+ All Categories
Home > Documents > Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.

Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.

Date post: 16-Dec-2015
Category:
Upload: avice-west
View: 218 times
Download: 0 times
Share this document with a friend
Popular Tags:
33
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network
Transcript

Module 6: Configuring Windows XP

Professional to Operate in a Microsoft Network

Overview

Configuring Microsoft Windows XP Professional for a Workgroup

Configuring Local Security

Configuring Windows Firewall

Configuring Network Options in a Workgroup

Joining a Domain

Lesson: Configuring Windows XP Professional for a Workgroup

What Is a Workgroup?

What Is a Local User Account?

Account Types and Privileges

What Is the Computer Management Console?

The Authentication Process

Logon Options in a Workgroup

What Is a Workgroup?

A workgroup is:A workgroup is:A group of computers on a network that share resources such as files and printersA group of computers on a network that share resources such as files and printers

Often referred to as a peer-to-peer network because the computers in a workgroup share resources without a dedicated server

Often referred to as a peer-to-peer network because the computers in a workgroup share resources without a dedicated server

A local user account:A local user account:

Is the only type of user account in a workgroup environmentIs the only type of user account in a workgroup environment

Resides in the Security Account ManagerResides in the Security Account Manager

Must be created on each computerMust be created on each computer

What Is a Local User Account?

User 1User 2User 3

SAM

User 1User 2User 3

SAM

User 1User 2User 3

SAM

User 1User 2User 3

SAM

Account Types and Privileges

An account type determines the actions that a user can perform on the computer consoleAn account type determines the actions that a user can perform on the computer console

Control Panel creates an Administrator account without a password, which can pose a security riskControl Panel creates an Administrator account without a password, which can pose a security risk

Computer ManagementComputer Management

Limited User

AdministratorControl PanelControl Panel

What Is the Computer Management Console?

The Computer Management Console is a collection of administrative utilities that you can use to manage a single local or remote computer

The Computer Management Console is a collection of administrative utilities that you can use to manage a single local or remote computer

When a user logs on locally, the SAM on the local computer authenticates the user’s credentialsWhen a user logs on locally, the SAM on the local computer authenticates the user’s credentials

The Authentication Process

Credentials sent

User logs on locallyUser logs on locally11 SAM

Logon information comparedLogon information compared22

Access token createdAccess token created33

Access token

Logon Options in a Workgroup

You can change logon options to:You can change logon options to:

Require users to type a valid user name and passwordRequire users to type a valid user name and password

Improve computer performance by disabling Fast User SwitchingImprove computer performance by disabling Fast User Switching

Practice: Configuring Microsoft Windows XP Professional for a Workgroup

Join a workgroup

Log on to the workgroup computer with a local user account

Create another local user account

Configure Fast User Switching

Test Fast User Switching

Change the account type

Join a workgroup

Log on to the workgroup computer with a local user account

Create another local user account

Configure Fast User Switching

Test Fast User Switching

Change the account type

11

22

33

44

55

66

Lesson: Configuring Local Security

What Is Local Security Configuration?

Guidelines for Configuring Local Policies

Guidelines for Configuring CTRL+ALT+DEL Security Options

What Is Local Security Configuration?

Configuring local security includes:Configuring local security includes:

Creating a customized security consoleCreating a customized security console

Adding Group Policy, Local Users and Groupssnap-insAdding Group Policy, Local Users and Groupssnap-ins

Configuring account policies and local policiesConfiguring account policies and local policies

Configuring security options such as CTRL+ALT+DELConfiguring security options such as CTRL+ALT+DEL

Guidelines for Configuring Local Policies

Use Local Policies to configure the following settings:Use Local Policies to configure the following settings:

User Rights AssignmentUser Rights Assignment

Security OptionsSecurity Options

Guidelines for Configuring CTRL+ALT+DEL Security Options

To configure CTRL+ALT+DEL options:To configure CTRL+ALT+DEL options:

Open the Local Computer Policy snap-inOpen the Local Computer Policy snap-in

Access the options under User ConfigurationAccess the options under User Configuration

Practice: Configuring Account Policies

Create a customized local security console

Configure Password Policy settings

Configure Account Lockout policy settings

Create a customized local security console

Configure Password Policy settings

Configure Account Lockout policy settings

11

22

33

Lesson: Configuring Windows Firewall

What Is Windows Firewall?

What Is a Windows Firewall Exception?

How to Configure Windows Firewall

How to Configure Windows Firewall Exceptions

Windows Firewall Security Policies

Best Practices for Configuring Windows Firewall

Windows Firewall protects a computer from unsolicited incoming trafficWindows Firewall protects a computer from unsolicited incoming traffic

What Is Windows Firewall?

