File resource and sharing Flashcards
What is file sharing?
Presenting File resources to the network
- client application is responsible for opening /closing and reading/writing the files
- securing access to those resources
- grant only permission required for users to complete task
- Principle of least privilege
What is a share?
A folder that has been presented to the network for remote access
- protocol: Microsoft server message block (SMB)
Shares the addresses by using Universal naming convention (UNC)
eg:
\server_name\sharename[\sub_directory]
\fs01d.conestoga.on.ca\staf\jdickson
How to Secure a share?
Shares have permissions
- read, change, full control - allow/deny
- only permissions applicable to FAT
- Combines with NTFS permissions on NTFS volumes
- deny overrides allowed
Permissions accumulate if user is member of multiple groups
- explicit user permissions override group
How to plan shares?
Plan who needs what access to what resources carefully
•Good planning reduces many long term admin headaches
•Share only what is required
Creating a share?
File and Services role provisioning wizard
•Change folder properties
•Follow wizard to create share and set permissions
•Do not use share-with wizard -very limited controls meant for standard users
Connecting to a Share?
Enter UNC name in File Browser address bar
•Map a UNC path to a drive letter
What are NTFS Permissions?
- Permissions that grant or revoke access to file system objects stored on NTFS volumes
- Permissions may be allowed or denied
- Permissions may be assigned to users or groups where group members acquire the permission
- Permissions accumulate for users who are members of multiple groups
NTFS Permission Assignment
- Defining a permission and linking to a security principal is an Access Control Entry (ACE)
- All ACEs defined on a single file system object comprise the Access Control List (ACL)
How to make NTFS Permissions?
- In File Browser:
* right-click object -> Properties -> Security tab
Planning NTFS Permissions?
- Good planning results in fewer long term admin headaches
- Use principle of least privilege
- Start with minimal permissions at the root and add
- Map user access requirements to resources
- Use groups!
- Do not break inheritance!
- Do not use deny
Available Permissions
- 17 advanced permissions (atomic)
- Typically use standard/basic permissions (pre-defined groups of basic permissions)
- Can adjust permission scope
What is Inheritance?
- All NTFS permissions are inherited by subordinate objects
- Plan well and inheritance is your friend
- Inheritance can be broken -DON’T!!!
- Only break inheritance when establishing a new directory structure
Ownership
- All objects are owned by a user -generally the user who created the object
- Administrators can assign ownership to another user
- Owners always retain the permission to change permission
- Administrators can always take ownership
Effective Permissions
- Permission user actually has to an object
- Accumulated permissions based on group ownership
- Deny overrides allow
- Explicit user permissions override group
Common Use Cases
- Exclusive use
- Public with team managed content
- Collaborative with all team members having read/write to all content
- Collaborative with all team members having read to all content and read/write to their content