Date post: | 16-Dec-2015 |
Category: |
Documents |
Upload: | avice-west |
View: | 218 times |
Download: | 0 times |
Overview
Configuring Microsoft Windows XP Professional for a Workgroup
Configuring Local Security
Configuring Windows Firewall
Configuring Network Options in a Workgroup
Joining a Domain
Lesson: Configuring Windows XP Professional for a Workgroup
What Is a Workgroup?
What Is a Local User Account?
Account Types and Privileges
What Is the Computer Management Console?
The Authentication Process
Logon Options in a Workgroup
What Is a Workgroup?
A workgroup is:A workgroup is:A group of computers on a network that share resources such as files and printersA group of computers on a network that share resources such as files and printers
Often referred to as a peer-to-peer network because the computers in a workgroup share resources without a dedicated server
Often referred to as a peer-to-peer network because the computers in a workgroup share resources without a dedicated server
A local user account:A local user account:
Is the only type of user account in a workgroup environmentIs the only type of user account in a workgroup environment
Resides in the Security Account ManagerResides in the Security Account Manager
Must be created on each computerMust be created on each computer
What Is a Local User Account?
User 1User 2User 3
SAM
User 1User 2User 3
SAM
User 1User 2User 3
SAM
User 1User 2User 3
SAM
Account Types and Privileges
An account type determines the actions that a user can perform on the computer consoleAn account type determines the actions that a user can perform on the computer console
Control Panel creates an Administrator account without a password, which can pose a security riskControl Panel creates an Administrator account without a password, which can pose a security risk
Computer ManagementComputer Management
Limited User
AdministratorControl PanelControl Panel
What Is the Computer Management Console?
The Computer Management Console is a collection of administrative utilities that you can use to manage a single local or remote computer
The Computer Management Console is a collection of administrative utilities that you can use to manage a single local or remote computer
When a user logs on locally, the SAM on the local computer authenticates the user’s credentialsWhen a user logs on locally, the SAM on the local computer authenticates the user’s credentials
The Authentication Process
Credentials sent
User logs on locallyUser logs on locally11 SAM
Logon information comparedLogon information compared22
Access token createdAccess token created33
Access token
Logon Options in a Workgroup
You can change logon options to:You can change logon options to:
Require users to type a valid user name and passwordRequire users to type a valid user name and password
Improve computer performance by disabling Fast User SwitchingImprove computer performance by disabling Fast User Switching
Practice: Configuring Microsoft Windows XP Professional for a Workgroup
Join a workgroup
Log on to the workgroup computer with a local user account
Create another local user account
Configure Fast User Switching
Test Fast User Switching
Change the account type
Join a workgroup
Log on to the workgroup computer with a local user account
Create another local user account
Configure Fast User Switching
Test Fast User Switching
Change the account type
11
22
33
44
55
66
Lesson: Configuring Local Security
What Is Local Security Configuration?
Guidelines for Configuring Local Policies
Guidelines for Configuring CTRL+ALT+DEL Security Options
What Is Local Security Configuration?
Configuring local security includes:Configuring local security includes:
Creating a customized security consoleCreating a customized security console
Adding Group Policy, Local Users and Groupssnap-insAdding Group Policy, Local Users and Groupssnap-ins
Configuring account policies and local policiesConfiguring account policies and local policies
Configuring security options such as CTRL+ALT+DELConfiguring security options such as CTRL+ALT+DEL
Guidelines for Configuring Local Policies
Use Local Policies to configure the following settings:Use Local Policies to configure the following settings:
User Rights AssignmentUser Rights Assignment
Security OptionsSecurity Options
Guidelines for Configuring CTRL+ALT+DEL Security Options
To configure CTRL+ALT+DEL options:To configure CTRL+ALT+DEL options:
Open the Local Computer Policy snap-inOpen the Local Computer Policy snap-in
Access the options under User ConfigurationAccess the options under User Configuration
Practice: Configuring Account Policies
Create a customized local security console
Configure Password Policy settings
Configure Account Lockout policy settings
Create a customized local security console
Configure Password Policy settings
Configure Account Lockout policy settings
11
22
33
Lesson: Configuring Windows Firewall
What Is Windows Firewall?
What Is a Windows Firewall Exception?
