38
NTFS

NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

Embed Size (px)

Citation preview

Page 1: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

NTFS

Page 2: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

Authentication

• Is the person who she says she is?• If so, access is allowed• In Windows, authentication is handled by a

password-protected user account.

Page 3: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

Authorization

• What an authenticated user can, and can not, do on a system.

• Authorization for Windows files and folders is controlled by the NTFS file system

• NTFS assigns permissions to users, groups or both

Page 4: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

Principle of least privilege

• Give a user only as much permissions as are required for the tasks they do and no more.

• To much invites trouble

Page 5: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

Local User Account

• Each Windows computer keeps an encrypted list of user names and passwords

• You don’t get to use a computer unless you know a valid user name and password (even if it is blank)

• User also belongs to a group• To create/manage users and groups you need

administrator privileges

Page 6: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

Passwords

• Ultimate key to protecting your computer• For a hacker, this is half the battle• Protect passwords; make them complex; no Post-It

notes on the monitor• Make passwords strong: at least eight characters

including letters, numbers and punctuation symbols• You should change passwords at regular intervals• Password reset disk had to be a floppy – little value;

now can be USB stick in Windows 7; can’t use it if you are on a domain

Page 7: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

Groups

• Groups are collection(s) of accounts with similar needs/permissions

• Add a person/account to a group rather than set permissions for the single account

• XP groups: Administrators, Power Users, Users, Everyone and Guest

• Home editions: Administrators, Users and Guest

Page 8: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

Managing Users in XP

• User Accounts applet in Control Panel• Limited Users see only their account in User

Accounts; Admins see all accounts

Page 9: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

Vista Users

• Three accounts when you set up Vista: guest, administrator and a local account that’s a member of Administrator group

• User Accounts and Family Safety in Home• User Accounts applet in Business, Ultimate

Page 10: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

Add a User - Vista

• Open the User Accounts applet• Click Manage Another Account and select

Create a New Account• Click Create Account• At least one account must be Administrator

Page 11: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

Parental Controls

• Administrator account can monitor and limit the activities of any standard user

• Can be used for employees also• Web sites, applications, files downloaded,

amount of time logged on, access to types of games and specific applications

Page 12: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

Users in 7

• User Accounts Control Panel applet• Open User Accounts and select Manage

Another Account; Create a New Account• Almost the same as Vista

Page 13: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

Local Users and Groups

• Control Panel | Administrative Tools | Computer Management

• Right-click Computer and select Manage | Users and Groups

• Can add Users, Groups or Computers• Can add group membership of a user’s

properties or add a user to a group’s properties

Page 14: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

Authorization Through NTFS

• After creating account, need to specify permissions for files, folders applications, etc.)

• File or folder Properties window then Security tab

• Permissions can be assigned to both user and groups; best practice: groups

• Whoever creates file/folder has complete control over it (ownership)

• Administrators do not automatically have control over every file and folder

Page 15: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

Ownership

• If you created it, you own it and have full control over it

• Can remove Administrator access

Page 16: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

Take Ownership Permission

• With this, you can take ownership of any file or folder and then set permissions as you want

• Administrator accounts have Take Ownership for all files and folders

• Leaves a “trail” behind Administrator

Page 17: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

Change Permission

• Able to take away or give permission to file or folder

• Different from file permission

Page 18: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

Folder Permissions• Full Control: do anything you want• Modify: Anything except delete, change permissions

and take ownership• Read and Execute: Allows you to see the contents of

folder and any subfolders• List Folder Contents: See contents of folder and any

subfolders• Read: enables you to view a folder’s contents and

open any file in the folder• Write: Write to files (and delete) and create new

files/folders

Page 19: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

File Permissions

• Full Control: do anything you want• Modify: Anything except Take Ownership or

Change Permissions• Read and Execute: Open folders and run

application(s)• Read: Open folders and files; not applications• Write: Open and write to file

Page 20: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

The Rule

• Permissions are cumulative. The highest permission is the rule. Except Deny.

• Full Control on folder means full control on files in folder

Page 21: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

Permission Propagation

• Inheritance: Folder gets permissions of parent folder; turned on by default

• Deny trumps anything

Page 22: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

Copy/Move• Copy within partition. Original retains original; copy

inherits new permissions• Moving within partition. Retains permissions

unchanged• Copying across partitions. Original retains original;

copy inherits new permissions• Move across partitions. Inherits permissions from new

location• Copying to FAT partition. New copy has no permissions• Moving to FAT partition. No permissions• (FAT partitions are on flash drives)

Page 23: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

Techs and Permissions

• Major pain; have to have Administrative permissions to do most work

• Try to get new admin account for duration of work

• Make sure admin deletes account when you are done

Page 24: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

Secure Sharing - XP

• Each user has set of folders: My Documents and folders within (My Pictures, etc.)

• Shared Documents: folder all users can access• Simple file sharing is enabled• XP Pro allows full NTFS permissions• Can make My Documents private to block

access; administrator can take ownership• Any folder in Shared Docs is also shared

Page 25: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

Simple File Sharing

• One option: put it in Shared Documents• Over a network have to give everyone full

access• Pro allows turning off SFS: folder | Tools |

Folder Options |View tab. Last option is SFS

Page 26: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account
Page 27: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account
Page 28: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

Sharing in Vista

• Targeted sharing: select user account, then permission level – – Reader, read-only– Contributor, read and write, delete user-created

objects– Co-owner, do anything

• Public folders: share with anyone on the network; full access by default

Page 29: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

Sharing in 7

• Add homegroup to share libraries; accessible by everyone, need password

• Finding shares: Computer Management | Shared Folders. Works in XP and above

Page 30: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

Administrative Shares

• C$• Allow administrators access local or remote• Have to have administrator password (not

blank) to get access to these shares

Page 31: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account
Page 32: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

Encryption

• This is for the really paranoid• Home editions don’t do it• XP uses Encrypting File System to encrypt files• Vista/7 add encryption system that can

encrypt entire hard drive• Tied to password and system ID so if you loose

password, file(s) are gone

Page 33: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account
Page 34: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

BitLocker Drive Encryption

• Again, for the really paranoid or defense contractors

• Select Security in Control Panel Home view• Must have Trusted Platform Module (TPM)

chip on motherboard

Page 35: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account
Page 36: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

User Account Control• What helped bury Vista• The vast majority of users had no idea how risky their

computing behavior was• Long list of dangerous actions – page 709• XP has Power User to handle most of the list; few

people used it• Vista actually has four UAC prompts:– Red for blocked programs– Yellow for unverified programs– Blue/gray for verified programs– Teal for published by Vista programs

Page 37: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

Turn Off UAC

• UAC Control Panel applet; uncheck the box• MSCONFIG and select Disable UAC on Tools

tab

Page 38: NTFS. Authentication Is the person who she says she is? If so, access is allowed In Windows, authentication is handled by a password-protected user account

UAC in 7

• Made UAC less aggressive• Introduced four levels to UAC:– Always notify is same as Vista– Don’t notify me when I make changes (default)– Notify me only when programs try to make

changes– Never notify

• Mike votes for turning UAC back on