Podcast
Questions and Answers
What is the primary function of authentication in computer security?
What is the primary function of authentication in computer security?
In a Windows domain, what is responsible for handling authentication?
In a Windows domain, what is responsible for handling authentication?
What does authorization determine in a system?
What does authorization determine in a system?
Which of the following is advisable when creating user accounts?
Which of the following is advisable when creating user accounts?
Signup and view all the answers
What is the role of Active Directory (AD) in a Windows domain?
What is the role of Active Directory (AD) in a Windows domain?
Signup and view all the answers
Which of the following is a criterion for creating a strong password?
Which of the following is a criterion for creating a strong password?
Signup and view all the answers
Which of the following is NOT advisable when creating a strong password?
Which of the following is NOT advisable when creating a strong password?
Signup and view all the answers
Which of these is a recommended element to include in a strong password?
Which of these is a recommended element to include in a strong password?
Signup and view all the answers
Which practice should be avoided when creating a strong password?
Which practice should be avoided when creating a strong password?
Signup and view all the answers
What is one of the criteria for creating a strong password?
What is one of the criteria for creating a strong password?
Signup and view all the answers
Which tool works in Active Directory (AD) on a Windows domain to control the privileges of computers and users?
Which tool works in Active Directory (AD) on a Windows domain to control the privileges of computers and users?
Signup and view all the answers
What is the primary function of the Local Security Policy (secpol.msc)?
What is the primary function of the Local Security Policy (secpol.msc)?
Signup and view all the answers
Which tool contains a subset of policies in Local Group Policy that specifically apply to Windows security settings?
Which tool contains a subset of policies in Local Group Policy that specifically apply to Windows security settings?
Signup and view all the answers
Which editions of Windows provide access to Local Group Policy and Local Security Policy editors?
Which editions of Windows provide access to Local Group Policy and Local Security Policy editors?
Signup and view all the answers
What is the main difference between Group Policy and Local Group Policy?
What is the main difference between Group Policy and Local Group Policy?
Signup and view all the answers
Which editor includes a broader set of policies for managing security and settings?
Which editor includes a broader set of policies for managing security and settings?
Signup and view all the answers
What is the primary function of the Local Security Policy editor?
What is the primary function of the Local Security Policy editor?
Signup and view all the answers
In which scenario would you use the Local Security Policy editor instead of the Local Group Policy editor?
In which scenario would you use the Local Security Policy editor instead of the Local Group Policy editor?
Signup and view all the answers
Which of the following is NOT a function of the Local Group Policy editor?
Which of the following is NOT a function of the Local Group Policy editor?
Signup and view all the answers
What does Figure 7-2 illustrate about the relationship between the Local Group Policy editor and the Local Security Policy editor?
What does Figure 7-2 illustrate about the relationship between the Local Group Policy editor and the Local Security Policy editor?
Signup and view all the answers
What is the purpose of the Credential Manager applet in Control Panel?
What is the purpose of the Credential Manager applet in Control Panel?
Signup and view all the answers
Which of the following credentials can be managed using the Credential Manager?
Which of the following credentials can be managed using the Credential Manager?
Signup and view all the answers
What can be edited or deleted in the Windows Credentials section of Credential Manager?
What can be edited or deleted in the Windows Credentials section of Credential Manager?
Signup and view all the answers
Which of the following actions can be performed with credentials for accessing websites using Credential Manager?
Which of the following actions can be performed with credentials for accessing websites using Credential Manager?
Signup and view all the answers
Where can you find the Credential Manager applet in a Windows system?
Where can you find the Credential Manager applet in a Windows system?
Signup and view all the answers
Which password is specifically required to change the BIOS/UEFI setup?
Which password is specifically required to change the BIOS/UEFI setup?
Signup and view all the answers
What is the primary function of the drive lock password in BIOS/UEFI firmware?
What is the primary function of the drive lock password in BIOS/UEFI firmware?
Signup and view all the answers
Where is the drive lock password stored?
Where is the drive lock password stored?
Signup and view all the answers
Which BIOS/UEFI password is required to use the system?
Which BIOS/UEFI password is required to use the system?
Signup and view all the answers
What happens to the drive lock password if the hard drive is removed?
What happens to the drive lock password if the hard drive is removed?
Signup and view all the answers
Which key can be pressed to open the Internet Explorer menu bar?
Which key can be pressed to open the Internet Explorer menu bar?
Signup and view all the answers
What should you look for in the browser address box to confirm that HTTPS is being used?
What should you look for in the browser address box to confirm that HTTPS is being used?
Signup and view all the answers
Which tool can be used to disable Internet Explorer?
Which tool can be used to disable Internet Explorer?
Signup and view all the answers
Which of the following can you try if you have a problem with Internet Explorer 11?
Which of the following can you try if you have a problem with Internet Explorer 11?
Signup and view all the answers
Which version of Internet Explorer comes with Windows 10/8/7?
Which version of Internet Explorer comes with Windows 10/8/7?
Signup and view all the answers
Which option in the Delete Browsing History settings allows you to keep cookies and temporary Internet files from your favorite websites?
Which option in the Delete Browsing History settings allows you to keep cookies and temporary Internet files from your favorite websites?
Signup and view all the answers
What is stored in the Temporary Internet files and website files option?
What is stored in the Temporary Internet files and website files option?
Signup and view all the answers
Which setting should you delete if you want to clear the list of websites you have visited?
Which setting should you delete if you want to clear the list of websites you have visited?
Signup and view all the answers
What type of data is stored under the 'Form data' option?
What type of data is stored under the 'Form data' option?
Signup and view all the answers
Which option specifically stores passwords to automatically fill in when signing into websites?
Which option specifically stores passwords to automatically fill in when signing into websites?
Signup and view all the answers
Tracking Protection in Internet Explorer helps to:
Tracking Protection in Internet Explorer helps to:
Signup and view all the answers
Which tab would you use to change the home page in Internet Explorer?
Which tab would you use to change the home page in Internet Explorer?
Signup and view all the answers
Where can you block cookies that might invade your privacy?
Where can you block cookies that might invade your privacy?
Signup and view all the answers
Which tab is used for configuring proxy server settings in Internet Explorer?
Which tab is used for configuring proxy server settings in Internet Explorer?
Signup and view all the answers
Add-ons in Internet Explorer are managed through which tab?
Add-ons in Internet Explorer are managed through which tab?
Signup and view all the answers
If you need to access miscellaneous settings to control Internet Explorer, which tab would you use?
If you need to access miscellaneous settings to control Internet Explorer, which tab would you use?
Signup and view all the answers
Which file system is required for using Windows Encrypted File System (EFS)?
Which file system is required for using Windows Encrypted File System (EFS)?
Signup and view all the answers
How is the encryption status of files and folders visually represented in Windows Explorer?
How is the encryption status of files and folders visually represented in Windows Explorer?
Signup and view all the answers
What happens to an encrypted file if it is moved to an unencrypted folder?
What happens to an encrypted file if it is moved to an unencrypted folder?
Signup and view all the answers
Which editions of Windows support Windows Encrypted File System (EFS)?
Which editions of Windows support Windows Encrypted File System (EFS)?
Signup and view all the answers
What are the steps to encrypt a file or folder using EFS?
What are the steps to encrypt a file or folder using EFS?
Signup and view all the answers
What component on the motherboard holds the BitLocker encryption key during computer authentication?
What component on the motherboard holds the BitLocker encryption key during computer authentication?
Signup and view all the answers
Which method of BitLocker authentication requires a USB drive?
Which method of BitLocker authentication requires a USB drive?
Signup and view all the answers
What is required during every startup in the Computer and User Authentication method?
What is required during every startup in the Computer and User Authentication method?
Signup and view all the answers
What is BitLocker primarily designed to encrypt?
What is BitLocker primarily designed to encrypt?
Signup and view all the answers
What happens if a hard drive encrypted with BitLocker is stolen and the startup key is not available?
What happens if a hard drive encrypted with BitLocker is stolen and the startup key is not available?
Signup and view all the answers
What is one of the risks associated with using BitLocker?
What is one of the risks associated with using BitLocker?
Signup and view all the answers
What should you do to mitigate the risks when using BitLocker?
What should you do to mitigate the risks when using BitLocker?
Signup and view all the answers
Where do you enable the TPM chip to start BitLocker Drive Encryption?
Where do you enable the TPM chip to start BitLocker Drive Encryption?
Signup and view all the answers
When is it advisable to use BitLocker?
When is it advisable to use BitLocker?
Signup and view all the answers
What is the first step in starting BitLocker Drive Encryption?
What is the first step in starting BitLocker Drive Encryption?
Signup and view all the answers
What type of firewall is a router considered to be?
What type of firewall is a router considered to be?
Signup and view all the answers
Which type of firewall might a large corporation use?
Which type of firewall might a large corporation use?
Signup and view all the answers
What is another name for a personal firewall?
What is another name for a personal firewall?
Signup and view all the answers
What is Windows Firewall?
What is Windows Firewall?
Signup and view all the answers
What happens to Windows Firewall when you set up a new network connection?
