days of instructor-led training with additional e-learning content to provide students with the knowledge and skills that are required to manage accounts and resources,

More information

Windows Server 2003 Network Administration Goals

Windows Server 2003 Network Administration Goals Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts relating to Windows Server 2003 network management

More information

MCSA Guide to Administering Microsoft Windows Server 2012/R2, Exam Chapter 10 Managing Group Policies

MCSA Guide to Administering Microsoft Windows Server 2012/R2, Exam Chapter 10 Managing Group Policies MCSA Guide to Administering Microsoft Windows Server 2012/R2, Exam 70-411 Chapter 10 Managing Group Policies Objectives Configure group policy scope, precedence, and inheritance Configure group policy

More information

Remote Access, VPNs and Terminal Services

Remote Access, VPNs and Terminal Services U 7 emote Access, s and erminal ervices onna arren 5-1 opics for this Unit emote Administration MMs elegation of authority A (outing and emote Access) (irtual rivate etwork) erminal erver H relay agent

More information

Windows 7 Users, Groups and Security

Windows 7 Users, Groups and Security U indows Users, Groups and ecurity P P onna arren nstalling opics for this Unit Homegroups, workgroups, and domains reate user and group accounts User Account ontrol panel User authentication and authorization

More information

Exam Questions

Exam Questions Exam Questions 70-685 Pro: Windows 7, Enterprise Desktop Support Technician https://www.2passeasy.com/dumps/70-685/ 1.Portable computer users report that they can use Internet Explorer to browse Internet

More information

MS Operating Systems and Networks

MS Operating Systems and Networks In order to learn which questions have been answered correctly: 1. Print these pages. 2. Answer the questions. 3. Send this assessment with the answers via: a. FAX to (212) 967-3498. Or b. Mail the answers

More information

5 MANAGING USER ACCOUNTS AND GROUPS

5 MANAGING USER ACCOUNTS AND GROUPS MANAGING USER ACCOUNTS AND GROUPS.1 Introduction to user accounts Objectives.2 Types of User Accounts.2.1 Local User Account.2.2 Built-in User Account.2.3 Domain User Account.3 User Profile.3.1 Content

More information

Server : Manage and Administer 3 1 x

Server : Manage and Administer 3 1 x Server : Manage and Administer 3 1 x Revised 2016/05/17 TestOut Server Pro: Manage and Administer English 3.1.x Videos: 56 (4:25:22) Demonstrations: 87 (10:14:13) Simulations: 63 Written Lessons: 72 Section

More information

Administering Windows Server 2003 & Data Backup

Administering Windows Server 2003 & Data Backup U Administering indows erver & ata Backup P oday s opics Manage a indows erver system using MMC Access a remote computer using an MMC console Configure a server to enable emote esktop for Administration

More information

70-411: Administrating Windows Server 2012

70-411: Administrating Windows Server 2012 70-411: Administrating Windows Server 2012 Course Overview This course provides students with the knowledge and skills to administer a Windows Server 2012 infrastructure in an enterprise environment. Course

More information

Pass Microsoft Exam

Pass Microsoft Exam Pass Microsoft 98-367 Exam Number: 98-367 Passing Score: 700 Time Limit: 45 min File Version: 51.0 http://www.gratisexam.com/ Pass Microsoft 98-367 Exam Exam Name: Security Fundamentals Certdumps QUESTION

More information

Managing Group Policy application and infrastructure

Managing Group Policy application and infrastructure CHAPTER 5 Managing Group Policy application and infrastructure There is far more to managing Group Policy than knowing the location of specific policy items. After your environment has more than a couple

More information

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/grpolwt.htm

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/grpolwt.htm Page 1 of 17 Windows 2000 Server Step-by-Step Guide to Understanding the Group Policy Feature Set Operating System Abstract Group Policy is the central component of the Change and Configuration Management

More information

Chapter. Accessing Files and Folders MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER

