|
|
|
![]() | |
|
|
|
To access the contents, click the chapter and section titles.
Sams Teach Yourself MCSE Windows NT Server 4 in 14 Days
7.4.3. Group StrategiesGranting resource privileges to groups rather than to users directly is preferable. The optimum methodology to assign permission is as follows:
On the surface, taking all these steps might seem unnecessary. Technically there is nothing wrong with assigning the user account permissions directly to the resource. The benefit in following this order is easier to appreciate when you try to track the permissions of a user from a single point or try to create an additional user with the same privileges of another.
7.5. Implementing PoliciesBy properly implementing user policies, an NT administrator can easily control users abilities to perform specific system functions. Policies are used to enforce rules on an NT network. These rules may apply to users and groups or even to the system itself. This section demonstrates how to implement various rights utilizing both User Manager for Domains and the System Policy Editor. 7.5.1. Implementing User RightsThe user rights discussed in this section deal with specific abilities to perform actions such as logging on locally to a system. Do not confuse these rights with the rights or permissions assigned to users and groups to shares or NTFS resources. An NT Server administrator modifies user rights by using User Manager for Domains. Rights allow users and groups to perform certain actions. For example, members of the Backup Operators group are able to both back up and restore local files; this is based on the Backup Operators group being assigned the right to perform these tasks as shown in Figure 7.14.
As an administrator, you can control access to the system both locally and from across the network through the use of rights. If a particular server was to be secured so that only members of the Accounting group could gain access from across the network, an administrator could remove the Everyone group from having the right to access this system from across the network. The Accounting group could then be added as the only group with network access to that server. 7.5.2. Implementing Account PoliciesAccount restrictions are another form of policy that an NT administrator can use to secure a system. One of the most common restrictions that an administrator can enforce is how passwords are handled for users of the system or domain. As Figure 7.15 shows, a majority of the account policies deal directly with password-related issues.
Password RestrictionsAssigning password restrictions must be done while balancing out the security risks versus user convenience. When in doubt it is always safer to err on the side of caution. In Figure 7.15 the administrator is implementing some relatively strong account policies. The settings in the example vary from the default settings, which are more permissive.
7.5.3. Implementing an Audit PolicyImplementing a proper audit policy is part of any good management and security plan. The key is determining which objects will be of value to audit. Never arbitrarily select the objects to audit; auditing the wrong objects will be of no value and auditing all objects will degrade system performance. By default auditing is disabled. In Figure 7.16 an audit policy that covers the most frequently audited parameters has been implemented.
In Figure 7.16 the administrator has implemented an audit policy that will enable her to track basic attempts at security violations.
All of the security events that are tracked will be recorded in the security log. The security log can be viewed through the Event Viewer. 7.6. Implementing System PoliciesSystem policies are restrictions that the administrator can dictate which are effected as changes to the registry. The policies can be established for all computers and users of a domain or for only select users and computers. The primary tool for managing policies is the System Policy Editor. This section details the use and implementation of policies using this application.
|
|
Products | Contact Us | About Us | Privacy | Ad Info | Home
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc. All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is prohibited. |