pdf
keyboard_arrow_up
School
American Military University *
*We aren’t endorsed by this school
Course
242
Subject
Information Systems
Date
Apr 3, 2024
Type
Pages
15
Uploaded by ProfessorRam11604
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e)
Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02
Student:
Email:
Beverly Baxter
beverly.baxter@mycampus.apus.edu
Time on Task:
Progress:
7 hours, 57 minutes
100%
Report Generated:
Friday, February 9, 2024 at 4:25 PM
Section 1: Hands-On Demonstration
Part 1: View Existing ACLs on a Windows System
5.
Make a screen capture
showing the current permissions for the SFfiles folder
.
Page 1 of 15
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e)
Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02
12.
Make a screen capture
showing the current permissions for the HRfiles folder.
15.
Make a screen capture showing the current permissions for the MGRfiles folder.
Page 2 of 15
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e)
Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02
Part 2: Modify ACLs using Icacls.exe
8.
Compare the results
of the icacls.exe command with the ACLs you reviewed in Part 1 of this
lab. Do they match?
Yes
11.
Compare
the new results
of this command with the results from step 7. You should notice that there is now a new line item for SECURELABSONDEM\ShopFloor. The
grant command creates a new line item for any principal with permissions added through
icacls.exe; technically, icacls.exe adds “special” permissions, which are visible by clicking the
Advanced button in the folder Properties dialog box.
The results are not the same
12.
Make a screen capture showing the
changes you made to the SFfiles folder permissions
.
Page 3 of 15
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e)
Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02
14.
Make a screen capture showing the
changes you made to the HRfiles folder permissions
.
16.
Make a screen capture
showing the
changes you made to the MGRfiles folder
permissions
.
Page 4 of 15
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e)
Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02
Part 3: Validate ACL Settings
14.
Make a screen capture
showing the modified text file in the SFfiles folder
.
The modified file will show a 1 KB value in the Size column, indicating that text has been
added to the file.
Page 5 of 15
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e)
Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02
17.
Make a screen capture
showing the modified text file in the HRfiles folder
.
The modified file will show a 1 KB value in the Size column, indicating that text has been
added to the file.
Page 6 of 15
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e)
Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02
20.
Make a screen capture
showing the re-modified text file in the SFfiles folder
.
The modified file will show a 0 KB value in the Size column, indicating that all text has been
removed from the file.
Page 7 of 15
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e)
Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02
21.
Make a screen capture
showing the modified text file in the MGRfiles folder
.
The modified file will show a 1 KB value in the Size column, indicating that text has been
added to the file.
Page 8 of 15
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e)
Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02
Section 2: Applied Learning
Part 1: Add a New User using a Script
3.
Make a screen capture
showing the new user account in this script
.
Part 2: Add a New Group using a Script
Page 9 of 15
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e)
Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02
5.
Make a screen capture
showing the modifications you made to the script
.
Part 3: Modify Permissions using a Script
Page 10 of 15
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e)
Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02
2.
Make a screen capture
showing the current
contents of the TargetWindows01 C: drive
.
Part 4: Create Directories using a Script
Page 11 of 15
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e)
Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02
3.
Make a screen capture
showing the modifications to the final part of the script
.
10.
Make a screen capture
showing the contents of the new LabDocuments2 directory
.
Page 12 of 15
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e)
Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02
12.
Make a screen capture
showing the permissions for the ISSA01 security group
.
15.
Make a screen capture
showing the members of the ISSA01 security group
.
Page 13 of 15
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e)
Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02
Section 3: Challenge and Analysis
Part 1: Analysis and Discussion
Explain
how the principle of least privilege can be used in a corporate setting to protect corporate
resources.
The principle of least privilege grants users permission to read, write or execute only the files or
resources necessary to do their jobs. Time-limited privileges can also be enabled to ensure users
have access to critical data for just the amount of time needed to perform a specific task.
Part 2: Tools and Commands
Research
ACLs on the Internet and identify
the permissions required to rename existing files.
(D) Delete Access
Part 3: Challenge Exercise
Describe
the choices you’ve made.
I use the command prompt an went back over my section 1 part to and put in the command.
icacls.exe C:\LabDocuments/MGRfiles /grant ShopFloor:(D) to delete the manager as directed. From
there I had to execute another command. icacls.exe C:\LabDocuments\MGRfiles to complete it. Page 14 of 15
Using Access Control Lists to Modify File System Permissions on Windows Systems (3e)
Security Strategies in Windows Platforms and Applications, Third Edition - Lab 02
Make a screen capture
showing your successfully executed icacls commands
.
Powered by TCPDF (www.tcpdf.org)
Page 15 of 15
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help