Chapter. Accessing Files and Folders MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER Chapter 10 Accessing Files and Folders MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER Monitor, manage, and troubleshoot access to files and folders. Configure, manage, and troubleshoot file compression

More information

CISNTWK-11. Microsoft Network Server. Chapter 4

CISNTWK-11. Microsoft Network Server. Chapter 4 CISNTWK-11 Microsoft Network Server Chapter 4 User and Group Accounts 1 Usage Notes Throughout these slides, the term Active Directory Domain implies Domains Based on Windows Server 2008 Based on Windows

More information

User Guide. Version R94. English

User Guide. Version R94. English AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

Practical 23 Manage Desktop Configuration using group policy and remote installation services.

Practical 23 Manage Desktop Configuration using group policy and remote installation services. Practical 23 Manage Desktop Configuration using group policy and remote installation services. Group Policy Collection:- Group Policy is an infrastructure that allows you to implement specific configurations

More information

C UNIT 4. Active Directory User Accounts

C UNIT 4. Active Directory User Accounts UN 4 Active irectory User Accounts 2005-2010 efinitions User individual granted access to the system with the following User properties Groups associated with the user Profile path Login script Home directory

More information

70-742: Identity in Windows Server Course Overview

70-742: Identity in Windows Server Course Overview 70-742: Identity in Windows Server 2016 Course Overview This course provides students with the knowledge and skills to install and configure domain controllers, manage Active Directory objects, secure

More information

UNIT 2. Internet Information Server

UNIT 2. Internet Information Server UIT 2 Internet Information erver Topics in this Unit xamine the features in II7 reate web site content Install, configure an II site ublish an II Web site onfigure web site security The Internet The Internet

More information

Server based Networking & Security IS375 Group 5 Project. The purpose of this project is to put into practice what we learned in classroom.

Server based Networking & Security IS375 Group 5 Project. The purpose of this project is to put into practice what we learned in classroom. Server based Networking & Security IS375 Group 5 Project The purpose of this project is to put into practice what we learned in classroom. Beatris M., Zim Y., Lawton P., Mike S. 12/13/2011 Document: Steps

More information

Identity with Windows Server 2016 (742)

Identity with Windows Server 2016 (742) Identity with Windows Server 2016 (742) Install and Configure Active Directory Domain Services (AD DS) Install and configure domain controllers This objective may include but is not limited to: Install

More information

Configure advanced audit policies

Configure advanced audit policies 7 LESSON Configuring Advanced Audit Policies 70-411 EXAM OBJECTIVE Objective 2.4 Configure advanced audit policies. This objective may include but is not limited to: implement auditing using Group Policy

More information

Administering. Windows Server 2012 R2. Exam Wiley. Patrick Regan

Administering. Windows Server 2012 R2. Exam Wiley. Patrick Regan Administering Windows Server 2012 R2 Exam 70-411 Patrick Regan Wiley Contents j Lesson 1: Deploying and Managing Server Images 1 Using Windows Deployment Services 2 Installing the Windows Deployment Services

More information

User Guide. Version R92. English

User Guide. Version R92. English AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

Setting Access Controls on Files, Folders, Shares, and Other System Objects in Windows 2000

Setting Access Controls on Files, Folders, Shares, and Other System Objects in Windows 2000 Setting Access Controls on Files, Folders, Shares, and Other System Objects in Windows 2000 Define and set DAC policy (define group membership, set default DAC attributes, set DAC on files systems) Modify

More information

This course provides students with the knowledge and skills to administer Windows Server 2012.