What happens to Windows Firewall when you set up a new network connection?
Signup and view all the answers
What is one method of managing shared resources?
What is one method of managing shared resources?
Signup and view all the answers
In the context of folder and file management, what is assigned to control access?
In the context of folder and file management, what is assigned to control access?
Signup and view all the answers
What else, besides user accounts, can be assigned permissions to manage shared resources?
What else, besides user accounts, can be assigned permissions to manage shared resources?
Signup and view all the answers
Which of the following is a direct way to control access to shared folders?
Which of the following is a direct way to control access to shared folders?
Signup and view all the answers
Which process involves assigning specific rights to users for accessing shared resources?
Which process involves assigning specific rights to users for accessing shared resources?
Signup and view all the answers
What does the principle of least privilege entail?
What does the principle of least privilege entail?
Signup and view all the answers
How can privileges be altered after a user account is created?
How can privileges be altered after a user account is created?
Signup and view all the answers
Which tool can be used to create user accounts?
Which tool can be used to create user accounts?
Signup and view all the answers
Where else can user accounts be managed apart from the User Accounts applet in Control Panel?
Where else can user accounts be managed apart from the User Accounts applet in Control Panel?
Signup and view all the answers
When are rights or privileges for a user account first established?
When are rights or privileges for a user account first established?
Signup and view all the answers
Which console is used to create a user account in Windows?
Which console is used to create a user account in Windows?
Signup and view all the answers
Which user account type in Windows has administrative privileges?
Which user account type in Windows has administrative privileges?
Signup and view all the answers
What is the first step to create a user account using Computer Management console?
What is the first step to create a user account using Computer Management console?
Signup and view all the answers
Where do you right-click to add a new user in the Computer Management console?
Where do you right-click to add a new user in the Computer Management console?
Signup and view all the answers
What must be done after entering the information for a new user in the Computer Management console?
What must be done after entering the information for a new user in the Computer Management console?
Signup and view all the answers
Which user group has limited privileges and gets a temporary profile that is deleted upon logoff?
Which user group has limited privileges and gets a temporary profile that is deleted upon logoff?
Signup and view all the answers
Which user group is retained in Windows 10/8/7 primarily for backward compatibility?
Which user group is retained in Windows 10/8/7 primarily for backward compatibility?
Signup and view all the answers
Which user group in older editions could install apps and perform limited administrator tasks?
Which user group in older editions could install apps and perform limited administrator tasks?
Signup and view all the answers
What is a characteristic of the Guests group in built-in user groups?
What is a characteristic of the Guests group in built-in user groups?
Signup and view all the answers
Which of the following describes the Power Users group?
Which of the following describes the Power Users group?
Signup and view all the answers
Which user group includes all user accounts except the Guest account?
Which user group includes all user accounts except the Guest account?
Signup and view all the answers
What is the key advantage of using customized user groups?
What is the key advantage of using customized user groups?
Signup and view all the answers
In which console can custom user groups be created in business editions of Windows?
In which console can custom user groups be created in business editions of Windows?
Signup and view all the answers
Which group includes both the Authenticated Users group and the Guest account?
Which group includes both the Authenticated Users group and the Guest account?
Signup and view all the answers
Who do anonymous users refer to?
Who do anonymous users refer to?
Signup and view all the answers
Which folder is recommended for placing data that all users can share?
Which folder is recommended for placing data that all users can share?
Signup and view all the answers
What is the primary benefit of workgroup sharing?
What is the primary benefit of workgroup sharing?
Signup and view all the answers
Where should private data for individual users be stored?
Where should private data for individual users be stored?
Signup and view all the answers
Who manages security if a computer belongs to a domain?
Who manages security if a computer belongs to a domain?
Signup and view all the answers
Which practice offers the best security for shared data?
Which practice offers the best security for shared data?
Signup and view all the answers
Which type of permissions in Windows only apply to network users and not to local users?
Which type of permissions in Windows only apply to network users and not to local users?
Signup and view all the answers
What types of permissions apply to both folders and individual files?
What types of permissions apply to both folders and individual files?
Signup and view all the answers
Where can NTFS permissions be configured in Windows?
Where can NTFS permissions be configured in Windows?
Signup and view all the answers
Which permissions apply to a folder and its contents but not to individual files?
Which permissions apply to a folder and its contents but not to individual files?
Signup and view all the answers
On what type of volume do NTFS permissions work?
On what type of volume do NTFS permissions work?
Signup and view all the answers
What happens to an object's permissions when it is moved to a different folder on the same volume?
What happens to an object's permissions when it is moved to a different folder on the same volume?
Signup and view all the answers
If an object is copied to a new folder, what permissions does it inherit?
If an object is copied to a new folder, what permissions does it inherit?
Signup and view all the answers
How are conflicting NTFS permissions resolved?
How are conflicting NTFS permissions resolved?
Signup and view all the answers
What describes inherited permissions?
What describes inherited permissions?
Signup and view all the answers
Which principle applies when both share and NTFS permissions are used?
Which principle applies when both share and NTFS permissions are used?
Signup and view all the answers
What is the main purpose of using the gpresult command?
What is the main purpose of using the gpresult command?
Signup and view all the answers
When troubleshooting Group Policy problems, which command can provide useful user group information?
When troubleshooting Group Policy problems, which command can provide useful user group information?
Signup and view all the answers
Which command retrieves information on a user other than the one signed in?
Which command retrieves information on a user other than the one signed in?
Signup and view all the answers
Which type of information does the gpresult command provide?
Which type of information does the gpresult command provide?
Signup and view all the answers
What can the information retrieved by gpresult help troubleshoot?
What can the information retrieved by gpresult help troubleshoot?
Signup and view all the answers
What does the /r parameter in the gpresult command accomplish?
What does the /r parameter in the gpresult command accomplish?
Signup and view all the answers
What is the function of the \v switch when using the gpresult tool?
What is the function of the \v switch when using the gpresult tool?
Signup and view all the answers
Which command would you use to retrieve a summary of Group Policy results for a user named 'admin'?
Which command would you use to retrieve a summary of Group Policy results for a user named 'admin'?
Signup and view all the answers
Which parameter would be used with gpresult to avoid excessive detail in the output?
Which parameter would be used with gpresult to avoid excessive detail in the output?
Signup and view all the answers
What is displayed in Figure 7-32?
What is displayed in Figure 7-32?
Signup and view all the answers
Which tab do you select in the Properties box to access Advanced Sharing?
Which tab do you select in the Properties box to access Advanced Sharing?
Signup and view all the answers
What is the first action to perform when setting up share permissions for a folder?
What is the first action to perform when setting up share permissions for a folder?
Signup and view all the answers
After selecting the user account or user group, which button must you click to proceed?
After selecting the user account or user group, which button must you click to proceed?
Signup and view all the answers
Which box appears after clicking Add in the Permissions settings?
Which box appears after clicking Add in the Permissions settings?
Signup and view all the answers
What should you do to remove the Everyone group from the Permissions box?
What should you do to remove the Everyone group from the Permissions box?
Signup and view all the answers
Where can you find the option to use advanced permissions settings?
Where can you find the option to use advanced permissions settings?
Signup and view all the answers
What happens to the permissions of subfolders by default?
What happens to the permissions of subfolders by default?
Signup and view all the answers
Which tab in the Advanced Security Settings box allows you to check effective permissions?
Which tab in the Advanced Security Settings box allows you to check effective permissions?
Signup and view all the answers
Why would you use advanced permissions settings?
Why would you use advanced permissions settings?
Signup and view all the answers
What should you do if you have problems accessing a shared resource?
What should you do if you have problems accessing a shared resource?
Signup and view all the answers
What is a benefit of using only one workgroup for managing shared folders and files?
What is a benefit of using only one workgroup for managing shared folders and files?
Signup and view all the answers
Who has full permissions over a folder?
Who has full permissions over a folder?
Signup and view all the answers
What is one key recommendation to ensure security for user accounts?
What is one key recommendation to ensure security for user accounts?
Signup and view all the answers
What does taking ownership of a folder entail?
What does taking ownership of a folder entail?
Signup and view all the answers
Which of the following is advised for easier access to shared folders and files?
Which of the following is advised for easier access to shared folders and files?
Signup and view all the answers
Which tab in the Advanced Security Settings window allows you to add or remove permissions for a folder or file?
Which tab in the Advanced Security Settings window allows you to add or remove permissions for a folder or file?
Signup and view all the answers
What is the purpose of the 'Auditing' tab in the Advanced Security Settings window?
What is the purpose of the 'Auditing' tab in the Advanced Security Settings window?
Signup and view all the answers
Which feature allows you to assign permissions to multiple child objects within a folder?
Which feature allows you to assign permissions to multiple child objects within a folder?
Signup and view all the answers
Which action can be performed from the 'Owner' tab in the Advanced Security Settings window?
Which action can be performed from the 'Owner' tab in the Advanced Security Settings window?
Signup and view all the answers
Why might you use the 'Effective Access' tab in the Advanced Security Settings window?
Why might you use the 'Effective Access' tab in the Advanced Security Settings window?
