SlideShare a Scribd company logo
Lecture 9:
More Access Control
and Permissions
Network Design & Administration
Registry Keys
• Registry Keys are the entities used to store
  information about a Windows PC.
• They are used for:
  •   Hardware information




                                                 Network Design & Administration
  •   OS information
  •   Non-OS programs
  •   Users
  •   Preferences

                                                         2
Registry Structure and Use
• The registry is separated into Hives:
   • HKEY_CLASSES_ROOT
       • For installed apps – file associations, etc.




                                                                                     Network Design & Administration
   • HKEY_CURRENT_USER
      • Specific settings for current user. e.g. printer settings.
   • HKEY_LOCAL_MACHINE
      • General to all users. E.g. driver versions.
   • HKEY_USERS
      • Details of all user profiles keys that can access machine.
      • Current_User is a partial list of information.
                                                                                             3
   • HKEY_CURRENT_CONFIG
      • Generated at boot time to give information on local machine configuration.
Registry Entries
                   • For a registry entry
                     to be modified, the
                     program or user has
                     to be allowed to
                     change it!




                                            Network Design & Administration
                   • Here we see the
                     Administrators
                     group given Full
                     Control over this
                     sub-key (via
                     inheritance)

                                                    4
Registry Permissions
• Can see similarities and
  differences between
  these and NTFS
  permissions.
• Different set of standard




                                                                                  Network Design & Administration
  and special permissions.
• Again, inheritance can
  be allowed or stopped,
  and deny/allow priority
  applies.


                              (Note: Write DAC = ability to change ACL for key)           5
Why of interest in a network?
• Various programs may need to run on a server.
   • Those programs must have appropriate access
     to registry keys.
• If users want applications installed locally,




                                                   Network Design & Administration
  problems can occur if the registry keys do not
  have the appropriate ACL’s set.



                                                           6
Active Directory Object
Permissions
Very different again to NTFS and Registry. e.g. -
  • Create child
  • Delete child
  • Standard delete




                                                      Network Design & Administration
  • Delete tree
  • Read property
  • Write property
• Microsoft recommend not changing.
• If changed, performance can be lost due amount of
  information transmitted around network.                     7
Microsoft File Shares
• Allow network clients to actually see folders on a server
  remotely.
• Some shares are created automatically due to the role of
  a server. e.g. NETLOGON share created when becomes a




                                                              Network Design & Administration
  domain controller.
• Shares can be hidden by appending $ to name (so how
  do users find it?)




                                                                      8
Who can create file system
shares?
• Depends on role of machine and therefore
  security risks associated with doing it:
 • Domain Controller – Administrators, Server
   Operators, Enterprise Admins, Domain Admins




                                                   Network Design & Administration
   groups only.
 • Domain Member Server or Workstation -
   Administrators, Server Operators, Power Users
   groups only.
 • Workgroup or Standalone computer (?) -
   Administrators, Power Users groups only.                9
Creating a share using the
MMC Shared Folders Snap-in




                             Network Design & Administration
                             10
File share permissions
• They differ from NTFS.
• Much coarser grain – no special permissions.
• Change in Share Permissions is not the same as




                                                   Network Design & Administration
  Modify in NTFS in the delete area.
• When Share and NTFS permissions both present,
  resultant applied is the most restrictive.
• Do not apply to locally logged on users. (e.g.
  physically local or by Terminal Server)
                                                   11
Limitations / Problems
• Limited scope - Can be applied only to folders and only when
  connecting to the share.
• Lack of flexibility - Permissions applied to the share apply to
  all levels below.
• No replication - Share permissions are not replicated by




                                                                    Network Design & Administration
  domain controller.
• No resiliency - Share permissions cannot be backed up or
  restored via Domain Controller.
• Fragility - Shares (and therefore share permissions) are lost
  when a folder is moved or renamed.
• No auditing possible.
• Do not show up in Effective Permissions tab – Need to be
  looked at independently then considered with NTFS                 12
  permissions to give resultant most restrictive .
Printer Server Topologies
• For cost effectiveness, want multiple users to
  access a single printer.
• What are the options?
  • Locally Attached Printers




                                                                  Network Design & Administration
  • Network Attached Printers
    • Logical printer on every client workstation
      • Logical Printer – object used by operating system to
        represent physical device. Contains settings, defaults,
        drivers and other properties.
    • Print server
      • Print server – receives jobs from clients, stores them    13
        in a print queue and sends 1 by 1 to physical printer,
Locally Attached Printer[1]




                                                                   Network Design & Administration
• Physical security issues (printer has to be close to server).
• When printer share is created the attached server functions as   14
  the print server.
Network attached printer, with
logical printer in every client[1]




                                     Network Design & Administration
                                     15
Problems…
• Each user sees only own jobs – not rest of queue
  (may be lots waiting ahead!)
• Admins cannot manage print queue or
  implement advanced features.