This course provides students with the knowledge and skills to administer Windows Server 2012. MOC 20411C: Administering Windows Server 2012 Course Overview This course provides students with the knowledge and skills to administer Windows Server 2012. Course Introduction Course Introduction 6m Module

More information

ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference. December 2016

ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference. December 2016 ZENworks 2017 Full Disk Encryption Pre-Boot Authentication Reference December 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,

More information

Installing and Configuring VMware User Environment Manager. VMware User Environment Manager 9.2

Installing and Configuring VMware User Environment Manager. VMware User Environment Manager 9.2 Installing and Configuring VMware User Environment Manager VMware User Environment Manager 9.2 Installing and Configuring VMware User Environment Manager You can find the most up-to-date technical documentation

More information

PASS4TEST 専門 IT 認証試験問題集提供者

PASS4TEST 専門 IT 認証試験問題集提供者 PASS4TEST 専門 IT 認証試験問題集提供者 http://www.pass4test.jp 1 年で無料進級することに提供する Exam : 70-697 Title : Configuring Windows Devices Vendor : Microsoft Version : DEMO Get Latest & Valid 70-697 Exam's Question and Answers

More information

Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003

Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003 Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003 In Windows NT server, the user manager for domains is the primary administrative tool for managing user accounts,

More information

Configuring File Server Resource Manager (FSRM)

Configuring File Server Resource Manager (FSRM) Configuring File Server Resource Manager (FSRM) LESSON 5 70-411 EXAM OBJECTIVE Objective 2.2 Configure File Server Resource Manager (FSRM). This objective may include but is not limited to: install the

More information

Installing and Configuring VMware User Environment Manager

Installing and Configuring VMware User Environment Manager Installing and Configuring VMware User Environment Manager VMware User Environment Manager 9.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

Migration Manager User s Guide

Migration Manager User s Guide Migration Manager User s Guide Table of Contents 1. Introduction... 8 Overview... 8 What is User State?... 8 Operating System Settings... 8 Application Settings... 8 Documents and Data Files... 8 Custom

More information

DigitalPersona Pro Enterprise

DigitalPersona Pro Enterprise DigitalPersona Pro Enterprise Quick Start Guide Version 5 DATA PROTECTION REMOTE ACCESS SECURE COMMUNICATION STRONG AUTHENTICATION ACCESS RECOVERY SINGLE SIGN-ON DigitalPersona Pro Enterprise DigitalPersona

More information

6293A Troubleshooting and Supporting Windows 7 in the Enterprise

6293A Troubleshooting and Supporting Windows 7 in the Enterprise 6293A Troubleshooting and Supporting Windows 7 in the Enterprise Course Number: 6293A Course Length: 3 Days Course Overview This course is designed for Information Technology (IT) professionals who have

More information

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/efsguide.htm

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/efsguide.htm Page 1 of 14 Windows 2000 Server Step-by-Step Guide to Encrypting File System (EFS) Abstract This document provides sample procedures that demonstrate the end-user and administrative capabilities of the

More information

Aspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1

Aspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1 Aspera Connect 2.6.3 Windows XP, 2003, Vista, 2008, 7 Document Version: 1 2 Contents Contents Introduction... 3 Setting Up... 4 Upgrading from a Previous Version...4 Installation... 4 Set Up Network Environment...

More information

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0 BIG-IP Access Policy Manager : Secure Web Gateway Version 13.0 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...9 About APM Secure Web Gateway... 9 About APM benefits for web

More information

Supporting Networked Computers

Supporting Networked Computers CHAPTER 7 Supporting Networked Computers After completing this chapter, you will be able to: Define the main concepts of networking, including the roles of TCP/IP, IP addresses, and subnet masks. Set up

More information

Client Installation and User's Guide

Client Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Client Installation and User's Guide SC27-2809-03 IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Client Installation

More information

MOC 6419B: Configuring, Managing and Maintaining Windows Server based Servers

MOC 6419B: Configuring, Managing and Maintaining Windows Server based Servers MOC 6419B: Configuring, Managing and Maintaining Windows Server 2008- based Servers Course Overview This instructor-led course provides students with the knowledge and skills that are required to manage

More information

Microsoft User Experience Virtualization Deployment Guide

Microsoft User Experience Virtualization Deployment Guide Microsoft User Experience Virtualization Deployment Guide Microsoft User Experience Virtualization (UE-V) is an enterprise-scalable user state virtualization solution that can provide users a consistent

More information

MCSA Windows Server A Success Guide to Prepare- Microsoft Administering Windows Server edusum.com

MCSA Windows Server A Success Guide to Prepare- Microsoft Administering Windows Server edusum.com 70-411 MCSA Windows Server 2012 A Success Guide to Prepare- Microsoft Administering Windows Server 2012 edusum.com Table of Contents Introduction to 70-411 Exam on Administering Windows Server 2012...

