Top-Rated Free Essay
Preview

Enable Windows Active Directory and User Access Controls

Good Essays
477 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Enable Windows Active Directory and User Access Controls
50

Lab #3 | Enable Windows Active Directory and User Access Controls

Lab #3 – Assessment Worksheet

Enable Windows Active Directory and User Access Controls
Course Name and Number:

Student Name:

Instructor Name:

Lab Due Date:

Overview
This lab provides students with the hands-on skills needed to create a new Active Directory domain in
Windows Server 2003 and demonstrates how to configure a centralized authentication and policy definition for access controls. The Active Directory users and workstation plug-ins will be used to create users, groups, and configure role-based access permissions and controls on objects and folders in a Windows Server 2003
Active Directory system.

Lab Assessment Questions & Answers 1. What two access controls can be set up for Windows Server 2003 folders and authentication?
The two access controls that can be set up for Windows Server 2003 folders and authentication User or Group

access to the folder and the ability to modify contents of the folder.

2. you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of
If

access controls and permissions are probably configured?
The type of access controls and permissions that are probably configured are Modify , Read or Full control.

3.
What is the Windows tool that allows you to administer granular policies and permissions on a Windows
­

network using role-based access?
The Windows tool that allows you to administer granular policies and permissions on a Windows network using role-based access is the Group Policy Object Editor

38351_LB03_Pass2.indd 50

26/02/13 11:54 PM

Assessment Worksheet

51

4.
Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve

CIA for departmental LANs, departmental folders, and data.

Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA for departmental LANs and departmental folders and data

by using user authentication (logon/password) to access the network. It also give users or groups permissions or deny them access to files or

folders.

5.
Would it be a good practice to include the account or user name in the password? Why or why not?

No because then hackers will have an easier time hacking the password

6.
Can a user who is defined in the Active Directory access a shared drive if that user is not part of

the domain?

No a user cannot access a shared drive if that user is not part of that domain.

Windows Server 2003 require a user's logon/password credentials prior to

accessing shared drives

38351_LB03_Pass2.indd 51

Enable Windows Active Directory and User Access Controls

7.
Does Windows Server 2003 require a user’s logon/password credentials prior to accessing shared drives?

3

26/02/13 11:54 PM

52

Lab #3 | Enable Windows Active Directory and User Access Controls 8.
Using what you know about access controls, what security controls would you recommend when

granting access to LAN systems for guests (i.e., auditors, consultants, third-party individuals, etc.) that will maintain CIA of production systems and data?

38351_LB03_Pass2.indd 52

26/02/13 11:54 PM

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 1 Case Study

    • 825 Words
    • 4 Pages

    Part of managing a Windows Server 2003 network environment requires an administrator to be familiar with both of the different security models that can be implemented along with the roles that a server can hold. The two different security models used in Windows network environments are the workgroup model and the domain model. Please discuss in 500-600 words both options and explain why you would choose one over the other for your implementation.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Finally, the system/application domain would require virtual testing of everything before any implementation, hardening of all servers, and keeping up with patches and updates regularly after testing has been completed. Some of the more efficient ways to implement better access controls in a company would start with the proper level of authorization policies including physical controls for facilities. The authorization policy would appropriate entry system access controls that specify what areas are to be locked at all times and what type of locking mechanism should be implemented. It would also include the implementation of secondary locks on specific equipment and storage cabinets…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    I learned how to add a domain controller to an Active Directory domain, back up and restore Active Directory, and recognize and respond to Active Directory replication issues.…

    • 1334 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    NT1330 FINAL EXAM NOTES

    • 1446 Words
    • 5 Pages

    Network Access Protection is a new feature in Windows Server 2008 that allows network administrators to specify one or more policies that define the conditions under which network access will or will not be permitted.…

    • 1446 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab Part 1: Configure Access Rights to Folder & Files Using Microsoft GPO Manager & Enable Microsoft BSA to Define a Security Baseline Definition…

    • 952 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    access control entry (ACE)/ An entry in an object’s access control list (ACL) that grants permissions to a user or group. Each ACE consists of a security principal (the name of the user, group or computer being granted the permissions) and the specific permissions assigned to that security principal. When you manage permissions in any of the Windows Server 2008 permission systems, you are creating and modifying the ACEs in an ACL.…

    • 4603 Words
    • 19 Pages
    Good Essays
  • Powerful Essays

    Winsec2E Lab02 AW

    • 294 Words
    • 2 Pages

    4. List at least three different types of access control permissions you can enable for…

    • 294 Words
    • 2 Pages
    Powerful Essays
  • Satisfactory Essays

    D) Active Directory Rights Management Services can control what a user is allowed to do with data on a server. You can control printing, copying, transferring and so on.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Admins have access to all files, and other users have access to program files/windows only.…

    • 441 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    lab 4

    • 503 Words
    • 2 Pages

    The type of access controls and permissions that are probably configured are Modify , Read or Full control.…

    • 503 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 2 Assesment

    • 271 Words
    • 3 Pages

    In this lab, you used the Microsoft® Active Directory Users and Computers utility to create and manage…

    • 271 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    LAB 3

    • 368 Words
    • 2 Pages

    2. What two access controls can be set up for Windows Server 2003 folder and authentication?…

    • 368 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Quiz 1

    • 308 Words
    • 2 Pages

    2. Which among the following is the best reason to define security groups while configuring access rights for users in a network?…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    This report will look at various access control methods used by Operating Systems (OS) to control user access to files on a computer and what they can do once they have gained access. In this first section I will look at methods such as Access Control Lists(ACL’s), Capabilities and Encrypting file systems(EFS) and which Operating Systems use these as well as the advantages and disadvantages they have over each other. The second part of my report will focus on one OS and explain in detail the methods it uses to control file access and how it works.…

    • 3039 Words
    • 13 Pages
    Powerful Essays