|
Administering Windows ServersHere are my notes on Administering Microsoft's Windows 2008/2003/2000/NT4 Servers. (I'm not done updating this for Windows 2008 yet)
| Topics this page:
|
|
Factoids (by the numbers)
| Download Windows 2003 SP2 (32-bit x86) and keep it handy if you don't have the DVD media.
what is windows 2003?
Microsoft's Distributed Systems Guide has dozens of richly illustrated pages on Active Directory and Distributed Security. Microsoft's Server Resource Kit Supplements SupportLive Chat: Microsoft Windows 2000 Server and Windows 2000 Professional: February 20, 2001 |
Tasks
Manage CompressionApply compression either through Windows Explorer or from the command line (batch process) with the
Launching Applets in Windows Control Panel... |
Mark Minasi publishes a free newsletter and presents seminars based on his highly rated and best-selling book: Mastering Windows 2000 Server, 3rd Edition SecurPass Reset is a self help utility that enables end-users who forgot their password, or accidentally got locked out of their own accounts, to reset their own passwords and re-enable their own accounts via a web application, without Help Desk intervention.
|
Areas of Security Setting
Rights grant the ability to perform (do) an action such as login.
| When a volume is formatted with NTFS, a Master File Table (MFT) and Metadata are created. In the Group Policy hierarchy, Security settings are under Computer Configuration, Windows Settings. The Security Options node is contained in the Local Policies node. Local machine policies can only contain security settings for Account Policies and Local Policies. Domain Policies Details on each security policy is shown here. In each list:
Policies created on Windows 9x will not work with Windows 2000.
|
Security Toolkit
|
Groups
|
Scope of BUILTIN Groups
|
Domain Local Groups |
You have admin privileges if you see “Open All Users”. For more information on commands: NET HELP GROUP Activewin's excellent Step-by-Step Guide to Understanding the Group Policy Feature Set
This Resource Kit command adds users to groups specified in the file specified:
|
Group (Printer) Permissions Usage
| Download the Visio flowchart file for this graphic |
Group Policies
C When a policy setting is updated, ??? A Restricted Group Policy defines who should and should not belong to a specific group. When a template (or policy) that defines a restricted group is applied to a system, the Security Configuration Tool Set adds members to the group and removes members from the group to ensure that the actual group membership coincides with the settings defined in the template (or policy). Effective settings are the result of proprogating (overwriting) GPO objects from the Active Directory. The Local Security Settings MMC has a column for "Effective Settings" because, during policy propagation, Domain policies implemented by Active Directory override local security settings protecting the local computer. Application of group policy objects starts with the group policy object at the bottom of the list and ends with the group policy object at the top. Thus, the group policy object at the top takes precedence over the others. Order of policy implementationThe same policy item could be defined at various levels in the Active Directory hierarchy. Windows 2000 resolves conflicts by overwriting in this order:
Thus, Child OU policies "trumps" them all. This is unless "No Override" blocks inheritance. Policy InheritanceUser account policies are NOT inherited. Account policies set at the domain level always in effect. Account policies that may be set at lower levels are ignored!A Group Policy linked to a domain applies to all users and computers within that domain. However, a GPO linked to a parent domain does not apply to the domains of its children. To restrict NT4 users from using Registry editing tools, etc. use the System Policy Editor to create a sytem policy to select “Disable Registry editing tools" under the System/Restriction node. for a default user. Save this NTConfig.pol file in the NetLogon share on a domain controller. When any user logs on to the domain from an NT client, the policy will be applied by overwriting user-specific keys in the local registry. Using Group Policy ToolsThe Locker program prevents other login processes from propogating Group Policies by finding the domain controller on the network, then opens and keeps locked file handles to all Group Policy files.To access the CIFS File Sharing Service, third parties can create Engines to Security Service Attachments.
|
gp.chm, the Group Policy help file from the Windows 2000 Server Resource Kit provides a cross-reference of where each Group Policy is stored in the Registry. w2rksupp.chm lists Windows 2000 Support Tools and provides call parameters for them. Introduction to Windows 2000 Group Policy Step-by-Step Guide to Understanding the Group Policy Feature Set Step-by-Step Guide to Configuring Enterprise Security Policies [Nov 4, 1999] Group Policy Simplifies Administration,a key component of IntelliMirror Administration and Implementation of Group Policy in Windows 2000: February 9, 2001 Microsoft Windows 2000 Server Deployment Planning Guide includes a discussion about setting security policies in Chapter 11, Planning Distributed Security Windows 2000 Server Resource Kit. Chapter 22, Group Policy Using Group Policy Scenarios, Feburary 2000 MCSE Training Kit: Microsoft Windows 2000 Server from Microsoft Press, 2000. Lesson 4 in Chapter 7, "Administering Microsoft Windows 2000 Server."