Signup and view all the answers
What is the main advantage of using Network File System (NFS) over traditional file systems?
What is the main advantage of using Network File System (NFS) over traditional file systems?
Signup and view all the answers
What is mapping a drive in the context of a network share?
What is mapping a drive in the context of a network share?
Signup and view all the answers
What type of system is Network File System (NFS) categorized as?
What type of system is Network File System (NFS) categorized as?
Signup and view all the answers
Which of the following statements best describes a network share?
Which of the following statements best describes a network share?
Signup and view all the answers
What is a key characteristic of the Network File System (NFS)?
What is a key characteristic of the Network File System (NFS)?
Signup and view all the answers
What is the first step to enable offline files using Sync Center?
What is the first step to enable offline files using Sync Center?
Signup and view all the answers
Which menu in File Explorer allows you to force a manual sync of files?
Which menu in File Explorer allows you to force a manual sync of files?
Signup and view all the answers
What should you do after right-clicking a shared folder to make it available offline?
What should you do after right-clicking a shared folder to make it available offline?
Signup and view all the answers
What must be done to complete enabling offline files?
What must be done to complete enabling offline files?
Signup and view all the answers
Where do you find the option to enable offline files?
Where do you find the option to enable offline files?
Signup and view all the answers
What feature allows users to access certain network files even when disconnected from the network?
What feature allows users to access certain network files even when disconnected from the network?
Signup and view all the answers
Which context menu option would you select to configure a network share as an offline folder?
Which context menu option would you select to configure a network share as an offline folder?
Signup and view all the answers
Where is the option 'Always available offline' located when configuring a folder?
Where is the option 'Always available offline' located when configuring a folder?
Signup and view all the answers
Which screenshot feature allows users to open previously saved states of a file?
Which screenshot feature allows users to open previously saved states of a file?
Signup and view all the answers
What is the main purpose of the 'Sync' option in the right-click menu for an offline folder?
What is the main purpose of the 'Sync' option in the right-click menu for an offline folder?
Signup and view all the answers
Which option would you select to make a folder available when not connected to the network?
Which option would you select to make a folder available when not connected to the network?
Signup and view all the answers
Which menu option should be selected to begin working with a folder that is currently available only online?
Which menu option should be selected to begin working with a folder that is currently available only online?
Signup and view all the answers
When using Windows Sync Center, which option ensures that a folder's contents are automatically updated with the network share?
When using Windows Sync Center, which option ensures that a folder's contents are automatically updated with the network share?
Signup and view all the answers
Which action should be taken to temporarily stop updates to a network folder while offline?
Which action should be taken to temporarily stop updates to a network folder while offline?
Signup and view all the answers
What is one method to prevent users on the network from seeing a shared folder?
What is one method to prevent users on the network from seeing a shared folder?
Signup and view all the answers
Why might you disable File and Printer Sharing on a network?
Why might you disable File and Printer Sharing on a network?
Signup and view all the answers
How can a user access a hidden shared folder on the network?
How can a user access a hidden shared folder on the network?
Signup and view all the answers
Which of the following statements correctly describes a local share?
Which of the following statements correctly describes a local share?
Signup and view all the answers
Which of the following is NOT a method to protect confidential data on a network?
Which of the following is NOT a method to protect confidential data on a network?
Signup and view all the answers
What is the main purpose of appending a dollar sign ($) at the end of a share name?
What is the main purpose of appending a dollar sign ($) at the end of a share name?
Signup and view all the answers
Which of the following methods would allow access to a hidden share on a network?
Which of the following methods would allow access to a hidden share on a network?
Signup and view all the answers
What is the consequence of not knowing the exact name of a hidden share?
What is the consequence of not knowing the exact name of a hidden share?
Signup and view all the answers
Which character is used to hide administrative shares in a network?
Which character is used to hide administrative shares in a network?
Signup and view all the answers
What is the key difference between normal shares and hidden shares on a network?
What is the key difference between normal shares and hidden shares on a network?
Signup and view all the answers
Which folder is shared by default for administrator accounts at the domain level?
Which folder is shared by default for administrator accounts at the domain level?
Signup and view all the answers
Which of the following is NOT an example of an administrative share?
Which of the following is NOT an example of an administrative share?
Signup and view all the answers
What is a characteristic of administrative shares?
What is a characteristic of administrative shares?
Signup and view all the answers
What does an administrative share allow an administrator to do?
What does an administrative share allow an administrator to do?
Signup and view all the answers
Which shared resource is identified by %systemroot%?
Which shared resource is identified by %systemroot%?
Signup and view all the answers
Which command can be used to access an administrative share on a Windows domain?
Which command can be used to access an administrative share on a Windows domain?
Signup and view all the answers
What is indicated by a dollar sign ($) at the end of a shared folder name in Windows?
What is indicated by a dollar sign ($) at the end of a shared folder name in Windows?
Signup and view all the answers
In the context of Windows domains, what is typically required to access administrative shares?
In the context of Windows domains, what is typically required to access administrative shares?
Signup and view all the answers
Why might an IT administrator use the path \ws14\admins?
Why might an IT administrator use the path \ws14\admins?
Signup and view all the answers
Which folder in Windows File Explorer can often have quick access shortcuts?
Which folder in Windows File Explorer can often have quick access shortcuts?
Signup and view all the answers
Which of the following is NOT one of the five groups of services in Active Directory (AD)?
Which of the following is NOT one of the five groups of services in Active Directory (AD)?
Signup and view all the answers
What is the primary role of Active Directory (AD) in Windows domains?
What is the primary role of Active Directory (AD) in Windows domains?
Signup and view all the answers
Which service is responsible for providing a more lightweight directory service within AD?
Which service is responsible for providing a more lightweight directory service within AD?
Signup and view all the answers
Which Active Directory service handles digital certificates?
Which Active Directory service handles digital certificates?
Signup and view all the answers
Which AD service can be used to manage single sign-on (SSO) capabilities?
Which AD service can be used to manage single sign-on (SSO) capabilities?
Signup and view all the answers
In Active Directory, what is a forest?
In Active Directory, what is a forest?
Signup and view all the answers
What is the primary purpose of an organizational unit (OU) in Active Directory?
What is the primary purpose of an organizational unit (OU) in Active Directory?
Signup and view all the answers
Which component in Active Directory contains the policies used to assign privileges?
Which component in Active Directory contains the policies used to assign privileges?
Signup and view all the answers
How are the domains organized within a forest in Active Directory?
How are the domains organized within a forest in Active Directory?
Signup and view all the answers
Which of the following best describes the top-down hierarchical structure of Active Directory?
Which of the following best describes the top-down hierarchical structure of Active Directory?
Signup and view all the answers
What component represents individual locations within a domain in an Active Directory forest?
What component represents individual locations within a domain in an Active Directory forest?
Signup and view all the answers
Which component in Active Directory establishes and manages trust relationships between forests?
Which component in Active Directory establishes and manages trust relationships between forests?
Signup and view all the answers
Where are users and computers represented in the Active Directory organizational structure?
Where are users and computers represented in the Active Directory organizational structure?
Signup and view all the answers
What is the primary hierarchical level in an Active Directory organizational structure?
What is the primary hierarchical level in an Active Directory organizational structure?
Signup and view all the answers
What is depicted by a house-shaped icon within a site in the Active Directory organizational structure?
What is depicted by a house-shaped icon within a site in the Active Directory organizational structure?
Signup and view all the answers
How are distinct Active Directory forests represented graphically?
How are distinct Active Directory forests represented graphically?
Signup and view all the answers
What scope does Group Policy specifically apply to in a domain?
What scope does Group Policy specifically apply to in a domain?
Signup and view all the answers
Which of the following describes the role of NTFS and Share Permissions in a domain?
Which of the following describes the role of NTFS and Share Permissions in a domain?
Signup and view all the answers
Which entity in an Organizational Unit typically holds the user accounts?
Which entity in an Organizational Unit typically holds the user accounts?
Signup and view all the answers
How many users are typically included in the user groups in the explained diagram?
How many users are typically included in the user groups in the explained diagram?
Signup and view all the answers
What is the primary function of Organizational Units within a domain?
What is the primary function of Organizational Units within a domain?
Signup and view all the answers
Which of the following is NOT a method to access the domain controller?
Which of the following is NOT a method to access the domain controller?
Signup and view all the answers
What tools are mentioned for creating a new user in Active Directory?
What tools are mentioned for creating a new user in Active Directory?
Signup and view all the answers
When sitting at the computer, which of the following can you use to access the domain controller?
When sitting at the computer, which of the following can you use to access the domain controller?
Signup and view all the answers
Which method involves using command-line tools to manage Active Directory?
Which method involves using command-line tools to manage Active Directory?
Signup and view all the answers
What is a required tool to follow the steps to create a new user?
What is a required tool to follow the steps to create a new user?
Signup and view all the answers
What is a requirement for passwords to meet AD's complexity requirements?
What is a requirement for passwords to meet AD's complexity requirements?
Signup and view all the answers
Which practice is NOT recommended when setting password options in AD?