More information

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

BitLocker Group Policy Settings

BitLocker Group Policy Settings BitLocker Group Policy Settings Updated: September 13, 2013 Applies To: Windows 8, Windows 8.1, Windows Server 2012, Windows Server 2012 R2 This reference topic for the IT professional describes the function,

More information

Backup, File Backup copies of individual files made in order to replace the original file(s) in case it is damaged or lost.

Backup, File Backup copies of individual files made in order to replace the original file(s) in case it is damaged or lost. Glossary A Active Directory a directory service that inventories, secures and manages the users, computers, rules and other components of a Microsoft Windows network. This service is typically deployed

More information

Install Certificate on the Cisco Secure ACS Appliance for PEAP Clients

Install Certificate on the Cisco Secure ACS Appliance for PEAP Clients Install Certificate on the Cisco Secure ACS Appliance for PEAP Clients Document ID: 64067 Contents Introduction Prerequisites Requirements Components Used Conventions Microsoft Certificate Service Installation

More information

DreamFactory Security Guide

DreamFactory Security Guide DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit

More information

MOC 20411B: Administering Windows Server Course Overview

MOC 20411B: Administering Windows Server Course Overview MOC 20411B: Administering Windows Server 2012 Course Overview This course is part two in a series of three courses that provides the skills and knowledge necessary to implement a core Windows Server 2012

More information

Full file at Chapter 2: Securing and Troubleshooting Windows Vista

Full file at   Chapter 2: Securing and Troubleshooting Windows Vista Chapter 2: Securing and Troubleshooting Windows Vista TRUE/FALSE 1. An elevated command prompt can only be attained by an administrator after he or she has responded to a UAC box. T PTS: 1 REF: 70 2. There

More information

ControlPoint. Managing ControlPoint Users, Permissions, and Menus. February 05,

ControlPoint. Managing ControlPoint Users, Permissions, and Menus. February 05, Managing Users, Permissions, and Menus February 05, 2018 www.metalogix.com info@metalogix.com 202.609.9100 Copyright International GmbH., 2008-2018 All rights reserved. No part or section of the contents

More information

Windows 2000 System Administration Handbook, 1/e

Windows 2000 System Administration Handbook, 1/e Windows 2000 System Administration Handbook, 1/e Will Willis, Lewisville, Texas David Watts, Sugarland, Texas Tillman Strahan, Lewisville, Texas Copyright 2000, 721 pp. Paper format ISBN 0-13-027010-5

More information

Table Of Contents INTRODUCTION... 6 USER GUIDE Software Installation Installing MSI-based Applications for Users...9

Table Of Contents INTRODUCTION... 6 USER GUIDE Software Installation Installing MSI-based Applications for Users...9 Table Of Contents INTRODUCTION... 6 USER GUIDE... 8 Software Installation... 8 Installing MSI-based Applications for Users...9 Installing EXE-based Applications for Users...10 Installing MSI-based Applications

More information

Installing and Configuring Windows Server 2012 R2

Installing and Configuring Windows Server 2012 R2 Installing and Configuring Windows Server 2012 R2 Exam 70-410 Craig Zacker Wiley Lesson 1: Installing Servers 1 Selecting a Windows Server 2012 R2 Edition 2 Supporting Server Roles 3 Supporting Server

More information

Quest Enterprise Reporter 2.0 Report Manager USER GUIDE

Quest Enterprise Reporter 2.0 Report Manager USER GUIDE Quest Enterprise Reporter 2.0 Report Manager USER GUIDE 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this