What Is a Windows Firewall Exception?

Exceptions permit specific types of unsolicited traffic

Exceptions permit specific types of unsolicited traffic

Custom exceptionCustom exceptionDefault exceptionDefault exception

How to Configure Windows Firewall

Enable for all connections

Enable or disable for specific connections

Configure logging

Enable for all connections

Enable or disable for specific connections

Configure logging

How to Configure Windows Firewall Exceptions

Configure default exceptions

Create and edit custom exceptions

Open ports

Configure ICMP exceptions

Configure specific connections

Configure default exceptions

Create and edit custom exceptions

Open ports

Configure ICMP exceptions

Configure specific connections

Windows Firewall Security Policies

Configure Windows Firewall with policy settingsConfigure Windows Firewall with policy settings

Use appropriate profileUse appropriate profile

Best Practices for Configuring Windows Firewall

Implement Windows Firewall on all connections on all systemsImplement Windows Firewall on all connections on all systems

Do not add exceptions unless necessaryDo not add exceptions unless necessaryUse Group Policy to manage Windows Firewall settingsUse Group Policy to manage Windows Firewall settingsConfigure the Standard profile to be most restrictiveConfigure the Standard profile to be most restrictive

Test applications with Windows Firewall before deploymentTest applications with Windows Firewall before deployment

Practice: Configuring Windows Firewall

Edit existing exceptions

Add a port exception

Delete a port exception

Configure Windows Firewall logging

Check firewall settings from the command line

Edit existing exceptions

Add a port exception

Delete a port exception

Configure Windows Firewall logging

Check firewall settings from the command line

11

22

33

44

55

Lesson: Configuring Network Options in a Workgroup

How Workgroup Configuration Works

What Is Internet Connection Sharing?

Guidelines for Selecting an Internet Connection Method

Enable: Windows Firewall Network bridge

Enable: Windows Firewall Network bridge

33 Configure: Shared folders Network printers

Configure: Shared folders Network printers

55

How Workgroup Configuration Works

Complete the Home and Small Network checklist

Complete the Home and Small Network checklist

11 Configure Internet connectionConfigure Internet connection

22

Name computerName computer44

What Is Internet Connection Sharing?

Workgroup

ICS hostICS host

Internet Connection Sharing connects multiple computers to the Internet by using a single Internet connectionInternet Connection Sharing connects multiple computers to the Internet by using a single Internet connection

Guidelines for Selecting an Internet Connection Method

Connection Options in the Network Setup WizardConnection Options in the Network Setup Wizard

The computer is the ICS hostThe computer is the ICS host

The computer is a client of the ICS host or of a residential gatewayThe computer is a client of the ICS host or of a residential gateway

Connection methods that do not use ICSConnection methods that do not use ICS

Direct Internet connection for each network computerDirect Internet connection for each network computer

Direct Internet connection for a single computerDirect Internet connection for a single computer

No Internet connectionNo Internet connection

Demonstration: Configuring Internet Connection Sharing Manually

In Control Panel, select Network Connections

Select a connection

Select Internet Connection Sharing

In Control Panel, select Network Connections

Select a connection

Select Internet Connection Sharing

11

22

33

Practice: Configuring Network Options in a Workgroup

Configure a home or small office network

Create and share a folder

Save a file to the shared folder

Access the file from the shared folder

Configure a home or small office network

Create and share a folder

Save a file to the shared folder

Access the file from the shared folder

11

22

33

44

Lesson: Joining a Domain

What Is the Impact of Joining a Domain?

How Users Log On to a Domain

What Is the Impact of Joining a Domain?

Joining a domain:Joining a domain:

Enables users access to domain resourcesEnables users access to domain resources

Makes the computer and users subject to domain configurations for Group Policy, Account Policies, and security settings

Makes the computer and users subject to domain configurations for Group Policy, Account Policies, and security settings

How Users Log On to a Domain

Cached CredentialsA copy of cached credentials is stored in the local computer registry

Cached CredentialsA copy of cached credentials is stored in the local computer registry

33

LogonThe user must press CTRL+ALT+DEL

LogonThe user must press CTRL+ALT+DEL

11

AuthenticateCredentials are checked against the Active Directory database

AuthenticateCredentials are checked against the Active Directory database

22

Active DirectoryActive Directory

Practice: Joining a Domain

Join a domain

Verify domain membership

Join a domain

Verify domain membership

11

22


Recommended