Which practice is NOT recommended when setting password options in AD?
Signup and view all the answers
For which scenario might the 'Account is disabled' option be appropriate?
For which scenario might the 'Account is disabled' option be appropriate?
Signup and view all the answers
Why should the option 'Password never expires' not be selected?
Why should the option 'Password never expires' not be selected?
Signup and view all the answers
Which statement about password complexity in AD is correct?
Which statement about password complexity in AD is correct?
Signup and view all the answers
What is the first step to unlock a user account that has been locked due to too many failed sign-in attempts?
What is the first step to unlock a user account that has been locked due to too many failed sign-in attempts?
Signup and view all the answers
Where do you need to navigate to check the 'Unlock account' option when unlocking a locked account?
Where do you need to navigate to check the 'Unlock account' option when unlocking a locked account?
Signup and view all the answers
Which of the following actions can be performed from the Properties box of a user account?
Which of the following actions can be performed from the Properties box of a user account?
Signup and view all the answers
To reset a forgotten password or disable/delete an account, what is the initial step after locating the account?
To reset a forgotten password or disable/delete an account, what is the initial step after locating the account?
Signup and view all the answers
What should you do after selecting 'Reset Password' to complete the process?
What should you do after selecting 'Reset Password' to complete the process?
Signup and view all the answers
What is the pre-Windows 2000 user logon name for Lucas Williams?
What is the pre-Windows 2000 user logon name for Lucas Williams?
Signup and view all the answers
Which account option is NOT available when managing Lucas Williams' account?
Which account option is NOT available when managing Lucas Williams' account?
Signup and view all the answers
Which option should be selected to require Lucas Williams to change his password the next time he logs in?
Which option should be selected to require Lucas Williams to change his password the next time he logs in?
Signup and view all the answers
On which date does Lucas Williams' account expire if the 'End of' option is selected?
On which date does Lucas Williams' account expire if the 'End of' option is selected?
Signup and view all the answers
What is indicated by the 'Unlock account' option?
What is indicated by the 'Unlock account' option?
Signup and view all the answers
Which of the following fields are required to reset a user's password in AD?
Which of the following fields are required to reset a user's password in AD?
Signup and view all the answers
What action must a user take for a password change to take effect after it is reset?
What action must a user take for a password change to take effect after it is reset?
Signup and view all the answers
Which checkbox needs to be selected to ensure a user changes their password at the next logon?
Which checkbox needs to be selected to ensure a user changes their password at the next logon?
Signup and view all the answers
What is the default status of the 'Account Lockout Status' during a password reset?
What is the default status of the 'Account Lockout Status' during a password reset?
Signup and view all the answers
Which button should be clicked to confirm the password reset?
Which button should be clicked to confirm the password reset?
Signup and view all the answers
Which account should be disabled in Active Directory for security reasons?
Which account should be disabled in Active Directory for security reasons?
Signup and view all the answers
What can be set to limit how long a session remains disconnected before it ends?
What can be set to limit how long a session remains disconnected before it ends?
Signup and view all the answers
How can Active Directory change the Home folder location for a user?
How can Active Directory change the Home folder location for a user?
Signup and view all the answers
Why is it important for an Administrator password to be strong?
Why is it important for an Administrator password to be strong?
Signup and view all the answers
Why might logon time restrictions be implemented?
Why might logon time restrictions be implemented?
Signup and view all the answers
What is the primary use of Group Policy on a domain controller?
What is the primary use of Group Policy on a domain controller?
Signup and view all the answers
What component contains policies that apply to an Organizational Unit (OU)?
What component contains policies that apply to an Organizational Unit (OU)?
Signup and view all the answers
Which task is beyond the scope of the mentioned book?
Which task is beyond the scope of the mentioned book?
Signup and view all the answers
Which step should be followed to understand how to create and edit a GPO?
Which step should be followed to understand how to create and edit a GPO?
Signup and view all the answers
Is the process of using Group Policy to manage GPOs detailed in the book?
Is the process of using Group Policy to manage GPOs detailed in the book?
Signup and view all the answers
What is the first step to create a new Group Policy Object for the Domain Users OU?
What is the first step to create a new Group Policy Object for the Domain Users OU?
Signup and view all the answers
After navigating to the Domain Users folder, which action should be performed to start creating a new GPO?
After navigating to the Domain Users folder, which action should be performed to start creating a new GPO?
Signup and view all the answers
Which name should be entered in the Name box when creating the new GPO?
Which name should be entered in the Name box when creating the new GPO?
Signup and view all the answers
What is the final action needed to create the new GPO after entering the name?
What is the final action needed to create the new GPO after entering the name?
Signup and view all the answers
What does the acronym GPO stand for in the context of Group Policy Management?
What does the acronym GPO stand for in the context of Group Policy Management?
Signup and view all the answers
In what order are Group Policy Objects (GPOs) applied?
In what order are Group Policy Objects (GPOs) applied?
Signup and view all the answers
Which type of policy is applied last in the Group Policy Object (GPO) application order?
Which type of policy is applied last in the Group Policy Object (GPO) application order?
Signup and view all the answers
Which level of Group Policy Object (GPO) is applied first?
Which level of Group Policy Object (GPO) is applied first?
Signup and view all the answers
What happens if there is a conflict between a Site policy and an OU policy?
What happens if there is a conflict between a Site policy and an OU policy?
Signup and view all the answers
Which policy takes precedence if there is a conflict between a Domain policy and a Local policy?
Which policy takes precedence if there is a conflict between a Domain policy and a Local policy?
Signup and view all the answers
Which policy source ultimately determines the 'Final Applied Policy' when a policy is enforced at the OU level?
Which policy source ultimately determines the 'Final Applied Policy' when a policy is enforced at the OU level?
Signup and view all the answers
In the conflict resolution of policies, which policy source gets overridden by a Domain policy?
In the conflict resolution of policies, which policy source gets overridden by a Domain policy?
Signup and view all the answers
If 'Policy C' is applied at the Site level, what is the 'Final Applied Policy' for Policy C?
If 'Policy C' is applied at the Site level, what is the 'Final Applied Policy' for Policy C?
Signup and view all the answers
What is the default final applied policy if no other policies (Site, Domain, OU) are specified or enforced?
What is the default final applied policy if no other policies (Site, Domain, OU) are specified or enforced?
Signup and view all the answers
How does an enforced OU policy affect the hierarchy of policy application?
How does an enforced OU policy affect the hierarchy of policy application?
Signup and view all the answers
Which command would you use to view the policies set for a computer or user in a drill-down window?
Which command would you use to view the policies set for a computer or user in a drill-down window?
Signup and view all the answers
What is displayed when using the gpresult /v command?
What is displayed when using the gpresult /v command?
Signup and view all the answers
What initial action must be performed to view the Resultant Set of Policy (RSOP)?
What initial action must be performed to view the Resultant Set of Policy (RSOP)?
Signup and view all the answers
When analyzing policies applied to a computer, which command provides a verbose output?
When analyzing policies applied to a computer, which command provides a verbose output?
Signup and view all the answers
To find the detailed set policies resulting from Group Policy processing for a user, which of the following commands is appropriate?
To find the detailed set policies resulting from Group Policy processing for a user, which of the following commands is appropriate?
Signup and view all the answers
What is the minimum password age policy setting in the Default Domain Policy?
What is the minimum password age policy setting in the Default Domain Policy?
Signup and view all the answers
How many passwords are remembered by the 'Enforce password history' policy in the Default Domain Policy?
How many passwords are remembered by the 'Enforce password history' policy in the Default Domain Policy?
Signup and view all the answers
Which setting is applied to the 'Store passwords using reversible encryption' policy in the Default Domain Policy?
Which setting is applied to the 'Store passwords using reversible encryption' policy in the Default Domain Policy?
Signup and view all the answers
What is the value for the 'Account lockout threshold' policy in the Default Domain Policy?
What is the value for the 'Account lockout threshold' policy in the Default Domain Policy?
Signup and view all the answers
What is the password complexity requirement status in the Default Domain Policy?
What is the password complexity requirement status in the Default Domain Policy?
Signup and view all the answers
Which tool is used to encrypt files and folders on an NTFS file system?
Which tool is used to encrypt files and folders on an NTFS file system?
Signup and view all the answers
What does applying the principle of least privilege entail?
What does applying the principle of least privilege entail?
Signup and view all the answers
Which feature is responsible for encrypting an entire volume on a hard drive?
Which feature is responsible for encrypting an entire volume on a hard drive?
Signup and view all the answers
To manage many settings for Internet Explorer, which dialog box is used?
To manage many settings for Internet Explorer, which dialog box is used?
Signup and view all the answers
What can be created to simplify the management of privileges for multiple user accounts?
What can be created to simplify the management of privileges for multiple user accounts?
Signup and view all the answers
What are the two ways to share files and folders on a network?
What are the two ways to share files and folders on a network?
Signup and view all the answers
What is a mapped network drive used for?
What is a mapped network drive used for?
Signup and view all the answers
How does Active Directory (AD) organize resources?
How does Active Directory (AD) organize resources?
