Computer networking file sharing
Computer networking file sharing
Disk Quotas
(October 26, 2016)
Understand EFS
Understand Disk Quotas
2
FAT vs. NTFS
Decision about what file system to use depends on:
Whether multiple OS will be installed on the computer
Security requirements for the system
NTFS
FAT Supports lager partitions size than FAT (w/o
Supports partitions up to 4 disk performance decrease)
GB (FAT16) and 2 TB File-level and Folder-level security
(FAT32) Data compression
Provides only folder-level File encryption (Encrypting File System)
security
Disk quotas management
Allows limited permission
setting (Read, Change, Full Needed for AD services
Control)
Faster access to data
Note: Accessing NTFS partitions by Mac requires utility software like Paragon
NTFS 3
Shared Folder ?
A folder used to provide
network users with
access to file resources.
When a folder is shared
on a server, users can
connect to the server and
gain access to the files it
contains.
4
Shared Folders
Requirements for creating a shared folder:
Any supported File system (FAT, NTFS)
If server in a domain, you must be Administrator or Server Operator
If server in a workgroup, you must be Administrator or Power user
If client computer running a workstation OS, you must be Administrator or
Power user
Note: Users that are granted the Create Permanent Shared Objects right can
also create shared folders on the computer where the right is assigned
Shared Folder
Us
er
1
With FAT, permissions could only be set for folders, not for individual files
If permissions at file level are required, you need to use NTFS permissions
6
Shared Folder Permissions
There are three levels of shared folder permission:
9
Administrative & Hidden shares
Administrative shares (created by default):
All hard drives are shared as C$, D$, etc.
The system folder (\WINDOWS) is shared as Admin$
Driver’s folder for printers (\Winnt\System32\Spool\Drivers) is
shared as Print$
Hidden shares (created by users)
Share name should end with $ for the share to be hidden
Not visible by other users unless they know the name
If a user knows the name of a hidden share, he/she can access
the share using the UNC name
Start/Run. Then type \\ComputerName\ShareName$
Example: \\mainserver
Universal Naming
Convention (UNC) name
10
NTFS permissions
If permissions at file level are required, and/or
If more specific permissions are required
Then, NTFS permissions must be used
NTFS permissions only available on NTFS-formatted disks
Assigning NTFS permissions
1) Open My Computer (Right-click/Open)
2) Select the disk, then the folder/file to share
3) Right-click the selected folder or file
4) Click Properties
5) Click the Security tab
6) Assign permissions
7) Click Apply, and then OK. 11
Standard NTFS permissions
Read User can open and view content of files/folders.
They can also view objects ownership, assigned
permissions, and objects attributes (Read-Only,
Hidden, etc.)
Write Read permission +
- Create new files/subfolders in a folder
- Change attributes
List Folder Contents Can only view names of folders/files
Read and Execute Read and List Folder Content permissions +
- Ability for users to navigate through folders for
which they don’t have permission in order to get
files and subfolders for which they do have
permissions.
Modify Read + Write + Read and Execute permissions
(Users can view, create, delete, modify content
of folders, etc.)
Full Control Users can do everything
12
Extended NTFS permissions
Execute File
List Folder / Read File
Read Attributes
Read Extended Attributes
Create Files / Write Data
Write Attributes
Write Extended Attributes
Delete Subfolders and Files
Read Permissions
Change Permissions
Take Ownership
13
NTFS permissions
Folder
SubFolder1 SubFolder2
File1.txt File1.doc SubFolder3
File2.txt File2.exe
14
NTFS Permissions’ Rules
Multiple Permissions
NTFS file permissions take priority over NTFS folder permissions
A user can always access files for which he/she has permissions using UNC. E.g. \\
SRVDC16\Data\file1.txt
Denying a permission for a user blocks that permission, even if the permission is
granted to a group the user belongs to.
Permission Inheritance
By default, permissions assigned for the parent folder are inherited at subfolder
and file level
To prevent automatic inheritance, explicit permissions assignments must be done
at subfolder and/or file levels.
Copying or Moving Files and Folders
When a file/folder is copied or moved to another NTFS partition on a different physical disk,
Golden it inherits the permissions & attributes from the destination folder
rule
When a file/folder is moved within an NTFS partition, it retains its permissions
Exception
to Golden When a file/folder is moved to another NTFS partition on the same physical disk it retains its
rule permissions
When a file/folder is copied to a FAT partition, it loses its NTFS permissions 15
Shares & permissions: Recap
Sharing Setting
folders/files permissions
FAT NTFS FAT NTFS
Folders/Subfolders YES YES YES (but YES
limited)
Files NO NO NO YES
16
Encrypting File System
EFS is used to encrypt data in order to prevent
intruders to read.
The Golden rule does not apply to encrypted
files/folders
EFS is used to encrypt data stored on storage
media or data in transit
17
Why use EFS?
With NTFS permission, if someone is given the
Take Ownership permission on your file/folder,
they can log on, take the ownership of the
file/folder, and then change permissions the way
they want to.
With EFS, in addition to access rights, a de-
encryption key is needed to read a file*.
If someone got a copy of your file, or took
ownership of it, they cannot read its content.
Note 1: * When you logon, a private de-encryption key is automatically issued to you by W2003
18
Note 2: Only the file/folder’s creator or the Recovery Agent (the Administrator) can decrypt the file/folder
How to encrypt a folder
1. Right-click the folder you want to encrypt
2. Click Properties
3. In General tab, click the Advanced button
20
Disk Quotas
Disk Quotas needed because
Many users save data on shared folders
Users must be prevented from filling disk capacity
22
Disk Quota Parameters
Enable quota management: Sets
up quota management and starts
tracking disk usage
Deny disk space to users
exceeding quota limits: Users can’t
write new information after
reaching their quotas
Do not limit disk usage: Tracks disk
usage without imposing quotas
Limit disk space to: Sets the default
amount of disk space for all users
23
Disk Quota Parameters (continued)
Set warning level to: Sets the
default disk space that users can
occupy that will trigger a warning
message
Log event when a user exceeds
their quota limit: An event is
entered in the System log when a
user reaches his or her quota
Log event when the user exceeds
the warning level: An event is
entered in the System log when a
user receives a warning that he or
she is approaching the quota 24
Delete a Quota entry
1) Open My Computer
2) Right-click the volume, and click Properties
3) Click Quota tab
4) Click the Quota Entries button
5) Right-click the appropriate user account
6) Click Delete
25
Other slides:
- Configuring Auditing
- Taking ownership
26
Configuring Auditing
27
Configuring Auditing
1) Right-click the folder/file you want to audit
2) Click Properties
3) Click Security tab
4) Click Advanced button
5) Click Auditing tab in the Access Control Settings
dialog box, and click Add
6) Double-click the group or user you want to audit
7) Check the Successful or Failed events to audit
8) Click OK as many times as needed.
28
Note: If you are the owner of a
Taking ownership folder/file (or have the Take
ownership permission), you can
change other users’ permissions
32