Day 1 Flashcards
Server OS’s
optimized for applications services and shared resources.
support more robust hardware
allow an unlimited number of concurrent connections to file shares and other services
workstation OS’s
support less robust hardware.
optimized for the user environment (interactive desktop response time).
limited to 10 connections (WINXP) or 20 (Win7)
workgroup
each system is standalone in regards to authentication.
authenticates through the local SAM.
domain
each system shares common configurations, resources, and security principles.
that info is maintained in an ACTIVE DIRECTORY. (active directory’s are only on server OS’s).
a server with an active directory is called a DOMAIN CONTROLLER.
MEMBER SERVERS
a domain system running server OS’s.
member servers and other domain systems that are not domain controllers maintain local accounts in their SAM making it possible to authenticate with a local account or a domain account.
more on domains
workstations (users) ---uses SAM database member servers (no active directory) --- has a SAM db. domain controller (AD)-- no SAM
windows accounts
accessing a windows system requires credentials to authenticated
user accounts
collection of information used by the system for determining accesses and privileges.
accounts exist either in the local machine’s SAM or in the domain controller’s active directory.
used for authentication and authorization.
service accounts
controlled by the OS
windows services are used to enable and/or configure different system capabilities.
security identifier (SID)
every windows account has a unique SID.
generated during account creation.
never reissued or reused if the original account is deleted.
SID remains with account, even if the name is changed.
SID breakout
S-1-5-21-776561741-1625316112-682003330-500
S= indicates the string is a SID
1= revision level
5=authority value
the rest is called the sub-authority value
the segment starting with 21 to the one that ends in 330 is called the system or domain identifier.
the last part (500) is the relative identifier. this distinguishes one group from all others
well known SID’s
SID Account Account Type
S-1-5-18 Local System Service Account*
S-1-5-19 Local Service Service account*
S-1-5-20 Network Service Service Account*
S-1-5-[4a]-500 Administrator User account
S-1-5-[4a]-501 Guest User account
*=only on local system and do not need a relative ID
FYI= RID’s >=1000 are user created accounts
access tokens
identify the user and the user’s group memberships associated with a process.
access tokens are made up of the account SID, groups, and privileges.
the whoami command will show what is in your access token
security context
the access token plus the objects permissions
privileges
the ability of an account to perform a particular system related operation, such as shutting down the system, backing up/restoring files, changing system time, and taking ownership of files.