Unit 3
Unit 3
Unit 3
Management and it covers the following areas; physical security management, logon security
management, userlgroups management, Windows NT domain model, domain
controllers.
Section 4 of this unit deals with Windows resource security management and it covers
areas like; files and folder management, fileslfolder permissions, printer management
and Registry Management.
The most important. section 5, deals with the management of Windows 2000 operating
system; Windows 2000 features, active directory, logical structure, physical structure,
Windows 2000 DNS, Group Policy etc.
3.1 OBJECTIVES
After going through unut you will be able to learn:
management of Windows NT system, and
examine the fundamentals of the Management of Windows 2000 system.
The objective ofthis unit will be:
examine the various issues of Management of Windows NT 4.0.
study and manage Windows NT 4.0 Resources
examine the Windows 2000 Infrastructure.
There is a fifth type of domain structure, but it is not an official model. This type is of a
hybrid or mixed layout, shown in Figure 4 where the trilst structure has no specific
pattern. In this layout there are some Resource domains as well as some Account
domains, spread throughout the network.
Windows Server organises groups of computers into domains so that all the machines
in a particular domain can share a common database and security policy. Domain
controllers are systems that run NT Server and share the centralised directory
database that contains user account and security information for a particular domain.
When users log on to a particular domain account, the domain controllers authenticate
the users username and password, against the infoilnation stored in the directory
database.
When you perform NT Server installation, you must designate the role that servers will
play ill a dornain..Three choices are available for this role: PDC, BDC, and member
server (i.e., a standalone server).
- -
6. Choose OK once you have selected all the users and/or groups you wish to add,
and confir~nyour selection.
S o ~ n of
e the Audit events you may wish to use are listed below:
Write DAC - This audit logs evelits that try to determine who has access to the
key.
Read Control -This audit lo.gs events that try to determine the owner of a key.,
Delete - This audit logs events that try to delete a key from tlie Registry.
Ifyou select auditing on all keys for all users this may result in performance hit on the
systeni as it tries to track all these events. Therefore, you should only audit the events
you specifically wish to audit. You may view tlie audited events in the Event Viewer
under tlie Security Log. Events that are audited in the ~ e ~ i s " twill
r y identify the user,
computer, and the event that was audited.
PRINTER MANAGEMENT
Managing files and folders properly on a Windows machine is just the beginning of
setting up the computer's security. Another aspect of computer security is printer
management. In Microsoft terminology the printer is a software component, and the
hardware device is called the print device. This section will cover this software
conlponent in the computer.
Printer permissions are generally overlooked, but in fact it should be taken seriously. If
someone has recently purchased an expensive colour laser print device, it should not
be used for general print jobs. Print resources are generally the most misused
resources in an organisation.
The following four permissions can be set for printers in Windows environment
access, (2) print, (3) manage documents, and (4) full control.
I. No Access -User cannot print to this device or connect to its print queue.
2. Print -User can print documents and manage subinitted print jobs, if the owner of
those jobs.
3.
4.
Manage Docume~its- Allows a user to manage print jobs, including pausing,
restarting, resuming, and deleting queued documents.
Full Control -Allows a user to create, manage, and delete printers, as well as all
I
the control of the Manage Documents permission.
The location of the print spooler sliould not be overlocked. If print documents are sent
to tlie hard drive for processing, and are waiting to be printed, the security of those
locations is a big issue. By default&islocation is in the % systemroot%/systeni32/
spoool folder and, by default that folder has a permission of Everyone Full Control. So,
if you have resources that are secured on an NTFS partition, and they are spooled to a
FAT folder with lax security, this may become a security breach. You can modify tlie
security spooler location by using "advanced tab" of print server properties.
MANAGING WINDOWS 2000 OPERATING
3.7
- SYSTEM
In the sub-section we will focus on how to manage windows operating system.
The majority of the design and implementation of the Active Directory network is on
the logical side, but the physical side must be equally addressed. The main components
? of the physical side of Active Directory are sites and the domain controllers.
The site, as defined by Microsoft, "is a combination of one or more Internet Protocol
(IP) subnets connected by a highly reliable and fast link to localise as much network
traffic as possible." A fast link is reached when tlie connection speed is at least 5 12
Kbps. Therefore, the Site is designed to mirror the physical structure of a network, and
mayor may not be made up of different IP subnets.
Remember that the domain is designed to mirror the logical needs of the network, and
apply that same logic to designing a network using physical aspects. There is no
correlation between the site and the domain. It is possible to have multiple domains in a
Site, and it is possible to have multiple sites for one domain. A site is also not part of
the DNS namespace, which means that when browsing/exploring the directory, you will
see user and computer accounts managed by domain and/or OU, but not by site. A site
contains only computer objects, and objects relevant to the connection and replication
from one site to another.
The other physical component of Active Directory is tlie actual Domain Controllers
(DC) and these machines, which must be running Windows 2000 Server, each have an
exact replica of the domain directory. When a change is made on a DC that has an
effect on the Active Directory, all other DCs will receive this replicated change.
Because any d ~ m a i ncontroller can authenticate a user to the network, each controller
is required to have this directory. Therefore, each DC stores a copy of Active
Directory information that is relevant to that domain. Each DC replicates changes, at
admin-defined intervals, to all the other DCs to ensure a consistent view of the network
at all time? Each DC replicates critical changes to all the other DCs immediately and
each DC is able to authenticate user logon requests.