Signup and view all the answers
What is included in a forest in Active Directory (AD)?
What is included in a forest in Active Directory (AD)?
Signup and view all the answers
What do managing resources in Active Directory (AD) mainly revolve around?
What do managing resources in Active Directory (AD) mainly revolve around?
Signup and view all the answers
What is the term used when Active Directory changes the Home folder location to a share on the network?
What is the term used when Active Directory changes the Home folder location to a share on the network?
Signup and view all the answers
What is the correct sequence in which group policies are applied?
What is the correct sequence in which group policies are applied?
Signup and view all the answers
Which policy takes precedence in cases of conflict?
Which policy takes precedence in cases of conflict?
Signup and view all the answers
Which of the following is NOT part of the group policy application sequence?
Which of the following is NOT part of the group policy application sequence?
Signup and view all the answers
What does 'OU' stand for in the context of group policies?
What does 'OU' stand for in the context of group policies?
Signup and view all the answers
Study Notes
Controlling Access to Computer Resources
- Controlling access to computer resources involves two key processes: Authentication and Authorization.
Authentication
- Defines the process of verifying an individual's identity to ensure they are who they claim to be.
- In a Windows domain, Active Directory (AD) is responsible for authentication.
Authorization
- Determines the actions an individual can perform within the system after successful authentication.
Password Management
- Each user account should be assigned a password for secure access.
- It's recommended to give users the ability to change their own passwords.
Creating Strong Passwords
- A strong password should be resistant to being guessed by both humans and computer programs
- Strong password criteria:
- Must have at least 16 characters
- Combination of:
- Uppercase and lowercase letters
- Numbers
- Symbols
- At least one symbol must be included
- Avoid using:
- Consecutive letters or numbers
- Adjacent keyboard keys
- Sign-in name
- Words in any language
- Do not reuse passwords across multiple systems
Windows Authentication Tools
- Three tools control user and computer privileges:
- Group Policy: works in Active Directory (AD) on a Windows domain
- Local Group Policy (gpedit.msc): applies only to local computer or user, contains a subset of Group Policy settings
- Local Security Policy (secpol.msc): applies only to local computer's Windows security settings, contains a subset of Local Group Policy settings
Availability of Local Policy Editors
- Local Group Policy and Local Security Policy editors available with:
- Business editions of Windows
- Professional editions of Windows
Windows Authentication Policy Management
- Two windows are used to manage security policies and settings: Local Group Policy editor and Local Security Policy editor.
- These windows have different available settings.
- The Local Security Policy editor is used to edit a subset of policies available in the Local Group Policy editor.
- The Local Group Policy editor has more comprehensive policy settings compared to the Local Security Policy editor.
Managing User Credentials in Windows
- To access Credential Manager, open the applet in Control Panel
- Credential Manager allows management of: • Web credentials • Windows credentials
- In Web Credentials, you can: • Edit user name and password to access websites • Delete website login credentials
- In Windows Credentials, you can: • Edit Windows user names • Edit Windows passwords • Edit and delete digital certificates installed on the system
BIOS/UEFI Passwords
- BIOS/UEFI firmware on the motherboard offers three types of power-on passwords:
Types of Power-on Passwords
- Supervisor password: required to change BIOS/UEFI setup, providing an additional layer of security
- User password: required to use the system or view BIOS/UEFI setup, restricting access to system and setup
- Drive lock password: required to access the hard drive, adding an extra layer of security to data stored on the drive
Securing Internet Explorer
- Internet Explorer 11 is the default browser in current releases of Windows 10/8/7
- Windows 10 features Microsoft Edge as a replacement browser for Internet Explorer
Internet Explorer 11 Tips
- To open the menu bar, press the Alt key or right-click a blank area in the title bar and check Menu bar in the shortcut menu
- Verify HTTPS (HTTP Secure) by looking for https and a padlock icon in the browser address box
- Troubleshooting IE 11 issues:
- Install Windows updates
- Apply a restore point
- Refresh Windows 10/8
- Internet Explorer can be disabled by using Program and Features, Turn Windows features on or off
Deleting Browsing History
- Preserve Favorites website data: Allows cookies and temporary Internet files to retain preferences and display faster for favorite websites.
- Temporary Internet files and website files: Copies of webpages, images, and media saved for faster viewing.
- Cookies and website data: Files or databases stored on your computer by websites to save history, preferences, or improve website performance.
- Components of browsing history: Includes history, download history, form data, passwords, and tracking protection.
- History: A list of websites you have visited.
- Download History: A list of files you have downloaded.
- Form data: Saved information that you have typed into forms.
- Passwords: Stored passwords that are automatically filled in when you sign in to a website you have previously visited.
- Tracking Protection, ActiveX Filtering, and Do Not Track: A list of websites excluded from tracking data, used to detect when sites might automatically be sharing details about your visit, and exceptions to Do Not Track requests.
Internet Options Box
- General tab: allows changing the home page or adding a secondary home page tab, and protects identity and surfing records
- Security tab: enables setting a zone security level
Configuring Privacy and Security
- Privacy tab: blocks cookies that might invade privacy or steal identity
Network and Proxy Settings
- Connections tab: configures proxy server settings and creates a VPN connection
Managing Add-ons
- Programs tab: manages add-ons (also called plug-ins)
Miscellaneous Settings
- Advanced tab: contains various settings to control Internet Explorer
File and Folder Encryption in Windows
- Windows Encrypted File System (EFS) enables file and folder encryption
- EFS is compatible with NTFS file system and business/professional editions of Windows
- Encrypting a folder ensures all files created in or copied to the folder are automatically encrypted
- Encrypted files remain encrypted even when moved to an unencrypted folder
Encrypting a Folder or File
- Right-click the folder or file and open its Properties box
- Click Advanced on the General tab
- Check Encrypt contents to secure data and click OK in the Advanced Attributes box
Identifying Encrypted Files and Folders
- Encrypted file and folder names are displayed in green by default in File Explorer or Windows Explorer
BitLocker Drive Encryption
- Encrypts the entire Windows volume and any other volume on the drive
- Restricts access by requiring one or two encryption keys
- Works in partnership with file and folder encryption
Ways to Use BitLocker Encryption
-
Computer Authentication
- Requires a Trusted Platform Module (TPM) chip on the motherboard
- Stores the BitLocker encryption key (startup key) in the TPM
- Prevents access to the hard drive if it's stolen without the startup key
-
User Authentication
- Stores the startup key on a USB drive
-
Computer and User Authentication
- Requires a PIN or password at every startup
- Example of multifactor authentication (MFA)
BitLocker Encryption Considerations
- BitLocker provides great security, but it comes with two significant risks: TPM failure and losing all copies of the BitLocker startup key.
- Use BitLocker only if the risks of data theft outweigh the risks of using the encryption.
Protecting BitLocker Keys
- Make extra copies of the startup key and/or password to mitigate the risk of losing access.
- Keep the extra copies in a safe and secure location.
Enabling BitLocker
- Enable the TPM chip in the BIOS/UEFI setup to start using BitLocker.
- Open the BitLocker Drive Encryption applet in Control Panel to access the encryption feature.
Firewall Types and Functions
- A router can serve as a hardware firewall
- A corporate firewall is a software firewall installed on a computer between the Internet and the network, often used by large corporations
- A personal firewall (also known as a host firewall) is software that protects an individual computer
Windows Firewall Settings
- Windows Firewall is a personal firewall that protects a computer
- Windows Firewall is automatically configured when setting up a new network connection
- Windows Firewall settings can be customized
Managing User Credentials
- The Credential Manager applet in Control Panel allows you to manage web credentials and Windows credentials.
- You can edit or delete user names and passwords to access websites.
- You can also edit and delete Windows user names, passwords, and digital certificates installed on the system.
Using BIOS/UEFI Passwords to Authenticate Users
- BIOS/UEFI firmware on the motherboard offers power-on passwords, including:
- Supervisor password: required to change BIOS/UEFI setup.
- User password: required to use the system or view BIOS/UEFI setup.
- Drive lock password: required to access the hard drive, stored on the hard drive.
Securing Internet Explorer
- The Internet Options dialog box can be used to secure Internet Explorer.
- Tips for using Internet Explorer 11:
- Press the Alt key or right-click a blank area in the title bar to open the menu bar.
- Look for https and a padlock icon in the browser address box when HTTPS is used.
- Try installing Windows updates, applying a restore point, or refreshing Windows 10/8 if you have a problem with IE 11.
Deleting Browsing History
- Options for deleting browsing history in Internet Explorer:
- Preserve Favorites website data: keeps cookies and temporary Internet files for favorite websites.
- Temporary Internet files and website files: copies of webpages, images, and media saved for faster viewing.
- Cookies and website data: files or databases stored on your computer by websites.
- History: list of websites you have visited.
- Download History: list of files you have downloaded.
- Form data: saved information typed into forms.
- Passwords: stored passwords automatically filled in when signing in to a website.
- Tracking Protection, ActiveX Filtering, and Do Not Track: list of websites excluded from tracking data.
File and Folder Encryption
- Windows Encrypted File System (EFS) can be used to encrypt files and folders.
