Sunday, June 27, 2010

Managing Network Accounts

  • Five management areas
    1. user administration
    2. resource management
    3. configuration management
    4. performance management
    5. maintenance

User Administration 

There is a large section on creating user accounts. No sense going over this again. Look at the Administration notes before you do the NE exam.

Here are a couple of highlights from the section:
Profiles
  • used to structure a network environment for certain users
  • this may be for security
  • can also control the user's logon environment
  • profiles include network connections and program items that appear when the user logs on. These can include:
    • printer connections
    • window sizes and positions
    • icons
    • mouse settings
    • the screen arrangement of colors
    • screen savers
Rights apply to the system as a whole; permissions apply to a certain object.
Types of Groups
  • Local Groups => things
  • Global Groups => People
  • Special Groups => internal system access -- Interactive, Network
  • Built-In Groups => Administrator, Users, Operators Groups, Guests

Administrator Responsibilities

  • Creating and Managing Accounts
  • Security
  • Training and supporting users
  • Updating and implementing new software
  • Archiving and data backup
  • Preventing data loss
  • Monitoring and regulating server storage space.
  • Tuning the network
  • Virus protection
  • Troubleshooting
  • Upgrading and replacing hardware
  • Adding new computers

Security Models

Two different security models have evolved:
  • Password-protected shares (share-level): each resource has a password
    • there are 2 levels of passwords: Read access and Full Control Access
  • Access permissions (user level): Rights are assign on a user by user basis. More secure than the share level method.

Other Methods of Network Security

  • Auditing
    • audit records show the users that have accessed or attempted to access specific resources in security log
  • Diskless computers
  • Data Encryption
    • data can't be stolen from the cable. When the data gets to the proper PC, a key, the code for deciphering encrypted data, decode the bits into understandable info.
    • DES data encryption standard
    • CCEP commercial COMSEC endorsement program
  • Virus protection
    • The 4 standard measures to take when protecting against viruses:
      • Passwords to reduce the chance of unauthorized access
      • Well planned access and privilege assignments for all users
      • Profiles to structure the network environment
      • a policy determining what software can be loaded

No comments:

Post a Comment