                                                      Network Design & Administration
• Error messages only appear to user machine.
• If driver update required, has to be done on each
  client.
• Print processing not offloaded to server.
                                                      16
Network attached printer, with
print server[1]




                                 Network Design & Administration
                                 17

• Advantages…?
Old UNIX/Linux permissions
• Each file has a set of bits that specify its permissions for 3
  classes of user:
   • Owner, Group Owner, Everyone Else
• Owner is special, and can totally limit access.




                                                                   Network Design & Administration
• Each class has 3 bits: (r) Read, (w) Write, (x) Execute
• These are expressed as rwx if allowed or a – if not
  allowed
   • e.g. rwxr-xr-x means owner allowed all 3, but all others
     only allowed read and execute.
• Super user (root access) can do anything even if not
  owner.                                                           18
Modern UNIX/Linux permissions
• Now support ACLs (partly for compatibility with
  Windows via SAMBA).
• Still based on read, write, execute (not as fiddly
  as Windows NTFS, so SAMBA has to ‘translate’




                                                       Network Design & Administration
  between them)
• ACL’s allow rwx to be set for multiple groups and
  specific users.


                                                       19
Next Time & references
• Keeping systems up to date.
• Hotfixes vs. Service Packs.
• Managing/automating processes.




                                   Network Design & Administration
• [1] MOAC 290 chapter 10




                                   20

More Related Content

PPTX
Lecture 10 the user experience (1)
PPTX
Sna lab prj (1)
PPT
Chap2
PDF
3_metro_msvdi2012-afternoon_hybrid_virtualization170912
PPT
Virtualization (Distributed computing)
PPT
Virtualisation overview
PPTX
11. operating-systems-part-1
PPT
Virtual machine
Lecture 10 the user experience (1)
Sna lab prj (1)
Chap2
3_metro_msvdi2012-afternoon_hybrid_virtualization170912
Virtualization (Distributed computing)
Virtualisation overview
11. operating-systems-part-1
Virtual machine

What's hot (20)

DOC
Jayamohan_Linux_Administrator
PDF
Virtualization and cloud Computing
PPTX
Virtual Machine Migration & Hypervisors
PPTX
Virtual machines and their architecture
PPT
Operating System
PDF
Xen and the Art of Virtualization
PPTX
10. compute-part-2
PPTX
11. operating-systems-part-2
PPTX
Xen and the art of virtualization
PPT
Virtualization
PDF
Ian Pratt Nsdi Keynote Apr2008
PPTX
01. 03.-introduction-to-infrastructure
PDF
Xen Hypervisor
PPTX
Lecture 7 naming and structuring objects
PDF
We4IT lcty 2013 - infra-man - domino run faster
PPSX
Virtualization basics
PPTX
Virtual Machine
PPT
Cpphtp4 ppt 01
PPTX
Configure and Manage Virtualization on different Platforms
PPTX
Virtual machine
Jayamohan_Linux_Administrator
Virtualization and cloud Computing
Virtual Machine Migration & Hypervisors
Virtual machines and their architecture
Operating System
Xen and the Art of Virtualization
10. compute-part-2
11. operating-systems-part-2
Xen and the art of virtualization
Virtualization
Ian Pratt Nsdi Keynote Apr2008
01. 03.-introduction-to-infrastructure
Xen Hypervisor
Lecture 7 naming and structuring objects
We4IT lcty 2013 - infra-man - domino run faster
Virtualization basics
Virtual Machine
Cpphtp4 ppt 01
Configure and Manage Virtualization on different Platforms
Virtual machine
Ad

Viewers also liked (6)

PPTX
Lecture 12 monitoring the network
PPTX
Lecture 11 managing the network
PPTX
Lecture 10 the user experience
PPTX
Lecture 8 permissions
PPTX
Network configuration
PPTX
Routers and Routing Configuration
Lecture 12 monitoring the network
Lecture 11 managing the network
Lecture 10 the user experience
Lecture 8 permissions
Network configuration
Routers and Routing Configuration
Ad

