|
|
![]() | |
|
|
|
To access the contents, click the chapter and section titles.
Sams Teach Yourself MCSE Windows NT Server 4 in 14 Days
8.2.3. Implementing Security on SharesSecurity is one of the most important aspects of your job as a network administrator. It is important to put the data where users can get to it and do what they need to do, but no more. The security of the network enables us to have confidence in the data stored on the network. Without it, we can never be sure the data on the network is accurate or that unauthorized individuals have not stolen, changed, deleted, or otherwise accessed or modified the data. So what are the threats to your security?
Knowing the source of the threats enables you to deal with them. Because most of the problems that you are likely to encounter are in the form of the accidental mistakes users cause, you must plan a policy that protects the data from, and maybe in spite of, the users. This having been said, the users obviously need the appropriate access to their data to do their jobs, and if you are too restrictive, their productivity will suffer and frustration will mount. Now take a look at what control you have over the shares you set up. In doing so, please keep in mind that on a FAT partition, share permissions are the only control you have. An NTFS partition has a combination of permissions that will be discussed later in the chapter in section 8.5.
8.2.4. The Four Levels of Share ControlThe following are the four levels of share control (from most to least restrictive):
8.3. Granting Access to Users and GroupsIt is better administrative practice to assign permissions based on groups rather than by individual users. This same logic is applied when assigning permissions in an NT environment.
8.3.1. AGLPNow that you know the permissions, you must learn to manage them. You can grant access to any user or group (local or global) in your domain and any user or global group in any trusted domains. As was previously discussed, Microsofts AGLP (Accountssuch as Usersin Global groups in Local groups that are then granted Permissions) policy recommendation dictates that you place your users (from any domain) in the appropriate global groups and then place these global groups in the local groups and then, and only then, grant permissions to the local groups only. This obviously is not a hard and fast rule, but it will make your life easier if you abide by it and forgo assigning permission to users. 8.3.2. Combining User and Group PermissionsKnowing that you can assign permission to users and groups, you might wonder what the net, or effective, permissions will be if a user belongs to multiple groups that are granted permissions. The user gets the sum of permissions granted to each group of which she is a member, plus any permissions assigned to her individually. If she or any of the groups to which she belongs is given No Access permission, she will get No Access. For example, If user A is given Read permission and he also belongs to group B, which has Change permission, he will get Read plus Change permission, which equals Change. If you take that example and continue by stating that he also belongs to group C, which has No Access permission, then user A will have No Access.
8.4. How to Implement Shared DirectoriesSharing directories is the means by which an administrator must make data accessible on an NT network. This section details how the share is established and how to properly protect the resources with permissions. 8.4.1. Setting Up Shares and Assigning PermissionsShare permissions are assigned in one of several ways. The most common is to right-click the folder that you want to share, and click Sharing. Figure 8.1 shows the first step in creating a new share.
On the Sharing tab of the properties dialog box for the folder Msdos, the administrator then clicks Shared As, instead of Not Shared (the default for all folders) and enters a share name (see Figure 8.2).
|
|
Products | Contact Us | About Us | Privacy | Ad Info | Home
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc. All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is prohibited. |