|
function block100() { var oWsh = new ActiveXObject("WScript.Shell"); var strCommand = "IPSecPol \\\\localhost" + " -w REG -p \"Test\" -o"; var iRet = oWsh.Run(strCommand, 0, true); WScript.echo("DEBUG: called " + strCommand + " -> " + iRet); strCommand = "IPSecPol" + " -x -w REG -p \"Test\" -r \"Block1-100\" -n BLOCK -f "; for (var i = 1; i <= 100; i++) { strCommand += "*::+0:" + i + ":TCP "; } iRet = oWsh.Run(strCommand, 0, true); WScript.echo("DEBUG: called " + strCommand + " -> " + iRet); }
Permissions and Access Control Lists
Setting File Permissions (Modifying Access Control Lists)Permissions are usually specified in the Security tab of the Properties sheet obtained from right-clicking on a file in Windows Explorer. Changes to this screen are stored in DACLs (Discretionary ACL) permissions and SACL (System ACLs) audit settings. The DACL is a table of Access Control Entries (ACE) that define user and group access. The security subsystem checks the folder's or file's DACL for ACEs that apply to the user and group security identifiers (SIDs) that uniquely identify objects to the operating system.The DACL of published objects should be Read-Only to limit visibility. This command from the Resource Kit lists and sets file-system security options in a specified folder:
This command from the Resource Kit lists and migrates ACLs from domain1 to domain2:
To change local permissions: ACLs (“/T”) as access control enTries (ACEs) in the c:\WINNT\tools folder and (/P) rePlaces permission so user “backup operators” has Full control (:f)
To remove Everyone and User perms, re-ACL executable content by using Eric's x template for IIS5 servers so that only admins can use the box locally. His script for NT4 re-ACLs a system and replaces Everyone with AuthUsers. Assignable permissions
:R = Read — allows users to display folder names, filenames, file data, and attributes; run program files; and change folders within the shared folder. :W = Write — Create new files & subfolders within that folder, modify folder attributes, view ownership and permissions associated within that folder. :C = Change = Modify = Read + Write + Delete :F = Full control (R/W/Change Ownership) ??? Create All Child Objects and Delete all Child Objects Web sharing depends on the Server service. By default, Windows 2000 assigns Full Control permissions to the Everyone group Permissions InheritanceWhen the ACL is set for a folder, Windows 2000 by default selects for that folder “Propagate inheritable permissions to all subfolders and files”, so that the child of that folder receive that ACL. However, any explicit ACE defined for a child object remains unchanged. ACEs for all child objects are blindly overwritten if you select “Replace existing permission on all subfolders and files with inheritable permissions”.That's ONLY for child objects checked Allow inheritable permissions from parent to propagate to this object. acldiag.exe writes to a tab-delimited file the permissions of objects the user has a right to view. Systemtools.com's DumpSec utility (a.k.a. DumpAcl) dumps a remote computer's user, group, and permissions information.
When a shared folder is moved, Windows 2000 automatically stops sharing the folder. To preserve permissions when copying and moving files, use this Resource Kit CLI utility:
The $299 Security Copy utility integrates with the Windows NT 4.0 Desktop to copy files and directories on NTFS partitions while keeping the security intact, creating shares, and migrating local groups. It also does Differential Copying of only files that have changed in the source server. Multiple opartions can be scheduled to run after hours.
|
GPO Stores in Registry
GPO templates are stored in %SystemRoot%\ Sysvol\ Sysvol\ Corp.com\ Policies\ {GUID} gpt.ini contains the version number of the GPO container. Registry.pol files can only be edited using the Security snap-in. Replicated to Active Directory Domain Controller's Computer object. gpotool.exe CLI from the Server Resource Kit searches through GPOs on DCs, then displays their state information after checking for validity and consistency. gpresult.exe CLI provides general information about GPOs and applied Registry settings. |
Windows.NET will include a Group Policy Management Console (GPMC) that will export and import group policies.