Similar to Lecture 9 further permissions (20)

PPTX
Lecture 3 more on servers and services
PPTX
operating system server presentation.pptx
PPT
Dc lec- (network models)
PPTX
networkoperatingsystem-151216143210.pptx
PPT
Chapter 6 - INTRODUCTION TO NETWORK OPERATING SYSTEM - 0S and NOS.ppt
PDF
Introduction to Operating System
PDF
itft_system admin
PPTX
Host Management active directory and domain services in windows server.pptx
PPTX
Chapter Two.pptx
PPTX
window configuration & Administration.pptx
PPT
Mcts chapter 1
PDF
Configuring and administrate server
PPTX
IBM Lotus Notes Client Management and MarvelClient
PPTX
IBM Lotus Notes 360
PDF
Dutch Lotus User Group 2009 - Domino Tuning Presentation
PPTX
Lecture 4 client workstations
PPT
Welcome back to the Chapter 1bhjjjj).ppt
PDF
8 operating system concept
PPT
Linux操作系统01 简介
PPTX
Operating system lect3 Autosaved.pptx
Lecture 3 more on servers and services
operating system server presentation.pptx
Dc lec- (network models)
networkoperatingsystem-151216143210.pptx
Chapter 6 - INTRODUCTION TO NETWORK OPERATING SYSTEM - 0S and NOS.ppt
Introduction to Operating System
itft_system admin
Host Management active directory and domain services in windows server.pptx
Chapter Two.pptx
window configuration & Administration.pptx
Mcts chapter 1
Configuring and administrate server
IBM Lotus Notes Client Management and MarvelClient
IBM Lotus Notes 360
Dutch Lotus User Group 2009 - Domino Tuning Presentation
Lecture 4 client workstations
Welcome back to the Chapter 1bhjjjj).ppt
8 operating system concept
Linux操作系统01 简介
Operating system lect3 Autosaved.pptx

More from Wiliam Ferraciolli (18)

PPTX
Lecture 5&6 corporate architecture
PPTX
Lecture 2 servers and services
PPTX
Lecture 1 introduction
PPTX
Lecture 13, 14 & 15 c# cmd let programming and scripting
PPT
Isys20261 lecture 14
PPT
Isys20261 lecture 12
PPT
Isys20261 lecture 11
PPT
Isys20261 lecture 10
PPT
Isys20261 lecture 09
PPT
Isys20261 lecture 08
PPT
Isys20261 lecture 07
PPT
Isys20261 lecture 06
PPT
Isys20261 lecture 05
PPT
Isys20261 lecture 04
PPT
Isys20261 lecture 03
PPT
Isys20261 lecture 02
PPT
Isys20261 lecture 01
PPT
Isys20261 lecture 13
Lecture 5&6 corporate architecture
Lecture 2 servers and services
Lecture 1 introduction
Lecture 13, 14 & 15 c# cmd let programming and scripting
Isys20261 lecture 14
Isys20261 lecture 12
Isys20261 lecture 11
Isys20261 lecture 10
Isys20261 lecture 09
Isys20261 lecture 08
Isys20261 lecture 07
Isys20261 lecture 06
Isys20261 lecture 05
Isys20261 lecture 04
Isys20261 lecture 03
Isys20261 lecture 02
Isys20261 lecture 01
Isys20261 lecture 13

