File resource and sharing Flashcards

1
Q

What is file sharing?

A

Presenting File resources to the network

  • client application is responsible for opening /closing and reading/writing the files
  • securing access to those resources
  • grant only permission required for users to complete task
  • Principle of least privilege
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a share?

A

A folder that has been presented to the network for remote access
- protocol: Microsoft server message block (SMB)
Shares the addresses by using Universal naming convention (UNC)
eg:
\server_name\sharename[\sub_directory]
\fs01d.conestoga.on.ca\staf\jdickson

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How to Secure a share?

A

Shares have permissions
- read, change, full control - allow/deny
- only permissions applicable to FAT
- Combines with NTFS permissions on NTFS volumes
- deny overrides allowed
Permissions accumulate if user is member of multiple groups
- explicit user permissions override group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How to plan shares?

A

Plan who needs what access to what resources carefully
•Good planning reduces many long term admin headaches
•Share only what is required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Creating a share?

A

File and Services role provisioning wizard
•Change folder properties
•Follow wizard to create share and set permissions
•Do not use share-with wizard -very limited controls meant for standard users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Connecting to a Share?

A

Enter UNC name in File Browser address bar

•Map a UNC path to a drive letter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are NTFS Permissions?

A
  • Permissions that grant or revoke access to file system objects stored on NTFS volumes
  • Permissions may be allowed or denied
  • Permissions may be assigned to users or groups where group members acquire the permission
  • Permissions accumulate for users who are members of multiple groups
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NTFS Permission Assignment

A
  • Defining a permission and linking to a security principal is an Access Control Entry (ACE)
  • All ACEs defined on a single file system object comprise the Access Control List (ACL)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to make NTFS Permissions?

A
  • In File Browser:

* right-click object -> Properties -> Security tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Planning NTFS Permissions?

A
  • Good planning results in fewer long term admin headaches
  • Use principle of least privilege
  • Start with minimal permissions at the root and add
  • Map user access requirements to resources
  • Use groups!
  • Do not break inheritance!
  • Do not use deny
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Available Permissions

A
  • 17 advanced permissions (atomic)
  • Typically use standard/basic permissions (pre-defined groups of basic permissions)
  • Can adjust permission scope
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Inheritance?

A
  • All NTFS permissions are inherited by subordinate objects
  • Plan well and inheritance is your friend
  • Inheritance can be broken -DON’T!!!
  • Only break inheritance when establishing a new directory structure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ownership

A
  • All objects are owned by a user -generally the user who created the object
  • Administrators can assign ownership to another user
  • Owners always retain the permission to change permission
  • Administrators can always take ownership
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Effective Permissions

A
  • Permission user actually has to an object
  • Accumulated permissions based on group ownership
  • Deny overrides allow
  • Explicit user permissions override group
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Common Use Cases

A
  • Exclusive use
  • Public with team managed content
  • Collaborative with all team members having read/write to all content
  • Collaborative with all team members having read to all content and read/write to their content
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Exclusive Use

A
  • Single user gets read/write
  • No other access
  • Typical for folder redirection or home directories
  • Network access via this share
  • Use ABE
  • Break inheritance on shared directory•Users get read/write on their own directory
17
Q

Publications?

A

All users get read to all content
•Assigned team members get read/write to maintain content
Share parent directory
•Network access via this share
•Break inheritance on shared directory
•All users get read on parent directory
•Designated team members get read/write on team directory

18
Q

Collaboration- all write

A
Team members get read/write to all team content
•Managers get read to all content
•No other access
•Network access via this share
•Use ABE
•Break inheritance on shared directory
•Managers get read on shared directory
•Team members get read/write on team directory
19
Q

Collaboration -All Read

A
  • Team members get read to all team content
  • Team member can create content in their team folder
  • Content owner gets read/write
  • Managers get read to all content
  • No other access
  • Network access via this share
  • Use ABE
  • Break inheritance on shared directory
  • Managers get read on shared directory
  • Team members get read on team directory and subordinates
  • Team members get read/write on team directory only