session 4 windows platform dina alkhoudari. learning objectives configure disk quotas repairing and...

Click here to load reader

Upload: clyde-floyd

Post on 26-Dec-2015

219 views

Category:

Documents


0 download

TRANSCRIPT

  • Slide 1
  • Session 4 Windows Platform Dina Alkhoudari
  • Slide 2
  • Learning Objectives Configure disk quotas Repairing and Defragmenting Set permissions to files and folders Configuring system audit Schedule shadow copy
  • Slide 3
  • Configure disk quotas disk quotas allow administrators to control disk space usage on each disk volume This functionality can be deployed in different ways: 1- Monitoring only; 2- Monitoring and warning without taking measures; 3- Limiting the usage of disk 4 -Quotas are applied to all users of the volume unless exceptions are configured for individual users Disk Quotas configuration
  • Slide 4
  • Repairing and Defragmenting Fragmentation causes a disk subsystem to perform more data-seeking operations, slowing the rate at which data is transferred and resulting in sluggish disk performance. Reasons of fragmentation a disk Performing disk fragmentation
  • Slide 5
  • Files and Folders Permissions NTFS file permissions determine which users can view or update files Files are grouped into three types: user files, system files and program files To allow collaboration in file servers, it requires you to grant permissions to groups of users NTFS presents two levels of permissions: basic permissions and special permissions
  • Slide 6
  • Files and Folders Permissions: Basic Permissions
  • Slide 7
  • Slide 8
  • Files and Folders Permissions: Special Permissions
  • Slide 9
  • Encrypting File System When an attacker who has physical access to a computer can start the computer from a different operating system (or simply reinstall Windows) or remove the hard disk and connet it to a different computer. Any of these very simple techniques would completely bypass NTFS security, granting the attacker full access to files and folders. EFS protects files and folder by encrypting them on the disk. If an attacker bypasses the operating system to open a file, the file appears to be random, meaningless bytes. Windows controls access to the decryption key and provides it only to athorized users.
  • Slide 10
  • Files and Folders Ownership What does ownership mean Who can take the ownership of a file or directory How to take the ownership
  • Slide 11
  • Auditing Object of auditing Performing auditing
  • Slide 12
  • Shadow Copy a low-cost way to recover from many file-related accidents caused by human error Use to create copies of files or folders that are stored on network file shares at pre-determined time intervals issues that need to be considered when implementing shadow copy Configuring shadow copy
  • Slide 13
  • End of Session