- EFS only works with the NTFS file system and business/professional editions of Windows.
- An encrypted file remains encrypted if moved to an unencrypted folder.
- To encrypt a folder or file, right-click it, open its Properties box, and check Encrypt contents to secure data.
BitLocker Encryption
- BitLocker Drive Encryption encrypts the entire Windows volume and any other volume on the drive.
- BitLocker works in partnership with file and folder encryption.
- Three ways to use BitLocker Encryption:
- Computer Authentication: uses a TPM chip on the motherboard to hold the BitLocker encryption key.
- User Authentication: stores the startup key on a USB drive.
- Computer and User Authentication: requires a PIN or password at every startup, an example of multifactor authentication.
Windows Firewall Settings
- A router can serve as a hardware firewall.
- A personal firewall, such as Windows Firewall, protects a computer.
- Windows Firewall is automatically configured when setting up a new network connection and can be customized.
Controlling Access to Folders and Files
- Managing shared resources is accomplished by:
- Assigning permissions to user accounts.
- Assigning permissions to folders, files, and printers.
Using Windows to Authenticate Users
- Controlling access to computer resources is done by:
- Authentication: proves that an individual is who they say they are.
- Authorization: determines what an individual can do in the system after authentication.
- Create strong passwords by using 16 or more characters, combining uppercase and lowercase letters, numbers, and symbols, and avoiding common patterns.
User Account Management
- The principle of least privilege is an approach to assigning users the minimum rights required to perform their job tasks.
- User rights or privileges are initially established during user account creation, which determines the account type.
- Privileges can be modified later by changing the user groups associated with the account.
- User accounts can be created using two methods:
- Through the User Accounts applet in the Control Panel.
- Through the Local Users and Groups utility in the Computer Management console.
Classifying User Accounts
- There are two main types of user accounts: Administrator account and Standard user account
Creating a User Account using Computer Management
- To create a user account, open the Computer Management console (compmgmt.msc)
- To create a new user, right-click Users under Local Users and Groups and select New User in the shortcut menu
- Enter required information for the new user and click Create to complete the process
Built-in User Groups
- There are three main built-in user groups in Windows: Administrators, Users, and Guests.
- The Guests group has limited privileges and is assigned a temporary profile that is deleted when the user logs off.
- The Power Users group is available in older editions of Windows and allows users to read from and write to parts of the system, install apps, and perform limited administrator tasks.
- In Windows 10, 8, and 7, the Power Users group is only available for backward compatibility.
Classifying User Accounts and User Groups
Built-in User Groups
- Windows automatically assigns built-in user groups to an account, including:
- Authenticated Users group, which includes all user accounts except the Guest account
- Everyone group, which includes the Authenticated Users group as well as the Guest account
- Anonymous users are users who have not been authenticated on a remote computer
Customized User Groups
- Custom user groups can be created using:
- Management Console
- Local Users and Groups console in business and professional editions of Windows
- Creating custom user groups makes it:
- Easier to assign permissions to user groups rather than to individual accounts
- Useful when several users need the same permissions
Managing Shared Folders and Files in Windows
- There are two general strategies for managing shared folders and files in Windows: Workgroup sharing and Domain Controlling
- Workgroup sharing offers better security than a homegroup
- Domain Controlling is used when a computer belongs to a domain, and all security is managed by the network administrator for the entire network
Organizing Shared Data
- Private data for individual users should be kept in the C:\Users folder for that user
- Data for all users to share should be placed in the C:\Users\Public folder
- For best security, create a folder outside of the above folders and assign permissions to that folder and its subfolders
- This allows control over access, granting permissions to:
- All users
- Certain users or user groups
Methods to Assign Permissions to Folders and Files
Workgroup Sharing Methods
- Windows offers two methods to share a folder using workgroup sharing
Share Permissions
- Grant permissions only to network users, not to local users
- Apply to a folder and its contents, not to individual files
NTFS Permissions
- Apply to both local users and network users
- Apply to both folders and individual files
- Work only on NTFS volumes
- Configured using the Security tab in a file or folder's Properties box
Implementing Permissions
- When both share and NTFS permissions are used, the most restrictive permission is applied.
- When NTFS permissions conflict, the more liberal permission is applied.
Permission Propagation
- Permission propagation occurs when permissions are passed from parent to child.
Inherited Permissions
- Inherited permissions are permissions attained from a parent object.
Moving and Copying Objects
- When an object is moved or copied to a folder, it takes on the permissions of that folder.
- Exception: When an object is moved (not copied) from one location to another on the same volume, it retains its original permissions from the original folder.
gpresult Command
- Use the gpresult command to retrieve a list of all groups a user belongs to
- The command provides information helpful for troubleshooting user group issues and Group Policy problems
- To retrieve information on a user other than the one signed in, use the command: gpresult /scope:user /username: /r
Methods to Assign Permissions to Folders and Files
- Two general strategies for managing shared folders and files in Windows: Workgroup sharing and Domain Controlling
- Workgroup sharing offers better security than a homegroup
- Domain Controlling is used when a computer belongs to a domain, and all security is managed by the network administrator for the entire network
- Tips on which folder to use to hold shared data:
- Private data for individual users is best kept in the C:\Users folder for that user
- Data for all users to share should be placed in C:\Users\Public folder
- For best security, create a folder not in either of the above folders and assign permissions to that folder and its subfolders
- Allow all users access or only certain users or user groups
Methods to Assign Permissions to Folders and Files (continued)
- Using workgroup sharing, Windows offers two methods to share a folder:
-
Share permissions: grant permissions only to network users and not to local users
- Apply to a folder and its contents, not to individual files
-
NTFS permissions: apply to local users and network users
- Apply to both folders and individual files
- Work on NTFS volumes only
- Configured using the Security tab in a file or folder's Properties box
-
Share permissions: grant permissions only to network users and not to local users
Implementing Permissions
- Tips when implementing permissions:
- If both share and NTFS permission are used, the most restrictive permission applies
- If NTFS permissions are conflicting, the more liberal permission applies
- Permission propagation: when permissions are passed from parent to child
- Inherited permissions: permissions attained from a parent object
- When you move or copy an object to a folder, the object takes on permissions of that folder
- Exception: when you move (not copy) an object from one location to another on the same volume, the object retains its permissions from the original folder
Managing User Credentials
- Manage User Credentials using the Credential Manager applet in Control Panel
- Allows you to manage web credentials and Windows credentials
- You can edit or delete the user name and password to access websites
- When you click Windows Credentials:
- You can edit and delete Windows user names, passwords, and digital certificates installed on the system
BIOS/UEFI Passwords to Authenticate Users
- BIOS/UEFI firmware on the motherboard offers power-on passwords:
- Supervisor password: required to change BIOS/UEFI setup
- User password: required to use the system or view BIOS/UEFI setup
-
Drive lock password: required to access the hard drive
- Stored on the hard drive, so it will still control access to drive in the event the drive is removed
Securing Internet Explorer
- The Internet Options dialog box can be used to secure Internet Explorer
- Tips about using Internet Explorer 11:
- To open the Internet Explorer menu bar, press the Alt key or right-click a blank area in the title bar and check Menu bar in the shortcut menu
- Look for https and a padlock icon in the browser address box when HTTPS (HTTP Secure) is used
- If you have a problem with IE 11, try installing Windows updates, applying a restore point, or refreshing Windows 10/8
- You can disable Internet Explorer by using Program and Features, Turn Windows features on or off
- Tips about using Internet Explorer 11:
Deleting Browsing History
- Preserve Favorites website data: keep cookies and temporary Internet files that enable your favorite websites to retain preferences and display faster
- Temporary Internet files and website files: copies of webpages, images, and media that are saved for faster viewing
- Cookies and website data: files or databases stored on your computer by websites to save history, preferences, or improve your website performance
- History: list of websites you have visited
- Download History: list of files you have downloaded
- Form data: saved information that you have typed into forms
- Passwords: stored passwords that are automatically filled in when you sign in to a website you have previously visited
- Tracking Protection, ActiveX Filtering, and Do Not Track: a list of websites excluded from tracking data used by tracking protection to detect when sites might automatically be sharing details about your visit, and exceptions to Do Not Track requests
Important Tabs in the Internet Options Box
- General tab: change the home page or add a second home page tab, protect your identity and surfing records
- Security tab: set a zone security level
- Privacy tab: block cookies that might invade your privacy or steal your identity
- Connections tab: allows you to configure proxy server settings and create a VPN connection
- Programs tab: used to manage add-ons (called plug-ins)
- Advanced tab: contains several miscellaneous settings used to control Internet Explorer
File and Folder Encryption
- In Windows, files and folders can be encrypted using Windows Encrypted File System (EFS)
- Works only with the NTFS file system and business/professional editions of Windows
- If a folder is marked for encryption, every file created in or copied to the folder will be encrypted
- An encrypted file remains encrypted if moved to an unencrypted folder
- To encrypt a folder or file:
- Right-click it and open its Properties box
- On the General tab, click Advanced
- In the Advanced Attributes box, check Encrypt contents to secure data and click OK
BitLocker Encryption
-
BitLocker Drive Encryption encrypts the entire Windows volume and any other volume on the drive
- Restricts access by requiring one or two encryption keys
- Works in partnership with file and folder encryption
- Three ways to use BitLocker Encryption:
- Computer Authentication: uses a chip on the motherboard called TPM (Trusted Platform Module) to hold the BitLocker encryption key
- User Authentication: uses a startup key stored on a USB drive
-
Computer and User Authentication: requires a PIN or password at every startup
- An example of multifactor authentication (MFA)
Windows Firewall Settings
- A router can serve as a hardware firewall
- In addition, a large corporation might use a software firewall (called corporate firewall) installed on a computer between Internet and the network
- A personal firewall (also called host firewall) is software on a computer to protect that computer
- Windows Firewall is a personal firewall that protects a computer
- Automatically configured when you set up your security level for a new network connection
- Can also customize the settings
Controlling Access to Folders and Files
- Managing shared resources is accomplished by:
- Assigning permissions to user accounts
- Assigning permissions to folders, files, and printers
Classifying User Accounts and User Groups
- Principle of least privilege: an approach where computer users are assigned the minimum rights required to do their job
- Rights or privileges are established when you first create a user account (when you decide the account type)
- Privileges can later be changed by changing the user groups to which the account belongs
- User accounts are created using the User Accounts applet in Control Panel
- Or by using the Local Users and Groups utility in the Computer Management console
Type of User Account
- Administrator account
- Standard user account
Built-in User Groups
- Administrators and Users groups
-
Guests group
- Has limited privileges and is given a temporary profile that is deleted when user logs off
-
Power Users group
- Older editions offer this group that can read from and write to parts of the system, install apps, and perform limited administrator tasks
- Windows 10/8/7 offers this group only for backward compatibility
Windows Might Automatically Assign One of These Built-in User Groups to an Account
- Authenticated Users group: includes all user accounts except the Guest account
- Everyone group: includes the Authenticated Users group as well as the Guest account
- Anonymous users: users who have not been authenticated on a remote computer
Customized User Groups
- Use Management Console or the Local Users and Groups console in business and professional editions of Windows to create custom user groups
- Easier to assign permissions to user groups rather than to individual accounts
- User groups work well when several users need the same permissions
Sharing Folders and Files
- For NTFS volumes, it is recommended to use NTFS permissions whenever possible.