More information

File systems security: Shared folders & NTFS permissions, EFS Disk Quotas

File systems security: Shared folders & NTFS permissions, EFS Disk Quotas File systems security: Shared folders & NTFS permissions, EFS Disk Quotas (March 23, 2016) Abdou Illia, Spring 2016 1 Learning Objective Understand Shared Folders Assign Shared Folder permissions NTFS

More information

Chapter 14: Advanced Troubleshooting

Chapter 14: Advanced Troubleshooting Chapter 14: Advanced Troubleshooting IT Essentials v6.0 ITE v6.0 1 Chapter 14 - Sections & Objectives 14.0 Introduction Review Troubleshooting Steps 14.1 Computer Components and Peripherals Troubleshoot

More information

Client Installation and User's Guide

Client Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Client Installation and User's Guide SC27-2809-04 IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Client Installation

More information

Privileged Identity App Launcher and Session Recording

Privileged Identity App Launcher and Session Recording Privileged Identity App Launcher and Session Recording 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property

More information

Manually Run Ad Logon Script As Administrator Group Policy

Manually Run Ad Logon Script As Administrator Group Policy Manually Run Ad Logon Script As Administrator Group Policy Startup Scripts for _Group Policy object_ : Lists all the scripts that currently are assigned By default, members of the Domain Administrators

More information

Sophos Central Device Encryption. Administrator Guide

Sophos Central Device Encryption. Administrator Guide Sophos Central Device Encryption Administrator Guide Contents About... 1 Manage BitLocker Drive Encryption... 2 Migrate to...2 Prepare Device Encryption...3 Device Encryption step by step... 3 Device Encryption

More information

Security Pop Quiz Domain 5 for the CompTIA A+, Network+ and Microsoft Certifications

Security Pop Quiz Domain 5 for the CompTIA A+, Network+ and Microsoft Certifications Security Pop Quiz Domain 5 for the CompTIA A+, Network+ and Microsoft Certifications Brought to you by www.rmroberts.com. This Security pop quiz is designed to evaluate your mastery of basic security principles

More information

PMS 138 C Moto Black spine width spine width 100% 100%

PMS 138 C Moto Black spine width spine width 100% 100% Series MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. 2009 Motorola, Inc. Table of

More information

CITRIX 1Y0-200 EXAM QUESTIONS & ANSWERS

CITRIX 1Y0-200 EXAM QUESTIONS & ANSWERS CITRIX 1Y0-200 EXAM QUESTIONS & ANSWERS Number: 1Y0-200 Passing Score: 800 Time Limit: 120 min File Version: 38.7 http://www.gratisexam.com/ CITRIX 1Y0-200 EXAM QUESTIONS & ANSWERS Exam Name: Managing

More information

Privileged Identity App Launcher and Session Recording

Privileged Identity App Launcher and Session Recording Privileged Identity App Launcher and Session Recording 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are

More information

CITRIX 1Y0-722 EXAM QUESTIONS & ANSWERS

CITRIX 1Y0-722 EXAM QUESTIONS & ANSWERS CITRIX 1Y0-722 EXAM QUESTIONS & ANSWERS Number: 1Y0-722 Passing Score: 700 Time Limit: 75 min File Version: 32.0 http://www.gratisexam.com/ CITRIX 1Y0-722 EXAM QUESTIONS & ANSWERS Exam Name: MetaFrame

More information

8 Administering Groups

8 Administering Groups 8 Administering Groups Exam Objectives in this Chapter: Plan a security group hierarchy based on delegation requirements. Plan a security group strategy. Why This Chapter Matters As an administrator, you

More information

March 2011

March 2011 Oracle Enterprise Single Sign-on Logon Manager Best Practices: Configuring the ESSO-LM Agent Release 11.1.1.5.0 21004-01 March 2011 Oracle Enterprise Single Sign-on Logon Manager Best Practices: Configuring

More information

ALTIRIS SECURITY SOLUTION 6.1 FOR HANDHELDS ADMINISTRATOR GUIDE

ALTIRIS SECURITY SOLUTION 6.1 FOR HANDHELDS ADMINISTRATOR GUIDE ALTIRIS SECURITY SOLUTION 6.1 FOR HANDHELDS ADMINISTRATOR GUIDE Notice Copyright 2004 Altiris Inc. All rights reserved. Product Version: 6.1 Document Date: October 14, 2004 Bootworks U.S. Patent No. 5,764,593.

