Managing File System Security and Auditing

Practice Labs Module
Time
57 minutes
Difficulty
Intermediate

The "Managing File System Security and Auditing" module provides you with the instruction and server hardware to develop your hands on skills in the defined topics. This module includes the following exercises: Understand Share Permissions, Understand NTFS Permissions, Configure File System Auditing.

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Overview

Introduction

The Managing File System Security and Auditing module provides you with the instruction and server hardware to develop your hands on skills in the defined topics. This module includes the following exercises:

  • Understand Share Permissions
  • Understand NTFS Permissions
  • Configure File System Auditing

Exercise 1 - Understand Share Permissions

Windows servers and workstations use shared folder permissions to make a folder and its contents available to network users. When folder is shared, all the subfolders and files within becomes available to users who have access to network. Securing shared folders is limited as the administrator can grant Full Control, Change and Read permissions. These permissions are applicable only if the shared folder is being accessed remotely or via a network connection. Share permissions are not enforced when a user accesses the resource locally on the computer.

In this exercise, you will manage share folder permissions and create a shared folder using Computer Management.

Exercise 2 - Understand NTFS Permissions

In corporate environments, a user will be accessing files and folders found in network servers. Network administrators apply security on the server’s file system to prevent unauthorized access to proprietary data. What the user can do with the folders and files is determined by the set of rules or permissions assigned to them.

In this exercise, you will examine NTFS permissions that are automatically set for shared folders coming from a server computer. You will likewise find out how to use Effective Access feature that determine what the user’s permissions are when accessing the shared folder over a network connection.

Exercise 3 - Configure File System Auditing

Auditing enables system administrators to have the ability to create a record trail that indicates information about a user who performed a system activity like accessing a folder or file while signed on to the corporate network. Auditing selected events in Windows is enabled by default. It can be expanded further by auditing other details like accessing an object—like folders and files and other system related events.

Learning Partner
Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.