2.6 Compare and contrast the differences of basic Microsoft Windows OS security settings. Flashcards

1
Q

• User and groups

Starter and Home editions of Windows allow the use of two groups only: • Limited/standard user. • Computer administrator.

For Windows Professional/Business, the principal built-in local groups include Administrators, Users, Guests, and Power Users.

A

A USER account is the principal means of controlling access to computer and network resources and rights or privileges. The User Accounts applet in Control Panel

GROUPS Built-in groups are given a standard set of rights that allow them to perform appropriate system tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • Administrator
A

An Administrator account can perform all management tasks and generally has very high access to all files and other objects in the system.

The user created at installation is automatically added to this group. You should restrict use of this type of account, using a regular user account when appropriate, and only log in with administrative privileges for specific tasks.

When Windows is installed to a new computer, the account actually named “Administrator” is disabled by default. The setup procedure creates an account with administrative privileges in its place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • Power user
A

The Power Users group still appears to support legacy applications, but its use is strongly deprecated.

The rights allocated to this account type can be abused to allow the user to obtain more powerful Administrator or System privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • Guest
A

Guests group has only limited rights; for example, members can browse the network and Internet and shut down the computer but cannot save changes made to the desktop environment.

If a user attempting to access your computer who does not hold their own user account, will be connected using the Guest account credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • Standard user
A

When a new user is created, they are typically added to the standard Users group. The group is able to perform most common tasks, such as shutting down the computer, running applications, and using printers.

Ordinary users can also change the time zone and install a local printer, provided there is a suitable driver already installed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

• NTFS vs. share permissions

NTFS and Share level permissions both provide a customizable level of security. Share level permissions are set on the share by the owner. NTFS permissions are set as a security property. NTFS and Share level permissions differ in some key aspects.

A

Share permissions manage access at the folder level. In contrast, NTFS allows every file to have individual and varying accessibility if desired. Share permissions are used for compatibility with the FAT32 file system and support three permissions:

Read, Change, and Full Control. NTFS can manage these attributes as well as others including Write, Modify, Read, Execute, and Special.

There are instances where share permissions and NTFS permissions are essentially the same, such as Change in share and Modify in NTFS. Since both permission types are independent and their values are combined, the more restrictive combination is applied in order to determine permissions. This is in contrast to an NTFS to NTFS cumulative result which is less restrictive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • Allow vs. deny
A

Allow versus deny can be interpreted as allow versus not allow. The deny permission is the strongest and will take precedence regardless of the weaker permissions applied.

A group can be granted access to a folder and in NTFS, a specific user or users in that group can be given a deny permission. In this case even though the group is allowed access, that particular user’s deny permission overrides all others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • Moving vs. copying folders and files
A

Should the content exist in both the source location and the destination?

Should the content be removed from the source and exist only at the destination.

As expected, copying the content results in the file being present at both locations while moving the content results in the file being only present at the destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • File attributes
A

A = Archive: This attribute is used by backup programs and other utilities to indicate that the file is ready for backup (archiving). After a file has been backed up, the Archive bit(value) is set to zero or off. When a program makes a change to a file, it will reset the bit to one indicating the need to include it in the next backup. This setting makes incremental backups possible by only archiving objects that have changed.

D = Directory: This setting indicates that the object is a directory, not a file.

H = Hidden: This setting indicates that the object is hidden from normal view. System files and folders are routinely hidden.

I = Not Content Indexed: This setting indicates that the object is not indexed. Indexing, which is off by default, allows the operating system to perform faster searches. Objects that have this bit turned off will be included in searches.

R = Read-Only: This setting indicates that the object cannot be altered without resetting this value to off. Interestingly, Read-only protects a file from being altered but does not protect it from deletion.

S = System: This setting indicates that the object is a system file or folder and coupled with the read-only setting, prevents tampering. Do not delete or modify these files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • Allow vs. deny

The deny permission is the strongest and will take precedence regardless of the weaker permissions applied.

A

can be interpreted as allow versus not allow.

The deny permission is the strongest and will take precedence regardless of the weaker permissions applied.

A group can be granted access to a folder and in NTFS, a specific user or users in that group can be given a deny permission.

In this case even though the group is allowed access, that particular user’s deny permission overrides all others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • Inheritance
A

Inheritance describes the way permissions are handled within a shared folder.

Depending on the settings, the Child folders, subfolders, and the original share folder may or may not receive the permissions applied to the Parent folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

• System files and folders

A

System files and folders are always classified as Read-Only and are usually hidden. Doing this helps protect the system from deliberate or unintentional damage.

Standard users never see these files and folders, thereby keeping everything safe.

a hidden system folder is grayed out. That’s the first sign to stay out. In the properties, notice the read-only setting which applies to the files in the folder. (Show Hidden System Folders)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

• User authentication/

- Single sign-on

A

Single Sign-On (SSO) identifies the practice of permitting a user and their programs to use a single set of credentials to automatically log into permitted sites and services.

Saves eu the trouble of entering their login

Corperate domain user/using Active directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

• Run as administrator vs. standard user

A

Running a windows system as an Admin allows the user to perform root level tasks. The individual is capable of doing anything they want on the system essentially.

A standard user will not be able to perform many functions. BU IT can be bypassedd by admin by right-clicking the program’s icon or the Start menu shortcut and choosing “Run as Administrator.” Attempting to run a program that requires administrative privilege will result in a UAC and possibly require a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

• BitLocker

A

A form of full disk encryption in which even the swap file is encrypted. It requires overhead processing power but nowadays computers can handle the load.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

• BitLocker To Go

A

Bitlocker used on a portable USB format, user must have access to the encryption key.

17
Q

Encrypting file system,

• EFS

A

Files and folders can be encrypted to ensure privacy of the data. Only the user who encrypted the file can subsequently open it.

18
Q
  • Administrative shares vs. local shares
A

There are two types of shared folder objects: administrative shares and local shares. Local shares are created by users and are accessible by those with the appropriate permission.

Administrative shares are generally used by administrators to access system drives and areas that are not generally shared. All four administrative share names are appended by a $ while the local share has a common name.

19
Q
  • Permission propagation
A

Permission propagation occurs when a container object (folder) is shared by its owner. Upon sharing, the owner can determine how much of the folder’s contents will receive the same set of permissions.

This will affect how the files and folders within the container are treated by the OS.

When applying permissions, there will be an option to apply the permissions to the containers, folders, subfolders, and files.