Using Share Permissions
- To share a folder, follow these steps:
- Open the folder's Properties box, select the Sharing tab, and click Advanced Sharing.
- Check the "Share this folder" option and click Permissions.
- Click Add to add a new user or group.
- In the Select Users or Groups box, enter a user account or a user group and click OK.
- To remove the Everyone group, select it in the Permissions box and click Remove.
Managing Shared Folders and Files
- Troubleshoot access issues by following the steps outlined in the text
- Use advanced permissions settings to gain further control of a user or group
- Access advanced permissions by clicking Advanced on the Security tab of a folder's Properties box
Inheritance and Permissions
- Subfolders inherit permissions of the parent folder
- Manage permissions using the parent folder
Effective Permissions
- Check the Effective Permissions tab of the Advanced Security Settings box to determine the actual permissions in effect
Sharing Folders and Files
- Folder Ownership: The owner of a folder always has full permissions.
- Workgroup Optimization: Using only one workgroup improves performance, as it ensures all users are in the same workgroup.
- Password Security: Require passwords for all user accounts to maintain security.
- Mapped Network Drive: Use a mapped network drive for convenient access and management of shared folders and files.
Methods to Assign Permissions to Folders and Files
- Two strategies for managing shared folders and files in Windows:
- Workgroup sharing offers better security than a homegroup
- Domain Controlling manages security for the entire network if the computer belongs to a domain
- Tips for choosing a folder to hold shared data:
- Private data: C:\Users folder for each user
- Shared data: C:\Users\Public folder or a custom folder with assigned permissions
Share Permissions
- Two methods to share a folder using workgroup sharing:
- Share permissions grant permissions only to network users, not local users
- NTFS permissions apply to both local and network users, work on NTFS volumes only
- Share permissions apply to folders and their contents, not individual files
- NTFS permissions can be configured using the Security tab in a file or folder's Properties box
Implementing Permissions
- Important tips:
- Most restrictive permission applies when both share and NTFS permissions are used
- Inherited permissions: permissions attained from a parent object
- Permission propagation: permissions passed from parent to child
- When moving an object, it takes on permissions of the new folder, except when moving within the same volume
Sharing Folders and Files
- Tips for managing shared folders and files:
- Take ownership of a folder (owner always has full permissions)
- Use only one workgroup for better performance
- Require passwords for all user accounts
- Use a mapped network drive
Authenticating Users
- Manage User Credentials:
- Use Credential Manager applet in Control Panel
- Manage web credentials and Windows credentials
- BIOS/UEFI firmware offers power-on passwords:
- Supervisor password (required to change BIOS/UEFI setup)
- User password (required to use the system or view BIOS/UEFI setup)
- Drive lock password (required to access the hard drive)
File and Folder Encryption
- Windows Encrypted File System (EFS):
- Works only with NTFS file system and business/professional editions of Windows
- Encrypts files and folders to secure data
- BitLocker Drive Encryption:
- Encrypts entire Windows volume and any other volume on the drive
- Restricts access by requiring one or two encryption keys
Windows Firewall Settings
- Windows Firewall:
- A personal firewall that protects a computer
- Automatically configured when setting up a new network connection
- Can be customized for better security
Controlling Access to Folders and Files
- Managing shared resources:
- Assigning permissions to user accounts
- Assigning permissions to folders, files, and printers
- Principle of least privilege: an approach where users are assigned minimum rights required to do their job
Classifying User Accounts and User Groups
- Types of user accounts:
- Administrator account
- Standard user account
- Built-in user groups:
- Administrators and Users groups
- Guests group
- Power Users group (older editions, for backward compatibility)
- Customized user groups:
- Use Management Console or Local Users and Groups console to create custom groups
- Easier to assign permissions to user groups rather than individual accounts
Network Shares
- A network share allows a client computer to access hard drive space on another host computer as if it were a local hard drive
- Mapping the drive makes the remote hard drive space appear as a new local drive (e.g. drive E)
Network File System (NFS)
- Enables access to files on the network as easily as if they were stored on the local computer
- A type of distributed file system (DFS) that shares files on a network
Sync Center
- Sync Center enables synchronization of shared folders or volumes between two computers
- Located in Control Panel as an applet
Enabling Sync Center and Offline Files
- To enable Sync Center and offline files, follow these steps:
- Go to Control Panel, open Sync Center, and click Manage offline files
- Click Enable offline files and then click OK (requires a computer restart)
- Right-click a shared folder in File/Windows Explorer and select Always available offline
- The folder will sync on both local and remote computers
Manual Sync
- To force a manual sync of files in a folder:
- Open File Explorer, select the folder, and open the Home menu
- Click Easy access and then click Sync
Windows File Explorer
- Windows File Explorer displays a list of drives and folders on the left, including local disks, network drives, and computer names.
- The drives and folders listed include Local Disk (C), Local Disk (D), Netwerk, ANDRDAS, BMC-DESKTOP7777, LENOVOLAPTOP, and Camtasia.
Folder Options
- The Resources folder has a right-click menu with options, including:
- Open and open in new window
- Pin to Quick access and Pin to Start
- Scan with Windows Defender and Map network drive
- Always available offline (configure a network share as an offline folder)
- Restore previous versions and Include in Library
- Copy, Paste, Create shortcut, and Properties
Sync Center and Offline Files
- A Windows File Explorer folder is displayed, titled "LENDVOLAPTOP", containing various files and folders.
- The folder contains files and folders such as Lamtosa, Data, Data2, dlme, Downloads, Financial, Resources, and Users.
- A right-click menu is open, providing options:
- Easy access
- Include in library
- Map as drive
- Always available offline
- Sync
- Work offline
Protecting Confidential Data
- Disable File and Printer Sharing to prevent unauthorized access to confidential data on the network
- Hide a shared folder by adding a $ to the end of the folder name to conceal it from other users
Hidden Shared Folders
- To access a hidden shared folder, users must enter the complete path to the folder, including the $, in the search box
- Hidden shared folders are not visible to other users, but can still be accessed by those who know the complete path
Local Shares
- Local shares refer to folders and files on a computer that are shared with others using local user accounts
Hidden Network Resources and Administrative Shares
- A hidden share can be created by adding a dollar sign ($) at the end of the share name.
- The hidden share will not be visible unless the exact name is used to locate it.
- To access a hidden, shared folder on the network, you need to search for its exact name.
Administrative Shares
- Administrative shares are folders shared by default, accessible to administrator accounts at the domain level.
- There are two types of administrative shares:
Types of Administrative Shares
- One type is the
%systemroot%
folder, which is a critical system directory. - The other type includes any volume or drive, providing broad access to administrator accounts.
Accessing Administrative Shares
- An administrative share can be accessed through a Windows File Explorer window.
