Top-Rated Free Essay
Preview

Enable Windows Active Directory and User Access Controls

Good Essays
477 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Enable Windows Active Directory and User Access Controls
50

Lab #3 | Enable Windows Active Directory and User Access Controls

Lab #3 – Assessment Worksheet

Enable Windows Active Directory and User Access Controls
Course Name and Number:

Student Name:

Instructor Name:

Lab Due Date:

Overview
This lab provides students with the hands-on skills needed to create a new Active Directory domain in
Windows Server 2003 and demonstrates how to configure a centralized authentication and policy definition for access controls. The Active Directory users and workstation plug-ins will be used to create users, groups, and configure role-based access permissions and controls on objects and folders in a Windows Server 2003
Active Directory system.

Lab Assessment Questions & Answers 1. What two access controls can be set up for Windows Server 2003 folders and authentication?
The two access controls that can be set up for Windows Server 2003 folders and authentication User or Group

access to the folder and the ability to modify contents of the folder.

2. you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of
If

access controls and permissions are probably configured?
The type of access controls and permissions that are probably configured are Modify , Read or Full control.

3.
What is the Windows tool that allows you to administer granular policies and permissions on a Windows
­

network using role-based access?
The Windows tool that allows you to administer granular policies and permissions on a Windows network using role-based access is the Group Policy Object Editor

38351_LB03_Pass2.indd 50

26/02/13 11:54 PM

Assessment Worksheet

51

4.
Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve

CIA for departmental LANs, departmental folders, and data.

Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA for departmental LANs and departmental folders and data

by using user authentication (logon/password) to access the network. It also give users or groups permissions or deny them access to files or

folders.

5.
Would it be a good practice to include the account or user name in the password? Why or why not?

No because then hackers will have an easier time hacking the password

6.
Can a user who is defined in the Active Directory access a shared drive if that user is not part of

the domain?

No a user cannot access a shared drive if that user is not part of that domain.

Windows Server 2003 require a user's logon/password credentials prior to

accessing shared drives

38351_LB03_Pass2.indd 51

Enable Windows Active Directory and User Access Controls

7.
Does Windows Server 2003 require a user’s logon/password credentials prior to accessing shared drives?

3

26/02/13 11:54 PM

52

Lab #3 | Enable Windows Active Directory and User Access Controls 8.
Using what you know about access controls, what security controls would you recommend when

granting access to LAN systems for guests (i.e., auditors, consultants, third-party individuals, etc.) that will maintain CIA of production systems and data?

38351_LB03_Pass2.indd 52

26/02/13 11:54 PM

You May Also Find These Documents Helpful

  • Satisfactory Essays

    5. Defining will have to be documented whenever anyone needs a change. Levels of access can be done through the administrator for object level changes by setting different levels of permissions such as read-write-full access or no access.…

    • 257 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Case Study

    • 825 Words
    • 4 Pages

    Part of managing a Windows Server 2003 network environment requires an administrator to be familiar with both of the different security models that can be implemented along with the roles that a server can hold. The two different security models used in Windows network environments are the workgroup model and the domain model. Please discuss in 500-600 words both options and explain why you would choose one over the other for your implementation.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Finally, the system/application domain would require virtual testing of everything before any implementation, hardening of all servers, and keeping up with patches and updates regularly after testing has been completed. Some of the more efficient ways to implement better access controls in a company would start with the proper level of authorization policies including physical controls for facilities. The authorization policy would appropriate entry system access controls that specify what areas are to be locked at all times and what type of locking mechanism should be implemented. It would also include the implementation of secondary locks on specific equipment and storage cabinets…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    I learned how to add a domain controller to an Active Directory domain, back up and restore Active Directory, and recognize and respond to Active Directory replication issues.…

    • 1334 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    NT1330 FINAL EXAM NOTES

    • 1446 Words
    • 5 Pages

    Network Access Protection is a new feature in Windows Server 2008 that allows network administrators to specify one or more policies that define the conditions under which network access will or will not be permitted.…

    • 1446 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    This lab walks the student through the steps required to define Active Directory Group Policy Objects (GPO) as well as to deploy GPOs to domain computers. It also demonstrates how to use MBSA to profile a Windows system. Group…

    • 952 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    access control entry (ACE)/ An entry in an object’s access control list (ACL) that grants permissions to a user or group. Each ACE consists of a security principal (the name of the user, group or computer being granted the permissions) and the specific permissions assigned to that security principal. When you manage permissions in any of the Windows Server 2008 permission systems, you are creating and modifying the ACEs in an ACL.…

    • 4603 Words
    • 19 Pages
    Good Essays
  • Powerful Essays

    Is3230 Project Description

    • 2573 Words
    • 19 Pages

    Relate how an access-control policy framework is used to define authorization and access to an…

    • 2573 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    Admins have access to all files, and other users have access to program files/windows only.…

    • 441 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    lab 4

    • 503 Words
    • 2 Pages

    The Windows tool that allows you to administer granular policies and permissions on a Windows network using role-based access is the Group Policy Object Editor.…

    • 503 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 2 Assesment

    • 271 Words
    • 3 Pages

    In this lab, you used the Microsoft® Active Directory Users and Computers utility to create and manage…

    • 271 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lesson 11

    • 534 Words
    • 2 Pages

    3. Which of the following commands can be used to configure Active Directory permissions from the…

    • 534 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Quiz 1

    • 308 Words
    • 2 Pages

    2. Which among the following is the best reason to define security groups while configuring access rights for users in a network?…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Access Control Lists

    • 3039 Words
    • 13 Pages

    Access Control Lists are used by OS’s such as Windows and UNIX. An ACL is a table that informs the OS of each users access rights to an object within the system, the object could be a program, a single file or a folder. Although ACL’s do the same task in a similar way, the different OS’s each have a different way of carrying it out.…

    • 3039 Words
    • 13 Pages
    Powerful Essays