19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.93 Planning of a Windows NT network<br />

Initiation responsibility: Head of <strong>IT</strong> Section, <strong>IT</strong> Security Management<br />

Implementation responsibility: <strong>IT</strong> Security Management, Administrators<br />

Windows NT can be implemented in various configurations in a network. To<br />

allow an appraisal and understanding of the advantages and disadvantages of<br />

the individual types of implementation, the security system of Windows NT<br />

needs to be described briefly to start with. In principle, this operating system<br />

retains control of all resources. Users can only access the resources if they<br />

have been granted the corresponding rights and authorisations. Access to the<br />

system is only possible via a valid user account, which can be protected by<br />

means of a password. <strong>The</strong> security account manager (SAM) is used to<br />

administer information on user and group accounts in the security account<br />

database, often termed SAM database. When a user logs in, the operating<br />

system generates an access token for the user, in accordance with the entries in<br />

the SAM database. <strong>The</strong> security reference monitor uses this token to check<br />

whether the user is authorised to access certain objects and perform the<br />

required actions (e.g. delete a file or shutdown the system).<br />

Windows NT supports network operations with the following concepts:<br />

1. Workgroups<br />

Computers can be assigned to workgroups and jointly use resources via the<br />

network as part of the peer-to-peer concept (also refer to Module 6.3 Peer-to-<br />

Peer Networks).<br />

Every computer in such a network can be used as a server as well as a<br />

workstation. This is done by sharing resources on the individual computers.<br />

Every Windows NT workstation employed in a workgroup manages its own<br />

SAM database and, thus, its own user and group accounts. <strong>The</strong> entries in this<br />

database cannot be used by any other computer in the same workgroup. As a<br />

result, central administration is not possible. A password is generally required<br />

to access resources which have been shared.<br />

<strong>The</strong> main disadvantage of this concept is that it does not allow adequate<br />

control of the rights of individual users. For this reason, the configuration of<br />

workgroups should be avoided wherever possible.<br />

2. Network with a dedicated server<br />

This type of network incorporates a client-server structure. In this case, a<br />

specification is made as to which computers should act as servers and clients<br />

respectively. Servers can share directories and / or printers, and supply<br />

applications such as Mail, Schedule+, Fax on a global basis. In contrast,<br />

clients can only use the resources made available by the servers.<br />

An NT computer can be run on the "Windows NT Server" or "Windows NT<br />

Workstation" operating system. In small networks, a licensed version of<br />

"Windows NT Workstation" can also be operated as a server. Due to licensing<br />

regulations, however, no more than 10 users are allowed to simultaneously log<br />

into this computer via the network. If this limit proves too low, Windows NT<br />

Server needs to be installed. In general, standard users should not be allowed<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!