510 likes | 616 Views
Managing and Supporting XP. Security Using Windows NT/2000/XP. Two goals of security Secure system resources, including hardware and software, from improper use Secure users’ data from improper access Concept of user accounts is key to understanding Windows XP. User Accounts and Profiles.
E N D
Security Using Windows NT/2000/XP • Two goals of security • Secure system resources, including hardware and software, from improper use • Secure users’ data from improper access • Concept of user accounts is key to understanding Windows XP
User Accounts and Profiles • Defines a user to Windows • Records information about the user (e.g., user name, account password, group memberships, rights and permissions assigned to the account) • Three types • Global (domain) user accounts • Local user accounts • Built-in user accounts
User Profiles • Created by the system after user logs on for first time • Types • Roaming user profile • Mandatory user profile • Group profile
Administering Local User Accounts Password guidelines for users and administrators: • Usernames can consist of up to 15 characters • Passwords can be up to 127 characters • Do not use a password that is easy to guess
Administering Local User Accounts (continued) • Use combination of letters, numbers, and non-alphanumeric characters for greatest security • Always set a password for the Administrator account • Passwords can be controlled by administrator, but generally, users should be allowed to change their own
Creating a User Account • Log on as the Administrator • Open Computer Management • Expand Local Users and Groups, right-click Users, select New User, enter user data, click Create
To Change User Account Type • Click Change an account, click the account to be changed • Select account data to be changed and click Change the account type • Select account type, click Change Account Type, click Back twice
User Groups • Efficient way for administrator to manage multiple user accounts that require same privileges and similar profiles • Groups installed by Windows XP • Administrators • Backup Operators • Power Users • Limited Users • Guests
Creating a New User Group • Click Start, right-click My Computer, select Manage • Expand Local Users and Groups • Right-click Groups folder, select New Group • Enter group name, description, click Add to add users, click Create
Disk Quotas • Limit how much disk space user has access to • Does not specify location of files, just total space allowed on a volume • Can be set only if you are using NTFS
Setting Disk Quotas • Log on as Administrator, open My Computer • Right-click disk, select Properties • Click Quota tab, check Enable quota management
Setting Disk Quotas(continued) • Click Limit disk space to, enter limit • Enter size for Set warning level to • Click Deny disk space to users exceeding quota, click OK
EFS (Encrypted File System) • Encryption is the process of putting readable data into code that must be translated before it can be accessed • Protects data even when someone not authorized to view files or folders has full access to computer’s data storage • Applies only to Windows 2000/XP NTFS file system
How to Use Encryption • Can be implemented at either the folder or file level • Folder level is encouraged and considered a “best practice” strategy
Encrypting Folder Contents • Locate the folder to be encrypted • Right-click the folder, choose Properties • On the General tab, click Advanced • Check Encrypt contents to secure data and click OK
Encrypting Folder Contents (continued) • Click Apply • If necessary, click Apply changes to this folder, subfolders, and files, click OK • A file saved in this folder is automatically encrypted
The Cipher Command • For use when encrypting a large number of files or folders from a command prompt or using a batch file • CIPHER [/E, /D] [/S:dir] [pathname[…]] • /E encrypts specified files or folders • /D decrypts specified files or folders • /S:dir applies the action to the specified folder (directory) and all its subfolders • Pathname is the name of the file/folder and its path that is to be encrypted/decrypted
The Windows NT/2000/XP Registry • Hierarchical database containing information about all hardware, software, device drivers, network protocols, and user configuration needed by the OS and applications • Organization • Viewing contents • Back up and recovery • Making changes
How the Registry Is Organized • Logical organization • Upside-down tree structure of keys, subkeys, and values • Physical organization • Stored in five files called hives
Physical Organization of the Registry • Registry is stored in five files called hives
Editing the Registry • Modified automatically when you make a change (e.g., in Control Panel or Device Manager) • Rare occasions when you might need to edit manually • Changes take effect immediately and are permanent
Registry Editors • Two versions under Windows NT/2000 • Regedt32.exe • Security menu allows you to apply permissions to keys and subkeys • Option to work in read-only mode • Regedit.exe • Used to search and view the registry • Under Windows XP, typing Regedit or Regedt32 starts Regedit
Other Maintenance and Troubleshooting Tools • Executed from a command line (.exe file extension) • Microsoft Management Console snap-ins (.msc file extension) • Built into Windows XP (e.g., Safe Mode)
Windows Update • An automated way to update the OS, applications, and device drivers • If no user interaction required, any user can perform an update • If decisions must be made, only a user with administrative rights can update
Troubleshooting the Boot Process • Last Known Good Configuration (and sometimes Driver Rollback) • Safe Mode from Advanced Options menu • System Restore • Windows XP/2000 Boot disk • Recovery Console • Automated System Recovery • Reinstall Windows XP using Windows CD
Advanced Options: Safe Mode and Last Known Good Configuration
System Restore • Similar to ScanReg, but cannot be executed from command prompt • Process does not affect user data on hard drive but can affect: • Installed software and hardware • User settings • OS configuration settings • Restores system state using a restore point
System Restore(continued) To revert the system to a restore point • Click Start, All Programs, Accessories, System Tools, and System Restore • Click Restore my computer to an earlier time, then click Next • Select a restore point, click Next twice • Windows XP reboots and restores the system state
Create using Windows Explorer Can access the drive and recover data files (if the hard drive is not using NTFS) Cannot launch Windows XP or be used to recover from a failed installation MS-DOS Startup Disk
Boot sector Master boot record Partition table Ntldr Ntdetect.com Boot.ini Ntbootdd.sys Windows XP Boot Disk Can bypass missing or damaged:
Windows XP Boot Disk(continued) • Format a floppy using Windows 2000/XP and copy the following files to it • Ntldr and Ntdetect.com • If the system boots from a SCSI hard drive, copy the SCSI device driver to the floppy and rename it Ntbootdd.sys • Boot.ini • Write-protect the floppy disk
Automated System Recovery • Restores system partition to its state when the backup was made • Changes made since last backup are lost • Periodically make fresh copies of ASR disk set
Using ASR to Restore System • Boot the PC from the Windows XP CD • Press any key to boot from CD • If necessary, Press F6 to load RAID or SCSI drivers • Press F2 to run Automated System Recovery Process • Insert ASR floppy disk
Using ASR to Restore System(continued) • Loads files it needs to run • Repartitions and reformats the drive • Installs Windows from Windows XP CD • Launches the Automated System Recovery Wizard to restore the system state, applications, and data