Preview

lab notes

Good Essays
Open Document
Open Document
251 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
lab notes
1. User-based and groups or role-based controls are two types of access controls for Windows Server 2003 for folders and authentication.
2. Disabling of modify permissions would prevent from copying or modifying a file.
3. Group Policy allows for special policies and permissions on a Windows network via role-based access.
Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA for departmental LANs, departmental folders, and data?
4. Windows Server 2008 provides improvements from Active Directory of Server 2003. Read-only domain controllers (RODC) is possible to replicate a domain controller. Confidentiality - Maintains access across multiple systems with control over access at a central point. Reducing the number of systems that need an independent user/password combo reduces the chance that any one of them might be discovered.

5. Never include username or any name relating to a user. That is a vulnerability itself. Making it easy for attackers to figure out the password. Nothing that can give any type of hints is good practice. Longer passwords with combination or numbers and symbols do make it more challenging.
6. No, machines not joined to the domain cannot access the shared folders.
7. Yes credentials are required before accessing shared drives. Even if you are on the same domain you are sometimes still required to verify login before passing through.
8. Only the rights to view files and folders the guests need. They cannot modify or delete files. Giving more access to Auditors alone could throw up red flags and get you in trouble for breaking security protocols.

You May Also Find These Documents Helpful

  • Better Essays

    Wiley, J. (2012). Windows Server 2008 Active Directory Configuration. Hoboken: John Wiley and Sons, Inc.…

    • 1426 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Nt1330 Unit 1 Case Study

    • 825 Words
    • 4 Pages

    Part of managing a Windows Server 2003 network environment requires an administrator to be familiar with both of the different security models that can be implemented along with the roles that a server can hold. The two different security models used in Windows network environments are the workgroup model and the domain model. Please discuss in 500-600 words both options and explain why you would choose one over the other for your implementation.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    I learned about using Group Policy precedence, as well as the Block Inheritance and Enforce settings.…

    • 1334 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    This group will be given limited access, not allowing for any changes to workstation unless authorized by System Administrator.…

    • 308 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    access control entry (ACE)/ An entry in an object’s access control list (ACL) that grants permissions to a user or group. Each ACE consists of a security principal (the name of the user, group or computer being granted the permissions) and the specific permissions assigned to that security principal. When you manage permissions in any of the Windows Server 2008 permission systems, you are creating and modifying the ACEs in an ACL.…

    • 4603 Words
    • 19 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 4503 Words
    • 19 Pages

    The networking features in Windows Vista have been designed to support high levels of manageability to help reduce the cost of deploying wireless networks and network security policies, as well as to provide quality of service for applications and users. Windows Vista uses Group Policy or command-line scripting via the Network Shell (NETSH) extensively to manage network features, so user don't need to learn or deploy a new management tool, and user can take advantage of existing investment in Active Directory and the Organizational Unit (OU) structure that have already…

    • 4503 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    D) Active Directory Rights Management Services can control what a user is allowed to do with data on a server. You can control printing, copying, transferring and so on.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    lab 4

    • 503 Words
    • 2 Pages

    The Windows tool that allows you to administer granular policies and permissions on a Windows network using role-based access is the Group Policy Object Editor.…

    • 503 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    2. What is an Access Control List (ACL) and how is it useful in a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    admin

    • 946 Words
    • 4 Pages

    1. A Windows Server 2008 computer that has been configured with the Active Directory DS role is…

    • 946 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Quiz 1

    • 308 Words
    • 2 Pages

    2. Which among the following is the best reason to define security groups while configuring access rights for users in a network?…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    Access Control Lists are used by OS’s such as Windows and UNIX. An ACL is a table that informs the OS of each users access rights to an object within the system, the object could be a program, a single file or a folder. Although ACL’s do the same task in a similar way, the different OS’s each have a different way of carrying it out.…

    • 3039 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    Access control methods are a process that determines what services or company resources an employee has access to. These methods will be used to determine what an employee can and cannot access, as well as ways to make sure that all employees are being granted the correct access levels. Authentication is a process of determining whether someone or something is who or what they say they are. Authentication can be a form of determining whether an employee is actually the person that they say they are. Employees can be authenticated by being able to answer personal questions that only they would know or by providing a username and password that only the employee knows.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Satisfactory Essays

    Ip Networking

    • 327 Words
    • 2 Pages

    The Workstation Domain is where all the user information will be confirmed, and an account will be set up. They will need to have a user name and password that is assigned to them by the IT department, before they can access the systems, application or data. No personal devices or removable media will be allowed on the network, and all systems will undergo regular updates, and have anti-virus and anti-malware installed on each workstation for monitoring. There will also be an Access Control List (ACL) drawn up to define what access each individual will have on the network.…

    • 327 Words
    • 2 Pages
    Satisfactory Essays