Lab #3 | Enable Windows Active Directory and User Access Controls
Lab #3 – Assessment Worksheet
Enable Windows Active Directory and User Access Controls
Course Name and Number:
Student Name:
Instructor Name:
Lab Due Date:
Overview
This lab provides students with the hands-on skills needed to create a new Active Directory domain in
Windows Server 2003 and demonstrates how to configure a centralized authentication and policy definition for access controls. The Active Directory users and workstation plug-ins will be used to create users, groups, and configure role-based access permissions and controls on objects and folders in a Windows Server 2003
Active Directory system.
Lab Assessment Questions & Answers 1. What two access controls can be set up for Windows Server 2003 folders and authentication?
The two access controls that can be set up for Windows Server 2003 folders and authentication User or Group
access to the folder and the ability to modify contents of the folder.
2. you can browse a file on a Windows network share, but are not able to copy it or modify it, what type of
If
access controls and permissions are probably configured?
The type of access controls and permissions that are probably configured are Modify , Read or Full control.
3.
What is the Windows tool that allows you to administer granular policies and permissions on a Windows
network using role-based access?
The Windows tool that allows you to administer granular policies and permissions on a Windows network using role-based access is the Group Policy Object Editor
38351_LB03_Pass2.indd 50
26/02/13 11:54 PM
Assessment Worksheet
51
4.
Relate how Windows Server 2008 R2 Active Directory and the configuration of access controls achieve
CIA for departmental LANs, departmental folders, and data.
Windows Server 2008 R2 Active Directory and the configuration of access controls achieve CIA for departmental LANs and departmental folders and data
by using user authentication (logon/password) to access the network. It also give users or groups permissions or deny them access to files or
folders.
5.
Would it be a good practice to include the account or user name in the password? Why or why not?
No because then hackers will have an easier time hacking the password
6.
Can a user who is defined in the Active Directory access a shared drive if that user is not part of
the domain?
No a user cannot access a shared drive if that user is not part of that domain.
Windows Server 2003 require a user's logon/password credentials prior to
accessing shared drives
38351_LB03_Pass2.indd 51
Enable Windows Active Directory and User Access Controls
7.
Does Windows Server 2003 require a user’s logon/password credentials prior to accessing shared drives?
3
26/02/13 11:54 PM
52
Lab #3 | Enable Windows Active Directory and User Access Controls 8.
Using what you know about access controls, what security controls would you recommend when
granting access to LAN systems for guests (i.e., auditors, consultants, third-party individuals, etc.) that will maintain CIA of production systems and data?
38351_LB03_Pass2.indd 52
26/02/13 11:54 PM
You May Also Find These Documents Helpful
-
5. Defining will have to be documented whenever anyone needs a change. Levels of access can be done through the administrator for object level changes by setting different levels of permissions such as read-write-full access or no access.…
- 257 Words
- 1 Page
Satisfactory Essays -
Part of managing a Windows Server 2003 network environment requires an administrator to be familiar with both of the different security models that can be implemented along with the roles that a server can hold. The two different security models used in Windows network environments are the workgroup model and the domain model. Please discuss in 500-600 words both options and explain why you would choose one over the other for your implementation.…
- 825 Words
- 4 Pages
Good Essays -
Finally, the system/application domain would require virtual testing of everything before any implementation, hardening of all servers, and keeping up with patches and updates regularly after testing has been completed. Some of the more efficient ways to implement better access controls in a company would start with the proper level of authorization policies including physical controls for facilities. The authorization policy would appropriate entry system access controls that specify what areas are to be locked at all times and what type of locking mechanism should be implemented. It would also include the implementation of secondary locks on specific equipment and storage cabinets…
- 439 Words
- 2 Pages
Satisfactory Essays -
I learned how to add a domain controller to an Active Directory domain, back up and restore Active Directory, and recognize and respond to Active Directory replication issues.…
- 1334 Words
- 6 Pages
Powerful Essays -
Network Access Protection is a new feature in Windows Server 2008 that allows network administrators to specify one or more policies that define the conditions under which network access will or will not be permitted.…
- 1446 Words
- 5 Pages
Powerful Essays -
This lab walks the student through the steps required to define Active Directory Group Policy Objects (GPO) as well as to deploy GPOs to domain computers. It also demonstrates how to use MBSA to profile a Windows system. Group…
- 952 Words
- 4 Pages
Satisfactory Essays -
During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…
- 711 Words
- 3 Pages
Good Essays -
access control entry (ACE)/ An entry in an object’s access control list (ACL) that grants permissions to a user or group. Each ACE consists of a security principal (the name of the user, group or computer being granted the permissions) and the specific permissions assigned to that security principal. When you manage permissions in any of the Windows Server 2008 permission systems, you are creating and modifying the ACEs in an ACL.…
- 4603 Words
- 19 Pages
Good Essays -
Relate how an access-control policy framework is used to define authorization and access to an…
- 2573 Words
- 19 Pages
Powerful Essays -
Admins have access to all files, and other users have access to program files/windows only.…
- 441 Words
- 2 Pages
Satisfactory Essays -
The Windows tool that allows you to administer granular policies and permissions on a Windows network using role-based access is the Group Policy Object Editor.…
- 503 Words
- 2 Pages
Good Essays -
In this lab, you used the Microsoft® Active Directory Users and Computers utility to create and manage…
- 271 Words
- 3 Pages
Satisfactory Essays -
3. Which of the following commands can be used to configure Active Directory permissions from the…
- 534 Words
- 2 Pages
Good Essays -
2. Which among the following is the best reason to define security groups while configuring access rights for users in a network?…
- 308 Words
- 2 Pages
Satisfactory Essays -
Access Control Lists are used by OS’s such as Windows and UNIX. An ACL is a table that informs the OS of each users access rights to an object within the system, the object could be a program, a single file or a folder. Although ACL’s do the same task in a similar way, the different OS’s each have a different way of carrying it out.…
- 3039 Words
- 13 Pages
Powerful Essays