210 likes | 449 Views
Module 6 : Delegating Administrative Control. Overview. Describing How Windows 2000 Ensures Secure Access to Active Directory Delegating and Managing Administrative Control Using Group Policies to Enforce Security Policies Developing a Plan to Delegate Administrative Authority.
E N D
Overview • Describing How Windows 2000 Ensures Secure Access to Active Directory • Delegating and Managing Administrative Control • Using Group Policies to Enforce Security Policies • Developing a Plan to Delegate Administrative Authority
Delegating Administrative Control in Active Directory • Reviewing the Security Foundation • Understanding Security Descriptors • Delegating Access Control at the OU Level • Delegating Access Permissions and Rights at the Object and Object Property Level • Examining Access Control Entries • Ensuring Inheritance of Permissions and Rights to Child Objects • Understanding Ownership
Reviewing the Security Foundation • Security Descriptors Protect Objects • Security Principals Receive Permissions and Rights • Groups Can Be Customized • Security Identifiers Uniquely Identify Security Principals
Objects Understanding Security Descriptors Example of a Container Security Descriptor Security Descriptor Owner SID Group SID Discretionary ACL System ACL Access Control Entries Grant Owner Full Control Grant World List Contents Grant User1 Create Child User
OU OU OU OU OU OU OU Delegating Access Control at the OU Level • Delegate Create and Delete All Objects of a Specific Type Users Object Type = User Permissions = Create Child Delete Child
OU OU OU OU OU OU OU Delegating Access Permissions and Rights at the Object and Object Property Level • Delegate Ability to Administer a Specific Property for All Objects of a Certain Type Groups Inherit Object Type = Group Object Type = Group Membership Permissions = Read Property Write Property Inheritance = Inherit Only
Security Descriptor Owner SID Group SID Discretionary ACL System ACL Access Control Entries Objects Examining Access Control Entries Example of a User Object Security Descriptor Deny User1 Read/Write Property Set 2 Grant Owner Full Control Grant World Read Property All Grant User2 Read/Write Property Set 1 Grant User3 Read/Write Property Mgr
OU OU OU Ensuring Inheritance of Permissions and Rights to Child Objects Full Control • Define Inheritance on the Root Container Full Control Full Control • Examine Object-specific and Property-specific Inheritance • Dynamic inheritance • Create time inheritance
Understanding Ownership Permission to Take Ownership Owner, Administrator TakesOwnership User Accounts, Groups
Boru Properties Delegation of Control Wizard Name of the Container You need to specify the name of the Container Name Authenticated User Local System Domain Admins (TARA\Domain Admins) Schema Admins (TARA\Schema Admins) Administrators (TARA\Administrators Authenticated User In which part of a directory can control be delegated? Control can be delegated at any container. The best places to delegate control is domain or organizational unit. Name of the container you want to delegate control on Permissions Allow Deny Full control Read Write Create all child objects Delete all child objects tara.irish.com/Boru GeneralManaged By Object Security Next > Cancel Advanced... Add... < Back Cancel Apply Remove Allow inheritable permissions from parent to propagate to this object OK Examining Tools for Delegating Administrative Control ACL Editor Delegation of Control Wizard
Assign Permissions to Groups Assign Permissions at the OU Level Wherever Possible Leverage Inheritance to Permit Access in an OU Hierarchy Use Property Level Permissions Sparingly Use a Small Number of Domain Administrators Best Practices for Delegating Administrative Control
Using Group Policies to Enforce Security Policies • Implementing Group Policies • Applying Default Domain Policies • Designing a Group Policy Strategy
gpedit - (“test” Policy) Action View Name Computer Settings User Settings Type Description “test” Policy Computer Settings Application Deployment User Documents & Settings Scripts - Startup/Shutdown Security Settings Software Policy User Settings Application Deployment User Documents & Settings Scripts - Logon/Logoff Security Settings Software Policy Ready Implementing Group Policies
Applying Default Domain Policies Domain A Policy Domain B Policy Local Policy Domain A Domain B
Designing a Group Policy Strategy • Layered vs. Monolithic Design • Single Policy Type vs. Multiple Policy Types • Functional Roles Design vs. Team Design • OU Delegation with Central or Distributed Control • Best Practices
OU Delegation with Central or Distributed Control Change Password, Force Policy Inheritance Building Access 7am - 7 pm Engineering GPO Research GPO Block Policy Inheritance Sales GPO
Minimize the Number of GPOs Create GPOs Needed for Delegating Authority Avoid Forcing or Blocking Inheritance Avoid Overriding User-based Group Policy Let Policy Flow Down By Inheritance Best Practices
Review • Describing How Windows 2000 Ensures Secure Access to Active Directory • Delegating and Managing Administrative Control • Using Group Policies to Enforce Security Policies • Developing a Plan to Delegate Administrative Authority