More information

XenApp 6.5 Questions & Answers

XenApp 6.5 Questions & Answers XenApp 6.5 Questions & Answers Citrix Presentation Server 4.5 to Citrix XenApp 5.0 & 6.5 Core differences Microsoft Group Policy can be used to configure provisioned servers on the fly and even reconfigure

More information

Table of Contents. Table of Figures. 2 Wave Systems Corp. Client User Guide

Table of Contents. Table of Figures. 2 Wave Systems Corp. Client User Guide 2 Wave Systems Corp. Client User Guide Table of Contents Overview... 3 What is the Trusted Drive Manager?... 3 Key Features of Trusted Drive Manager... 3 Getting Started... 4 Required Components... 4 Configure

More information

Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface

Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface Avaya Event Processor Release 2.2 Operations, Administration, and Maintenance Interface Document ID: 13-603114 Release 2.2 July 2008 Issue No.1 2008 Avaya Inc. All Rights Reserved. Notice While reasonable

More information

Aventail README ASAP Platform version 8.0

Aventail README ASAP Platform version 8.0 Aventail README 1 Aventail README ASAP Platform version 8.0 Part No. 0850-000010-01 October 19, 2004 This README highlights new features and provides late-breaking information about the Aventail EX-1500

More information

Policy Settings for Windows Server 2003 (including SP1) and Windows XP (including SP2)

Policy Settings for Windows Server 2003 (including SP1) and Windows XP (including SP2) Web 2 Policy Settings for (including SP1) and XP (including SP2) This document was written by Conan Kezema. and XP together introduce more than 270 new administrative template policy settings for you to

More information

AppSense DataNow. Release Notes (Version 4.0) Components in this Release. These release notes include:

AppSense DataNow. Release Notes (Version 4.0) Components in this Release. These release notes include: AppSense DataNow Release Notes (Version 4.0) These release notes include: Components in this Release Important Upgrade Information New Features Bugs Fixed Known Issues and Limitations Supported Operating

More information

Windows 7, Enterprise Desktop Support Technician

Windows 7, Enterprise Desktop Support Technician Windows 7, Enterprise Desktop Support Technician Course 50331D; 5 days, Instructor-led Course Description This five-day instructor-led course provides students with the knowledge and skills needed to isolate,

More information

Group Policy Reference

Group Policy Reference Report Number: C4-053R-00 Group Policy Reference Systems and Network Attack Center (SNAC) Author: David C. Rice Updated: March 2, 2001 Version 1.0.8 National Security Agency 9800 Savage Rd. Suite 6704

More information

NetIQ Advanced Authentication Framework. Deployment Guide. Version 5.1.0

NetIQ Advanced Authentication Framework. Deployment Guide. Version 5.1.0 NetIQ Advanced Authentication Framework Deployment Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 NetIQ Advanced Authentication Framework Deployment 4

More information

Remote Support Security Provider Integration: RADIUS Server

Remote Support Security Provider Integration: RADIUS Server Remote Support Security Provider Integration: RADIUS Server 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks

More information

Quick Start Guide. Kaseya 2

Quick Start Guide. Kaseya 2 LiveConnect Quick Start Guide Kaseya 2 February 13, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book KASPERSKY LAB Kaspersky Administration Kit version 6.0 Reference Book KASPERSKY ADMINISTRATION KIT VERSION 6.0 Reference Book Kaspersky Lab Ltd. Visit our website: http://www.kaspersky.com/ Revision date:

More information

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations 98-367 MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations Which are common symptoms of a virus infection? (Lesson 5 p 135-136) Poor system performance. Unusually low

More information