Chapter 4. Configure access to resources

Users need access to resources, including but not limited to files, folders, network shares, and printers. Your job, at times at least, is to let those users access what they need, and nothing more. That’s how you keep resources secure and data in the right hands. This objective covers all aspects of this, from configuring shared resources to configuring file and folder (and printer) access, and on to configuring authentication and authorization for both workgroups and domains.

Objectives in this chapter:

Objective 4.1: Configure shared resources

There are multiple objectives in this lesson, and they all relate to how to share and manage resources on local networks. Here you’ll learn about homegroups, folder permissions, libraries, shared printers, and even SkyDrive. Regarding sharing, there are three ways to share discussed here: homegroup sharing, folder sharing, and public folder sharing. Folder sharing can be used in domain networks, too, although the way you handle it is a little different from simply sharing a few folders on a small, local network and letting users manage them as they like. (In an Active Directory Domain Services domain, network administrators manage authentication, authorization, and all aspects of sharing from the various servers they manage on the network.) SkyDrive can also be considered a sharing tool, although users might only use it to share data with themselves to have access to their files from anywhere.

You learned about Share permissions in Objective 4.1: Configure shared resources. These permissions are applied when the operating system is configured with FAT or FAT32 or any time you share a folder on a computer. There are only three shared permissions: Read, Change, and Full Control, which are available on the Sharing tab of the resource’s Properties dialog box. These sharing options don’t offer a lot of control, but they do offer some. Share permissions help you manage access to resources by users over a network, but they offer no security when a user logs on locally.

Because NTFS permissions are so much more robust than Share permissions, when the file system is NTFS, administrators make the most of it. They generally set the Share permissions for Everyone to Full Control and configure the NTFS permissions as desired. You configure NTFS on the Security tab of the resource’s Properties dialog box. Remember, the more restrictive of the two types of permissions is applied to the resource when both exist, so it doesn’t matter that the Share permissions give everyone unlimited access as long as NTFS is configured, too. NTFS also offers the ability to assign disk quotas, encrypt files and folders, and audit object access. These features are not available on FAT or FAT32 drives.

Authentication is the process of logging on to a computer, accessing a workgroup or networked computer, or logging on to a domain, which can be achieved using a Microsoft account, local user account, domain account, personal identification number (PIN), password, virtual or physical smart card, or biometrics, among other things. Authorization is what happens after authentication has been achieved; it is what enables authenticated users to access the data and perform the tasks they need to do their job.

In this objective, you learn the various ways users can be authenticated and how to configure user rights, manage credentials, and configure User Account Control (UAC) behavior.

This section contains the solutions to the thought experiments and answers to the objective review questions in this chapter.

  1. Correct answers: A and B

  2. Correct answer: D

  3. Correct answers: B and C

  4. Correct answer: D

  5. Correct answer: E

  6. Correct answer: C