- The address bar in the File Explorer window is set to a specific format, in this case, "\ws14\admins".
- This format is used to access the administrative share on a domain.
- The File Explorer window displays various folders, including "Quick access", "Desktop", and "Downloads", when accessing the administrative share.
Active Directory Overview
- Active Directory (AD) is a suite of services and databases provided by Windows Server.
- AD is used to manage Windows domains, including access to the domain and what users and computers can do in the domain.
Active Directory Components
- Active Directory incorporates five groups of services:
- Active Directory Domain Services (AD DS)
- Active Directory Certificate Services (AD CS)
- Active Directory Federation Services (AD FS)
- Active Directory Rights Management (AD RMS)
- Active Directory Lightweight Directory Services (AD LDS)
Active Directory Hierarchy
- Active Directory organizes resources in a top-down hierarchical structure
- The highest level of this hierarchy is the forest, which represents the entire enterprise
Domains and Organizational Units
- A forest contains one or more domains, which are organized into organizational units (OUs)
- OUs are further divided into sub-organizational units
Organizational Units (OUs)
- OUs are created to simplify the assignment of privileges to users and computers within the OU
- Privileges are assigned using policies created by Group Policy
- These policies are contained in Group Policy Objects (GPOs)
Active Directory Organizational Structure
- An Active Directory organizational structure consists of multiple components, forming a hierarchical relationship between them.
- A Forest is a collection of one or more domains, represented by blue triangles.
- Trust Relationships between forests are managed by AD Federation Services, depicted by an arrow connecting the two forests.
- A Domain is a part of a forest, containing Sites, represented by a blue triangle with two circles labeled "Site".
- Sites are individual circular shapes within a domain.
- An Organizational Unit (OU) is represented by a house-shaped icon within a site.
- User Groups are two boxes inside the OU, containing users and computers.
- Users and Computers are represented by icons inside the user groups.
- The Active Directory organizational structure is depicted in Figure 7-47.
Applying Group Policy and Permissions
- Group Policy applies to Organizational Units (OUs) in a domain.
- An Organizational Unit typically contains user groups, with each user group having multiple users.
- User groups within an Organizational Unit can have two or more users.
- NTFS and Share Permissions are used to control access to resources in a domain.
- These permissions apply to folders, managing access to resources within them.
Accessing the Domain Controller
- Three methods to access the domain controller: sitting at the computer, remote access to Windows Server, and using AD Administrative Center and PowerShell
Creating a New User
- Use Server Manager to create a new user
- Follow the outlined steps to complete the new user creation process
Best Practices for Password Options in AD
- Always require a password for user accounts
Password Complexity Requirements
- Minimum of 8 characters in length
- Must contain a mix of:
- Lowercase letters
- Uppercase letters
- Numbers
- Symbols
- Cannot contain any three consecutive letters found in the:
- User name
- Display name
Password Management Options
- Require users to change their password at next logon
- Avoid checking "Password never expires" for security reasons
- "Account is disabled" option is useful for setting up accounts in advance of their actual use
Managing User Accounts in AD
- An account may get locked due to excessive failed sign-in attempts
- To unlock a locked account:
- Locate the account, right-click it, and select Properties
- In the Properties box, select the Account tab, check Unlock account, and click Apply
- To reset a forgotten password:
- Locate the account, right-click it, and select Properties
- Click Reset Password
- Options to disable and delete an account are available in the Reset Password section
User Account Properties
- A user account can have various properties, including Member Of, Password Replication, Address, Account, Dialin, and Environment.
- The Member Of property can have values such as Sessions and General.
- The Password Replication property can have values such as Remote control and Profile.
- The Address property can have values such as Remote Desktop Services and Telephones.
- The Account property can have values such as Profile and COM-.
- The Dialin property can have values such as Organization.
User Logon Name
- A user logon name can be in the format of an email address, such as [email protected].
- A user logon name can also be in the pre-Windows 2000 format, such as HOMERUN\lucas_williams.
Logon Hours and Log On To
- Logon hours and log on to options can be configured for a user account.
Account Options
- Options can be set to control password behavior, such as:
- User must change password at next logon
- User cannot change password
- Password never expires
- Store password using reversible encryption
Account Expiration
- An account can be set to expire at a specific time, such as the end of a specific date (e.g. Tuesday, November 6, 2018).
- An account can also be set to never expire.
Resetting a User Password
- The password reset dialog window contains four fields: New password, Confirm password, User must change password at next logon, and Unlock the user's account.
- The dialog window displays a message reminding the user to log off and log on again for the change to take effect.
- The "Account Lockout Status" is set to Unlocked after resetting the password.
- The dialog window has two buttons: OK and Cancel.
- The window is used to reset a user's password in Active Directory (AD).
Managing User Accounts in Active Directory
- Disable the Guest account to prevent unauthorized access
- Implement logon time restrictions to schedule routine maintenance during off-peak hours
- Set timeout and screen lock policies to limit the duration of disconnected sessions and require users to log back in
- Ensure administrators use strong passwords to protect against unauthorized access
- Configure home folders to redirect to a network share using folder redirection
- Utilize logon scripts to execute specific tasks or settings during user logon
Group Policy Objects
- Group Policy can be used to create Group Policy Objects (GPOs) on a domain controller
- GPOs contain policies that apply to a specific Organizational Unit (OU)
- Creating and editing a GPO is possible, but managing GPOs using Group Policy is beyond the scope of this book
- This book provides a brief overview of the process of creating and editing a GPO
Creating a new GPO for the Domain Users OU
- To create a new GPO, navigate to the Domain Users folder within the Group Policy Management Console.
- Right-click the Domain Users OU and select New GPO to initiate the creation process.
- The new GPO requires a name, which in this case is GPO user startup.
- Selecting OK after naming the GPO completes the creation process.
Policy Application Order
- Policy conflicts can arise when policies overlap
- The order of policy application is crucial in resolving conflicts
- The last policy applied takes precedence in case of conflicts
Policy Application Hierarchy
- The order of policy application is as follows:
- Local policies
- Site policies
- Domain policies
- OU policies
- Enforced policies
How Group Policies Are Applied
- When conflicting policies exist, the final applied policy is determined by the policy source.
- Local policies have the highest priority and are applied first.
- If there is no local policy, site policies are applied, and if there is no site policy, domain policies are applied.
- OU policies are applied last, and if they are enforced, they override other policies.
- When a policy is enforced, it means that it cannot be overridden by other policies.
- The resulting policy is the combination of all policies applied in the following order: Local, Site, Domain, OU.
Determining Resulting Policies
- To find out the resulting policies for a computer or user, there are two methods:
- Method 1: Open a command prompt window and enter the
rsop.msc
command, which opens the Resultant Set of Policy (RSOP) window. - In the RSOP window, you can drill down to see the policies set for the computer or user.
- Method 2: Open a command prompt window and enter the
gpresult /v
command, which displays the policies currently applied to the computer and user.
Security Settings
- The Default Domain Policy enforces a password history of 24 previously used passwords.
- The minimum password age is set to 42 days in the Default Domain Policy.
- There is a conflicting policy setting for minimum password age, which is set to 1 day in the Default Domain Policy.
- The minimum password length is set to 7 characters in the Default Domain Policy.
- Passwords must meet complexity requirements, as enabled in the Default Domain Policy.
- Storing passwords using reversible encryption is disabled in the Default Domain Policy.
- The account lockout threshold is set to 0 invalid logon attempts in the Default Domain Policy.
Password Security
- A long password is considered a strong password, providing better security.
Windows Computer Security
- Local Group Policies and Local Security Policies are used to secure a Windows computer.
Internet Explorer Settings
- The Internet Options dialog box is used to manage various Internet Explorer settings.
File Encryption
- Encrypting File System (EFS) is used to encrypt files and folders on an NTFS file system.
- BitLocker Drive Encryption is used to encrypt an entire volume on a hard drive.
Network Access Control
- Access to folders and files on a network is controlled by:
- Assigning privileges to user accounts.
- Assigning permission to folders and files.
- The principle of least privilege should be applied when assigning privileges to users.
- Customized user groups can be created to simplify the management of privileges for multiple user accounts.
File Sharing on the Network
- There are two ways to share files and folders on the network: workgroup sharing and domain controllers.
- Mapped network drives enable users to access drives and folders on the network more easily.
Active Directory (AD)
- AD is a suite of services and databases provided by Windows Server to manage Windows domains.
- AD organizes resources in a top-down hierarchical structure.
AD Structure
- A forest contains a domain.
- Domains can contain sites.
- Domains are organized into organizational units (OUs) and sub-organizational units.
Resource Management in AD
- Managing resources in AD revolves around Organizational Units (OUs), user groups, and NTFS and share permissions.
Active Directory Features
- Active Directory allows changing the Home folder location to a share on the network, a feature known as folder redirection.
Group Policy Application
- Group policies are applied in a specific order: local, site, domain, OU, and enforced.
- In the event of a conflict between policies, the last policy applied takes precedence.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Learn about the basics of controlling access to computer resources, including authentication and authorization, and how Windows Active Directory handles user authentication.