How to Configure Windows Firewall
How to Configure Windows Firewall Exceptions
Windows Firewall Security Policies
Best Practices for Configuring Windows Firewall
Windows Firewall protects a computer from unsolicited incoming trafficWindows Firewall protects a computer from unsolicited incoming traffic
What Is Windows Firewall?
What Is a Windows Firewall Exception?
Exceptions permit specific types of unsolicited traffic
Exceptions permit specific types of unsolicited traffic
Custom exceptionCustom exceptionDefault exceptionDefault exception
How to Configure Windows Firewall
Enable for all connections
Enable or disable for specific connections
Configure logging
Enable for all connections
Enable or disable for specific connections
Configure logging
How to Configure Windows Firewall Exceptions
Configure default exceptions
Create and edit custom exceptions
Open ports
Configure ICMP exceptions
Configure specific connections
Configure default exceptions
Create and edit custom exceptions
Open ports
Configure ICMP exceptions
Configure specific connections
Windows Firewall Security Policies
Configure Windows Firewall with policy settingsConfigure Windows Firewall with policy settings
Use appropriate profileUse appropriate profile
Best Practices for Configuring Windows Firewall
Implement Windows Firewall on all connections on all systemsImplement Windows Firewall on all connections on all systems
Do not add exceptions unless necessaryDo not add exceptions unless necessaryUse Group Policy to manage Windows Firewall settingsUse Group Policy to manage Windows Firewall settingsConfigure the Standard profile to be most restrictiveConfigure the Standard profile to be most restrictive
Test applications with Windows Firewall before deploymentTest applications with Windows Firewall before deployment
Practice: Configuring Windows Firewall
Edit existing exceptions
Add a port exception
Delete a port exception
Configure Windows Firewall logging
Check firewall settings from the command line
Edit existing exceptions
Add a port exception
Delete a port exception
Configure Windows Firewall logging
Check firewall settings from the command line
11
22
33
44
55
Lesson: Configuring Network Options in a Workgroup
How Workgroup Configuration Works
What Is Internet Connection Sharing?
Guidelines for Selecting an Internet Connection Method
Enable: Windows Firewall Network bridge
Enable: Windows Firewall Network bridge
33 Configure: Shared folders Network printers
Configure: Shared folders Network printers
55
How Workgroup Configuration Works
Complete the Home and Small Network checklist
Complete the Home and Small Network checklist
11 Configure Internet connectionConfigure Internet connection
22
Name computerName computer44
What Is Internet Connection Sharing?
Workgroup
ICS hostICS host
Internet Connection Sharing connects multiple computers to the Internet by using a single Internet connectionInternet Connection Sharing connects multiple computers to the Internet by using a single Internet connection
Guidelines for Selecting an Internet Connection Method
Connection Options in the Network Setup WizardConnection Options in the Network Setup Wizard
The computer is the ICS hostThe computer is the ICS host
The computer is a client of the ICS host or of a residential gatewayThe computer is a client of the ICS host or of a residential gateway
Connection methods that do not use ICSConnection methods that do not use ICS
Direct Internet connection for each network computerDirect Internet connection for each network computer
Direct Internet connection for a single computerDirect Internet connection for a single computer
No Internet connectionNo Internet connection
Demonstration: Configuring Internet Connection Sharing Manually
In Control Panel, select Network Connections
Select a connection
Select Internet Connection Sharing
In Control Panel, select Network Connections
Select a connection
Select Internet Connection Sharing
11
22
33
Practice: Configuring Network Options in a Workgroup
Configure a home or small office network
Create and share a folder
Save a file to the shared folder
Access the file from the shared folder
Configure a home or small office network
Create and share a folder
Save a file to the shared folder
Access the file from the shared folder
11
22
33
44
What Is the Impact of Joining a Domain?
Joining a domain:Joining a domain:
Enables users access to domain resourcesEnables users access to domain resources
Makes the computer and users subject to domain configurations for Group Policy, Account Policies, and security settings
Makes the computer and users subject to domain configurations for Group Policy, Account Policies, and security settings
How Users Log On to a Domain
Cached CredentialsA copy of cached credentials is stored in the local computer registry
Cached CredentialsA copy of cached credentials is stored in the local computer registry
33
LogonThe user must press CTRL+ALT+DEL
LogonThe user must press CTRL+ALT+DEL
11
AuthenticateCredentials are checked against the Active Directory database
AuthenticateCredentials are checked against the Active Directory database
22
Active DirectoryActive Directory