programming4us
programming4us
SECURITY

Windows Server 2008 : Examining File-Level Security

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
Files secured on Windows Server 2008 R2 are only as secure as the permissions that are set on them. Subsequently, it is good to know that Windows Server 2008 R2 does not grant the Everyone group full control over share-level and NTFS-level permissions. In addition, critical operating system files and directories are secured to disallow their unauthorized use.

Despite the overall improvements made, a complete understanding of file-level security is recommended to ensure that the file-level security of a server is not neglected.

Understanding NT File System (NTFS) Security

The latest revision of the NT File System (NTFS) is used in Windows Server 2008 R2 to provide for file-level security in the operating system. Each object that is referenced in NTFS, which includes files and folders, is marked by an access control entry (ACE) that physically limits who can and cannot access a resource. NTFS permissions utilize this concept to strictly control read, write, and other types of access on files.

File servers should make judicious use of NTFS-level permissions, and all directories should have the file-level permissions audited to determine if there are any holes in the NTFS permission set. Changing NTFS permissions in Windows Server 2008 R2 is a straightforward process; simply follow these steps:

1.
Right-click the folder or file onto which the security will be applied, and choose Properties.

2.
Select the Security tab.

3.
Click the Advanced button.

4.
Click the Change Permissions button.

5.
Uncheck the Include Inheritable Permissions from This Object’s Parent check box.

6.
Click Remove when prompted about the application of parent permissions.

7.
While you’re in the Advanced dialog box, use the Add button to give access to the groups and/or users who need access to the files or folders.

8.
Check the Replace All Child Object Permissions with Inheritable Permissions from This Object check box, as shown in Figure 1, and click OK.

Figure 1. Setting NTFS permissions.

9.
When prompted about replacing security on child objects, click Yes to replace child object security and continue.

10.
Click OK and then click OK again to close the property pages.

Examining Share-Level Security Versus NTFS Security

Previous Windows security used share-level permissions, which were independently set. A share is a file server entry point, such as \\sfofs01\marketing, that enables users to have access to a specific directory on a file server. Older file systems such as FAT, HPFS, and FAT32 did not include file-level security, so the security was set instead on the share level. Although share-level security can still be set on files, it is preferable to use NTFS-level security, where possible. Share-level security is not very secure because it cannot secure the contents of subdirectories easily.

Auditing File Access

A good practice for file-level security is to set up auditing on a particular server, directory, or file. Auditing on NTFS volumes enables administrators to be notified of who is accessing, or attempting to access, a particular directory. For example, it might be wise to audit access to a critical network share, such as a finance folder, to determine whether anyone is attempting to access restricted information.

Note

Audit entries are another example of security settings that can be automatically set via security templates in Windows Server 2008 R2. It is wise to consider the use of security templates to more effectively control audit settings.


The following steps illustrate how to set up simple auditing on a folder in Windows Server 2008 R2:

1.
Right-click the folder or file onto which the auditing will be applied, and choose Properties.

2.
Select the Security tab.

3.
Click the Advanced button.

4.
Select the Auditing tab.

5.
Click the Edit button.

6.
Using the Add button, enter all users and groups that will be audited. If you’re auditing all users, enter the Everyone group.

7.
On the Auditing property page, select all types of access that will be audited. If you’re auditing for all success and failure attempts, select all the options, as indicated in Figure 2.

Figure 2. Selecting what to audit.


8.
Click OK to apply the settings.

9.
Click OK twice to save the settings.

Note

An effective way of catching “snoops” in the act is to create serious-looking shares on the network, such as Financial Statements, Root Info, or similar such shares, and audit access to those folders. This mechanism, known as a honeypot, has been successfully used to identify internal (or external) saboteurs before they could do some serious damage.


Encrypting Files with the Encrypting File System

Windows Server 2008 R2 continues support for the Encrypting File System (EFS), a method of scrambling the contents of files to make them unintelligible to unauthorized users. EFS has proven to be valuable for organizations that desire to keep proprietary data, especially those stored on laptops, out of the wrong hands. A more comprehensive approach to client encryption is with Windows 7/Vista BitLocker Drive Encryption, which encrypts all files on the entire hard drive, with the exception of a few files required for startup.

Other  
 
Top 10
Free Mobile And Desktop Apps For Accessing Restricted Websites
MASERATI QUATTROPORTE; DIESEL : Lure of Italian limos
TOYOTA CAMRY 2; 2.5 : Camry now more comely
KIA SORENTO 2.2CRDi : Fuel-sipping slugger
How To Setup, Password Protect & Encrypt Wireless Internet Connection
Emulate And Run iPad Apps On Windows, Mac OS X & Linux With iPadian
Backup & Restore Game Progress From Any Game With SaveGameProgress
Generate A Facebook Timeline Cover Using A Free App
New App for Women ‘Remix’ Offers Fashion Advice & Style Tips
SG50 Ferrari F12berlinetta : Prancing Horse for Lion City's 50th
- Messages forwarded by Outlook rule go nowhere
- Create and Deploy Windows 7 Image
- How do I check to see if my exchange 2003 is an open relay? (not using a open relay tester tool online, but on the console)
- Creating and using an unencrypted cookie in ASP.NET
- Directories
- Poor Performance on Sharepoint 2010 Server
- SBS 2008 ~ The e-mail alias already exists...
- Public to Private IP - DNS Changes
- Send Email from Winform application
- How to create a .mdb file from ms sql server database.......
programming4us programming4us
programming4us
 
 
programming4us