Lecture 9 further permissions

  • 1. Lecture 9: More Access Control and Permissions Network Design & Administration
  • 2. Registry Keys • Registry Keys are the entities used to store information about a Windows PC. • They are used for: • Hardware information Network Design & Administration • OS information • Non-OS programs • Users • Preferences 2
  • 3. Registry Structure and Use • The registry is separated into Hives: • HKEY_CLASSES_ROOT • For installed apps – file associations, etc. Network Design & Administration • HKEY_CURRENT_USER • Specific settings for current user. e.g. printer settings. • HKEY_LOCAL_MACHINE • General to all users. E.g. driver versions. • HKEY_USERS • Details of all user profiles keys that can access machine. • Current_User is a partial list of information. 3 • HKEY_CURRENT_CONFIG • Generated at boot time to give information on local machine configuration.
  • 4. Registry Entries • For a registry entry to be modified, the program or user has to be allowed to change it! Network Design & Administration • Here we see the Administrators group given Full Control over this sub-key (via inheritance) 4
  • 5. Registry Permissions • Can see similarities and differences between these and NTFS permissions. • Different set of standard Network Design & Administration and special permissions. • Again, inheritance can be allowed or stopped, and deny/allow priority applies. (Note: Write DAC = ability to change ACL for key) 5
  • 6. Why of interest in a network? • Various programs may need to run on a server. • Those programs must have appropriate access to registry keys. • If users want applications installed locally, Network Design & Administration problems can occur if the registry keys do not have the appropriate ACL’s set. 6
  • 7. Active Directory Object Permissions Very different again to NTFS and Registry. e.g. - • Create child • Delete child • Standard delete Network Design & Administration • Delete tree • Read property • Write property • Microsoft recommend not changing. • If changed, performance can be lost due amount of information transmitted around network. 7
  • 8. Microsoft File Shares • Allow network clients to actually see folders on a server remotely. • Some shares are created automatically due to the role of a server. e.g. NETLOGON share created when becomes a Network Design & Administration domain controller. • Shares can be hidden by appending $ to name (so how do users find it?) 8
  • 9. Who can create file system shares? • Depends on role of machine and therefore security risks associated with doing it: • Domain Controller – Administrators, Server Operators, Enterprise Admins, Domain Admins Network Design & Administration groups only. • Domain Member Server or Workstation - Administrators, Server Operators, Power Users groups only. • Workgroup or Standalone computer (?) - Administrators, Power Users groups only. 9
  • 10. Creating a share using the MMC Shared Folders Snap-in Network Design & Administration 10
  • 11. File share permissions • They differ from NTFS. • Much coarser grain – no special permissions. • Change in Share Permissions is not the same as Network Design & Administration Modify in NTFS in the delete area. • When Share and NTFS permissions both present, resultant applied is the most restrictive. • Do not apply to locally logged on users. (e.g. physically local or by Terminal Server) 11
  • 12. Limitations / Problems • Limited scope - Can be applied only to folders and only when connecting to the share. • Lack of flexibility - Permissions applied to the share apply to all levels below. • No replication - Share permissions are not replicated by Network Design & Administration domain controller. • No resiliency - Share permissions cannot be backed up or restored via Domain Controller. • Fragility - Shares (and therefore share permissions) are lost when a folder is moved or renamed. • No auditing possible. • Do not show up in Effective Permissions tab – Need to be looked at independently then considered with NTFS 12 permissions to give resultant most restrictive .
  • 13. Printer Server Topologies • For cost effectiveness, want multiple users to access a single printer. • What are the options? • Locally Attached Printers Network Design & Administration • Network Attached Printers • Logical printer on every client workstation • Logical Printer – object used by operating system to represent physical device. Contains settings, defaults, drivers and other properties. • Print server • Print server – receives jobs from clients, stores them 13 in a print queue and sends 1 by 1 to physical printer,
  • 14. Locally Attached Printer[1] Network Design & Administration • Physical security issues (printer has to be close to server). • When printer share is created the attached server functions as 14 the print server.
  • 15. Network attached printer, with logical printer in every client[1] Network Design & Administration 15
  • 16. Problems… • Each user sees only own jobs – not rest of queue (may be lots waiting ahead!) • Admins cannot manage print queue or implement advanced features. Network Design & Administration • Error messages only appear to user machine. • If driver update required, has to be done on each client. • Print processing not offloaded to server. 16
  • 17. Network attached printer, with print server[1] Network Design & Administration 17 • Advantages…?
  • 18. Old UNIX/Linux permissions • Each file has a set of bits that specify its permissions for 3 classes of user: • Owner, Group Owner, Everyone Else • Owner is special, and can totally limit access. Network Design & Administration • Each class has 3 bits: (r) Read, (w) Write, (x) Execute • These are expressed as rwx if allowed or a – if not allowed • e.g. rwxr-xr-x means owner allowed all 3, but all others only allowed read and execute. • Super user (root access) can do anything even if not owner. 18
  • 19. Modern UNIX/Linux permissions • Now support ACLs (partly for compatibility with Windows via SAMBA). • Still based on read, write, execute (not as fiddly as Windows NTFS, so SAMBA has to ‘translate’ Network Design & Administration between them) • ACL’s allow rwx to be set for multiple groups and specific users. 19
  • 20. Next Time & references • Keeping systems up to date. • Hotfixes vs. Service Packs. • Managing/automating processes. Network Design & Administration • [1] MOAC 290 chapter 10 20