|
Security Setting Templates
|
Account Policies
Q259576: Group Policy Application Rules for Windows 2000 Domain Controllers
|
Local Policies
Audit Policy User Rights Assignment Security Options Audit PoliciesThe AUDITPOL CLI from the Resource Kit audits local and remote computers for all (Success and Failure) of “Audit account management” and other events:
Note that the CLI lists the 9 audit policies with different names and in a different sequence than the Group Policy MMC GUI (which sorts by policy name):
Download the Visio flowchart file for this graphic |
User Rights Assignment
|
Security Options (39)
|
Domain Policies
Public Key Policies
IPSec (Internet Procotol Security) Policies
|
User Profiles and IntelliMirror Technology
User Profiles include settings, colors, and documents. Windows 2000 introduced the ability to store for roaming purposes portions of a profile rather than the entire profile. Create a mandatory user profile used by all users two ways: The first time that a user logs on a Windows 2000 Domain Controller, a User Profiles is automatically created in folder %SystemRoot%\Documents and Settings Management (instead of a Profiles folder in NT4). This allows user settings to follow users at different workstations. So clients must join a domain to use this Intellimirror technology. Profile values are contained in a read/write network share containing the %userprofile% environment variables. The default user profile and folders not needed by users are hidden. Windows 2000 introduced the ability to merge profile files together. Group Policies can be used to manage user profiles such as what actions to take automatically when a profile reaches a certain size. The User Profile Deletion Utility from the Resource Kit removes user settings, colors, and all files in My Documents folders associated with user profiles on both local and remote machines, optionally after /days of inactivity.
| User Profiles in Microsoft Windows 2000: June 29, 2000 |
PrintingFix Printer ServerUse the Fixprnsv.exe /diag utility to create a report after scanning the Printer Server for incompatible Printer drivers. The /fix switch install drivers on Windows NT 4.0 and Windows 2000 based clients with the ability to connect to the print server and download the appropriate printer drivers. When this switch is used on a Windows 2000-based computer, any incompatible Windows NT 4.0 printer drivers will be replaced.
Printer Auditing SettingsView auditing settings for a printer from the Auditing tab under the Security tab of Printer Properties.
Logon ScriptsLogon script, ntconfig, and ntconfig.POL filess from NT4 machines' WINNT/ System32/ Repl/ Import/ Scripts files.
Taking printer off-lineFrom Start | Settings | Printers, highlight the specific printer. Pull down the Printer menu and select the Use Printer Offline option. Remember: When you take a printer off line, documents stay in the print queue, even when the print server is shut down and then restarted. |
Utility from the Server CD to view dependencies, starting from NTOSKRNL.
client jobs are spooled (via a TCP/IP conversation —not merely copied) to the print server's x.sp_ file in \System32\Spool and an accompanying x.shd,/b> shadow file in \system32\spool\printers.
These files, once created on the server, can be copied and pasted to another location.
\system32\spool\drivers has
Share
|
Services, Processes, Threads
To Shut It DownAvoid shuting off your machine (manually crashing your own system).If your application stops responding, invoke the Task Manager by pressing press Ctrl+Alt+Del or right-click on the Tray Clock. Kill.exe CLI shuts down processes. In the Applications tab, right-click on the troublesome application and select "End Task". This may not do the job becuase of other DLL's which are still alive. In the Applications tab, right-click on the troublesome application and select "Go To Process". In the Process tab, right click on the highlighted process and select "End Process Tree". This terminates all the other processes indirectly started by the application.
To disable a service after a rebootChange the value of the “Start” key to 4 in this registry keyHKLM \System \CurrentControlSet \Services \Eventlog
|
Using Pulist.exe from the Resource Kit,
list Process Names and ID's for computers C1 and C2:
To detail threads running within each process,
use the Process Viewer from the Windows 2000 Support Tools CD:
For a hierarchical arrangement of parent and child processes,
use the Task List from the Windows 2000 Support Tools CD:
.ACM CodecsTo display information about your threads using WMI/WBEM, run this from the Resource Kit:
|
Application Priorities
Use the Task Manager to change an application's priority. Under the Processes tab, right-click on the task Image Name and select Set Priority. Setting the mode of an application automatically sets the priority as well. Priorities range from 0 to 31, with 31 being the highest priority. taskmgr.exe defaults to High. Other apps default to Normal. Only Windows XP features Above and Below Normal priority modes. |
How does a C or Java programmer change priorities from within an application program? |
Related Topics:
|
| Your first name: Your family name: Your location (city, country): Your Email address: |
Top of Page
Thank you! |