A new feature of Windows 2000 is Dynamic DNS (DDNS) which allows clients to
receive their IP addresses automatically via a DHCP server and registered with the
network. With a DDNS server, the client's machine will automatically communicate
with the server, announcing its name and address combination, and will update its DNS
information without user information. The advantages of running DNS in a network is
the ability to eliminate other protocols and services that may be running to locate
resources. For example, the Windows Internet Name Service (WINS) of Windows NT
4.0 is not required, and the use of Net BEUl (Net BlOS Extended User Inferface) as
a communication protocol is no longer required.
3.10 MANAGING GROUP POLICY pvlanagement-I
--
The final compollent ofthe Windows 2000 infrastructur is group policy. A group policy
is a logical grouping of user and computer setfings that can be inter-connected to
computers, domains, OUs, and sites in order to manage a user's desktop environment.
For example, a Group Policy is a method of removing objects from the Start Menu.
Group policy consists of GPO (Group Policy Object) and the GPO i4 then responsible
for controlling the application of the policy to Active Directory objects. Once a GPO is
configured, it is applied to the AD (Active Directory) object as assigned, and by
default the policy will affect all the computers that are in the AD object. The policy
can be implemented on all the computers or apply filter how the policy will be
implemented for computers and us"ers. The filtering will use Access Control Lists
(ACLs), as prepared by you.
Some of the rules for applying a GPO are as follows: a GPO may be associated with
more than one domain, a GPO may be associated with more than one OU, A domain
may be associated with more than one GPO, and an OU may be associated with more
than one GPO. In this section, you have noticed that you are allowed the maximum
flexibility in GPO Implememanon. However, Derore getting mto me Implememanon,
you must take a step back and look into the GPO itself in more detail.
Policies Options
To configure a GPO open Group Policy Editor via the Microsoft Management Console
(MMC). In Group Policy Editor you are provided two options; Users Setting, and
Computer Setting. In this you will be able to create the GPO as per your requirements.
In the Computer Settings directory you have the option to manage the behaviour of the
a operating system, account policies, JP security policies, etc. The options will be
effective once the computer gets restarted. )
The User Settings directory gives the option to manage behaviour that is unique to the
user, such as Desktop settings, Control Panel settings, Start Menu settings, etc. These
options will be effective once the user logs on to the computer.
Once you create and edit a GPO, it must be enforced to have any impact on the
.network and there can be GPOs on Sites, Domains, and OUs. The order of
implementation is critical to proper GPO deployment.
The first GPO that is processed is the called Local GPO. Every Windows 2000
computer has a GPO stored locally. However, it is not practical to implement custom
configurations on each machine in the network, so often administrators move right past
the Local GPO.
After the processing of the Local GPO, the Site GPO is implemented. Since there can
be lnultiple GPOs for one site, it is the administrator's job to deflne the order of
.implementation by configuring the Site Properties. After processing the Site GPO, the
.Domain GPO is implemented. Just as there can be multiple GPOs for a Site, there
can be multiple GPOs for a Domain, so the administrator must take care to define the
order .of implementation in this cast also.
The last GPO to be processed is the OU. As in the other implementations, more than
one GPO may be present for the OU, and as such the administrator is required 10 of;
properly plan and implement the GPOs as per the requirements.
In every section with more than one GPO, the place to make the modifications to the
' order is in the properties of the Site, Domain, or OU (the only exception being the
Local GPO-): When in the properties of the Site, for example, the GPOs are listed, and
the option to move them up or down is present, the system will process the GPOs with
the highest on the list having the highest priority, taking precedence over GPOs that
are lower down on the list.
Security and The implementation order of the GPOs is critical for the security and management of a
Management Windows 2000 network. By seeing at the implementation order, you can identify that if
a Site GPO were to define a password age of 45 days, and a Domain GPO were to
define a password age of 30 days, that the final password age would be 30 days, as
that GPO was processed last.
................................................................................................................................
................................................................................................................................
...............................................................................................................................
................................................................................................................................
................................................................................................................................
................................................................................................................................
3.11 SUMMARY
This unit describes the broad concepts of Windows Architecture Management and
security related issues: Main Issues in Windows Security Management; Windows
Resource Management; Windows 2000 Operating Systems. Windows Security
specially focuses on Windows NT Management and it covers the areas such as
physical security management, logon management, user/groups management, Windows
NT domain management, domain controllers. Windows resource management includes
areas like: files and folder management, filedfolder permissions, printer management,'
and Registry management. Further, the unit also discusses about the improvement that
has been taken up in Windows Architecture, Management with the Management
Wi~idows2000 operating system; Windows 2000 features, active directory, logical
structure, physical structure, Windows 2000 DNS management, Group Policy etc. This
unit provides detailed concepts and configuration required for management of
Microsoft Windows computers and you will be able to examine everything from the
foundatio~lalprinciples of WindowsNT Management, up to the advanced issues of
securing Windows 2000 machines running Active Directory.
3.12. SOLUTIONS1ANSWERS
Check Your Progress 1
In the Value Data entry field, Type Unauthorised Access Warning!! Then
press OK.
Navigate to
Type 1 in the Value Data entry field, and press OK to close the Edit dialog
box.
1) a) Domain, (b) one, BDC (c) Single Sign On (SSO), (d) TRUSTING,
TRUSTED, (e) PDC, (f) authenticating.
2) a) A very large domain would be hard to manage Ieficiently, and (b) users
who are very far apart physically may find a more efficien\ .network
experience to have one domain per location.
I) You group together computers who share a central directory database. This
directory database contains user accounts, security information, service
information, and more for the entire domain.
2) The guest account can be lock down by the following steps:
Management
a Rename the guest account to a difficult to-guess account name.
3) Windows 2000 is Dynamic DNS (DDNS) and DDNS allows clients, which
receive their 1P addresses automatically via a DHCP server to have their name
IP address registered with the network.