[Contents] [Back] [<< Prev] [Next >>]

Network Security

Because the purpose of a network is to make accessing resources easy, network administrators and designers are constantly concerned with how to protect network resources so that unauthorized users can’t gain access to them. All commercial network operating systems provide some form of security system that limits access to shared files, printers and other resources, and the system itself. Chapter 8 describes how to secure resources in Microsoft networks. The following are the elements of network security:
On Windows NT networks, a domain is a collection of computers with a common account database. The account database resides on special Windows NT Server systems called domain controllers. When a user logs on to the domain from a client machine (attempts to gain access to the domain), the user’s credentials are forwarded via the network to the domain controller for authentication.

Windows NT enables you to directly set access permissions for files, directories, printers, and other resources (see the following sidebar). To simplify the task of assigning access permissions to users, Windows NT uses a concept called a group. A group is a pre-defined collection of access permissions and rights assigned to a collection of users. Permissions are initially assigned to the group, and any user who becomes a member of the group assumes those permissions. Rather than configuring an individual set of permissions for each user, add the user to a group that possesses the permissions you want the user to have.

Some of the Windows NT access permissions are as follows:
When using Windows NT, you can set user-level security for a file or directory only if the file directory is on a partition that uses the NTFS files system (New Technology File System or NT File System). The permissions then become part of the access control list for the file or directory. The older FAT (File Allocation Table) file system doesn’t support access permissions for file or directory objects; however, Windows NT enables you to define access permissions for a directory share whether or not the share is on a FAT or an NTFS partition. (See Chapter 8.)


[note.gif]

A share is an object that has been made available for network access. You learn more about shares and permissions in Chapter 8.

Share permissions in NT are known as ATS (Access through Share) permissions. ATS permissions are independent of any local NTFS file or directory-level permissions (see Figure 1.7). Think of a share as an object that is distinct from the object you are sharing. The available access types for an ATS share are more limited than the access types available through directory permissions for an NTFS directory. (Your choices are No Access, Read, Change, and Full Control. NTFS directory permissions offer several other access types, such as List, Add, Add & Read, and Special Access.) If you have directly specified permissions for an NTFS file or directory and also specified ATS permissions for that file or directory through a directory share, the most restrictive permissions apply.

ATS permissions apply only to access via the network. Set ATS permissions through the Sharing tab of the directory Properties dialog box (see the following sidebar). Set file or directory-level access permissions through the Security tab of the file/directory Properties dialog box.

Windows NT Permissions

You can set permissions for a Windows NT 4.0 object (such as a file, directory, printer, drive, or network share) by using the object’s Security tab. You can find the Security tab in the Properties dialog box for the object (right-click on an icon for the object and choose Properties). Clicking on the Permissions button in the Security tab invokes a Permissions dialog box that enables you to specify the level of access you want to extend to specific groups and users.

The FAT file system doesn’t support file-level access permissions, so if your partition is formatted for the FAT file system, you won’t find a Security tab in the Properties dialog box. If you share the file or directory, however, you can still define permissions for the share. Select the Sharing tab and click on the Permissions button to invoke a Permissions dialog box similar to the one shown in Figure 1.8.

A Windows 95 machine can share its resources either through user-level permissions or through password-protected shares. If you choose to assign permissions using user-level security, you must tell Windows 95 where to obtain a list of users because Windows 95 does not support its own user account database. Requests to access the resource then are passed to a security provider (a Windows NT computer or a NetWare server) on the network.


[tip.gif]

Another major advantage of a server-based Windows NT domain over a Windows peer-to-peer workgroup is the capability to share user information. If you have nine machines in a peer-to-peer workgroup with NT Workstation, and you need to add a user to a group that has access to them all, for example, you need to go to each individual machine and create an account for the user. You then add this new user to the appropriate group on each machine. If you have eight workstations and an NT Server acting as a domain controller in a properly constructed domain, things are far easier. You create the user on the server, add the user to the proper Global group (also on the server), and add this Global group into Local groups on each machine. The user then has rights on all nine machines. You can find more on this in Chapter 8.