CONFIGURING AND MANAGING APPLICATION SECURITY

     
  1. A permission is a rule associated with an object to regulate which users can gain access to that object and in what manner. Permissions can be used only on NTFS-formatted partitions or volumes .

  2. NTFS file permissions are used to control the access that a user , group , or application has to files. This includes everything from reading a file to modifying and executing the file. The five NTFS file permissions are Read, Write, Read & Execute, Modify, and Full Control.

  3. NTFS folder permissions control what access is granted to a folder and the files and subfolders within that folder. The six NTFS folder permissions are Read, Write, Read & Execute, List Folder Contents, Modify, and Full Control.

  4. Windows XP stores an Access Control List (ACL) with every file and folder on the NTFS partition or volume. The ACL includes all the users and groups that have access to the file or folder.

  5. NTFS permissions are cumulative. This means that a user's effective permissions are the result of combining the user's assigned permissions and the permissions assigned to any groups that the user is a member of. Deny permission always overrides all other permissions.

  6. When NTFS permissions are assigned to a parent folder, all the same permissions are applied or propagated to the subfolders and files of that parent folder. Alternatively, the automatic propagation of these permissions can be stopped .

  7. After a newly created volume is formatted with the NTFS 5.0 file system in Windows XP, by default the Full Control NTFS permission is granted to the Everyone group. You should change this permission as soon as possible. You do not want everyone on the network to have Full Control.

  8. NTFS file and folder permissions are a great way to secure your resources on a Windows network. Special access permissions can be used if the default selections do not give you the required results.

  9. File and folder ownership can be transferred to another user or group. You can grant a user account or a user group the ability to take ownership of a file or folder.

  10. When files and folders on an NTFS volume are copied to another volume, the permissions change. When you copy folders or files between two NTFS volumes or to a new location on the same volume, the folders and files inherit the permissions assigned to the destination parent folder.

  11. When you move files from an NTFS volume to an alternate NTFS volume, the files also inherit the permissions assigned to the destination parent folders. When you move files within the same NTFS volume, the permissions remain intact.

  12. When you copy or move files from an NTFS volume to a FAT partition, all permissions are lost because a FAT partition does not support NTFS permissions.

  13. Sharing data is the primary purpose of configuring a company network. The process of enabling shared data is to specifically flag the data as shared. Data access is granted or denied based on a combined set of shared permissions and NTFS permissions.

  14. When you mix NTFS permissions with Share permissions, the most restrictive permission between the two rules wins.

  15. Hidden shares can help you gain access to users' computers if they do not know how to set up shares. Using these shares is a great way to transfer files if the users are not familiar with creating their own shared folders.

  16. You can configure your computer to audit user access to files, folders, and printers. The audit log appears in the security log in the Event Viewer. To enable this feature, use the Local Security Policy located in the Administrative folder in the Control Panel.

  17. Microsoft Office has several built-in security features designed to ensure the safety of the files used within the programs. Each application within the Office Suite contains configuration options to set its security.

  18. You can access the Office Suite security features by pointing to the Tools menu and selecting Options. In the Options dialog box, select the Security tab.

  19. The Macro security settings within Office can be configured in one of three ways: High, Medium, or Low. When a file that contains a macro is opened, depending on the security configuration, you see different results.



MCDST 70-272 Exam Cram 2. Supporting Users & Troubleshooting Desktop Applications on a Windows XP Operating System (Exam Cram 2)
MCSA/MCSE 70-291 Exam Cram: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (2nd Edition)
ISBN: 0789736187
EAN: 2147483647
Year: 2003
Pages: 119
Authors: Diana Huggins

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net