it103 microsoft windows xp/os chap07

38
1 CONFIGURING AND MANAGING NTFS SECURITY Chapter 7

Upload: blusmurfydot1

Post on 17-May-2015

533 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: IT103 Microsoft Windows XP/OS Chap07

11

CONFIGURING AND MANAGING NTFS SECURITY

Chapter 7

Page 2: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 2

OVERVIEW

Understand the structure of NTFS security

Control access to files and folders by using permissions

Optimize access to files and folders by using NTFS best practices

Audit NTFS security

Troubleshoot access to files and folders

Page 3: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 3

Definition of ACL

Access Control Lists (ACLs)

A list of security protections that applies to an object. (An object can be a file, process, event, or anything else having a security descriptor.) There are two types of access control list, discretionary and system.

Page 4: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 4

Definition of ACE

Access Control Entries (ACEs)

An entry in an access control list (ACL). An ACE contains a set of access rights and a security identifier (SID) that identifies a trustee for whom the rights are allowed, denied, or audited.

Page 5: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 5

Definition of SID

Security Identifier (SID)

A data structure of variable length that identifies user, group, and computer accounts. Every account on a network is issued a unique SID when the account is first created. Internal processes in Windows refer to an account's SID rather than the account's user or group name.

Page 6: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 6

MASTER FILE TABLE (MFT)

Page 7: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 7

MFT – More Detail

The previous slide depicts the MFT in NTFS.

It is a common misconception that security descriptors (ACLs) reside in the MFT. Beginning with NTFS 5, they are stored in a separate metadata file ($Secure) in the NTFS volume.

This provides, in essence, single-instance storage of ACLs so they can be reused wherever the same permissions are applied.

Page 8: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 8

MFT – More Detail (cont)

This allows one security descriptor to be used for every folder and file in a folder tree that has the same permissions.

The result is a great savings in space formerly required to store an ACL for each file and folder in the tree. These security descriptors are referenced in the MFT record as a security index value ($SII).

Page 9: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 9

SECURITY DESCRIPTORS

Page 10: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 10

Security descriptors

Security descriptors, stored in the $Secure metadata file, contain the ACLs for files and folders.

When a user wants to open a file, the user’s application packages a request containing the requested operation and the user’s access token. This is compared with the ACL for the requested resource; if the user has the required permissions, the operation is allowed.

Page 11: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 11

ACCESS CONTROL LISTS (ACLs)

Store access control entries (ACEs)

Assigned to security descriptor for file system object

Evaluated to control access to objects

There are two types of ACLs: Discretionary ACL (DACL): control

permissions

System ACL (SACL): control auditing

Page 12: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 12

ACCESS CONTROL ENTRIES (ACEs)

Stored in ACLs (which are collections of ACEs, grouped by resource)

Consist of user or group SIDs with permission entries

Can be set for Allow, Deny, or Audit

Allow and Deny ACEs can exist in the same ACL

Audit ACEs are kept in SACLs

Deny ACEs override Allow ACEs

Page 13: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 13

ACE – more detail

ACEs are the basic building blocks of NTFS security.

They map user or group identities with assigned permissions and control file system security auditing by listing which file system operations will be audited for the assigned object.

Page 14: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 14

‘Allow’ ACE’s & ‘Deny’ ACE’s

Allow - they define which operations are allowed on an object for the specified user or group.

Deny - they define which operations are specifically denied. Deny ACEs always override Allow ACEs and are used to define exceptions to the general Allow rules for the object. Basically: more restrictive over-rules

Page 15: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 15

‘Audit’ ACE’s

Audit ACEs are stored in SACLs (System ACL) to define which operations will be audited by file system auditing.

Audit entries are added to the system’s Security event log when audited operations are performed.

Page 16: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 16

STANDARD NTFS PERMISSIONS

Page 17: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 17

SPECIAL PERMISSIONS

Page 18: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 18

PERMISSION INHERITANCE

Subfolders and files inherit permissions

Inheritance can be blocked

Blocking required for new permissions

Page 19: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 19

A little more detail…

Permissions are inherited by all subfolders and files unless they are prevented or blocked.

When blocking inheritance, you can copy existing permissions or remove all permissions and start anew.

Only by blocking inherited permissions can you modify the permissions of a folder.

Page 20: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 20

COPYING OR MOVING NTFS OBJECTS

Page 21: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 21

…A little more detail…

When you move or copy files or folders, the only time permissions are preserved without the aid of Xcopy.exe is when the object is moved within an NTFS volume.

In all other operations, the object inherits permissions from the destination folder (even when the permissions are “None” in the case of a FAT volume).

Page 22: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 22

PLANNING NTFS PERMISSIONS

Consolidate data

Assign permissions to folders

Assign most restrictive permissions possible

Use groups for permission assignment

Avoid excessively blocking inheritance

Avoid the Deny ACE

Page 23: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 23

…A little more detail…

By using these best practices (from the previous slide), students can plan effective permission policies for their folders.

By consolidating data that requires like permissions into folders and assigning permissions to groups of users, you can greatly simplify the process of assigning permissions.

Page 24: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 24

ASSIGNING STANDARD PERMISSIONS

Page 25: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 25

ASSIGNING SPECIAL PERMISSIONS

Page 26: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 26

WHY CAN’T I CHANGE PERMISSIONS FOR THIS FOLDER?

Page 27: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 27

Answer:

When permissions are inherited, you must block inheritance to apply new permissions to a folder.

You do this in the Advanced Security Settings dialog box.

Page 28: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 28

TAKING OWNERSHIP OF FILES

Page 29: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 29

…A little more detail…

If a user is not the owner of a folder or does not have at least Read permission to it, that person cannot see what permissions have been assigned.

If the person is an administrator, then that person must take ownership of the folder in order to be able to set permissions on it.

Page 30: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 30

CACLS.exe?

Change Access Control Lists

It is a powerful command-line tool that you can use to change ACLs for a folder or multiple folders.

It is especially effective for automating periodic permission changes, such as locking users out of a folder during backups or special processing.

Page 31: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 31

CACLS.EXE

Page 32: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 32

CACLS Examples

CACLS <foldername> Lists permissions

CACLS <foldername> /G Adminisrators:F Removes all permissions and assigns Full Control to

Administrators

CACLS <foldername> /E /G Users:R Grants Users Read permission without modifying other

permissions

CACLS <foldername> /E /R Users Revokes access to Users

Page 33: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 33

MULTIPLE NTFS PERMISSIONS

Sum of all ACEs for user or group

Most lenient permission is the effective permission

Deny overrides all

Page 34: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 34

VIEWING EFFECTIVE PERMISSIONS

Page 35: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 35

AUDITING NTFS ACCESS

Page 36: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 36

Who should have what permissions?

Page 37: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 37

SUMMARY

NTFS permissions work only on NTFS volumes.

Security descriptors are stored in the $Secure file.

ACLs list ACEs assigned to an object.

ACEs map users or groups to permissions.

Permissions are inherited by default.

Effective permissions are the sum of ACEs.

Page 38: IT103 Microsoft Windows XP/OS Chap07

Chapter 7: CONFIGURING AND MANAGING NTFS SECURITY 38

SUMMARY (CONTINUED)

Ownership cannot be “given.”

Deny ACEs override all other ACE types for a particular permission.

Avoid the Deny ACE to limit complexity.