pdf

School

American Military University *

*We aren’t endorsed by this school

Course

242

Subject

Information Systems

Date

Apr 3, 2024

Type

pdf

Pages

15

Uploaded by ProfessorRam11604

Report
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e) Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02 Student: Email: Beverly Baxter beverly.baxter@mycampus.apus.edu Time on Task: Progress: 7 hours, 57 minutes 100% Report Generated: Friday, February 9, 2024 at 4:25 PM Section 1: Hands-On Demonstration Part 1: View Existing ACLs on a Windows System 5. Make a screen capture showing the current permissions for the SFfiles folder . Page 1 of 15
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e) Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02 12. Make a screen capture showing the current permissions for the HRfiles folder. 15. Make a screen capture showing the current permissions for the MGRfiles folder. Page 2 of 15
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e) Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02 Part 2: Modify ACLs using Icacls.exe 8. Compare the results of the icacls.exe command with the ACLs you reviewed in Part 1 of this lab. Do they match? Yes 11. Compare the new results of this command with the results from step 7. You should notice that there is now a new line item for SECURELABSONDEM\ShopFloor. The grant command creates a new line item for any principal with permissions added through icacls.exe; technically, icacls.exe adds “special” permissions, which are visible by clicking the Advanced button in the folder Properties dialog box. The results are not the same 12. Make a screen capture showing the changes you made to the SFfiles folder permissions . Page 3 of 15
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e) Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02 14. Make a screen capture showing the changes you made to the HRfiles folder permissions . 16. Make a screen capture showing the changes you made to the MGRfiles folder permissions . Page 4 of 15
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e) Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02 Part 3: Validate ACL Settings 14. Make a screen capture showing the modified text file in the SFfiles folder . The modified file will show a 1 KB value in the Size column, indicating that text has been added to the file. Page 5 of 15
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e) Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02 17. Make a screen capture showing the modified text file in the HRfiles folder . The modified file will show a 1 KB value in the Size column, indicating that text has been added to the file. Page 6 of 15
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e) Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02 20. Make a screen capture showing the re-modified text file in the SFfiles folder . The modified file will show a 0 KB value in the Size column, indicating that all text has been removed from the file. Page 7 of 15
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e) Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02 21. Make a screen capture showing the modified text file in the MGRfiles folder . The modified file will show a 1 KB value in the Size column, indicating that text has been added to the file. Page 8 of 15
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e) Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02 Section 2: Applied Learning Part 1: Add a New User using a Script 3. Make a screen capture showing the new user account in this script . Part 2: Add a New Group using a Script Page 9 of 15
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e) Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02 5. Make a screen capture showing the modifications you made to the script . Part 3: Modify Permissions using a Script Page 10 of 15
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e) Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02 2. Make a screen capture showing the current contents of the TargetWindows01 C: drive . Part 4: Create Directories using a Script Page 11 of 15
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e) Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02 3. Make a screen capture showing the modifications to the final part of the script . 10. Make a screen capture showing the contents of the new LabDocuments2 directory . Page 12 of 15
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e) Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02 12. Make a screen capture showing the permissions for the ISSA01 security group . 15. Make a screen capture showing the members of the ISSA01 security group . Page 13 of 15
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e) Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02 Section 3: Challenge and Analysis Part 1: Analysis and Discussion Explain how the principle of least privilege can be used in a corporate setting to protect corporate resources. The principle of least privilege grants users permission to read, write or execute only the files or resources necessary to do their jobs. Time-limited privileges can also be enabled to ensure users have access to critical data for just the amount of time needed to perform a specific task. Part 2: Tools and Commands Research ACLs on the Internet and identify the permissions required to rename existing files. (D) Delete Access Part 3: Challenge Exercise Describe the choices you’ve made. I use the command prompt an went back over my section 1 part to and put in the command. icacls.exe C:\LabDocuments/MGRfiles /grant ShopFloor:(D) to delete the manager as directed. From there I had to execute another command. icacls.exe C:\LabDocuments\MGRfiles to complete it. Page 14 of 15
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e) Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02 Make a screen capture showing your successfully executed icacls commands . Powered by TCPDF (www.tcpdf.org) Page 15 of 15
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help