Group Policy Objects And Password Settings

Decent Essays
Introduction:

The goal of this lab is to understand how Group Policy Objects and Password Settings Objects are enforced and used on a contextual and practical level. We also joined a client PC to our Domain and enforced these Policies on the client machine. We also played with how blocking inheritence of these objects interacts with the client machine to see which configurations work and which don 't.

Procedure:

Please check wiki for any and all configuration documentation. Below are usernames and passwords to log into each machine and service.

System or Service Username Password
RHEL(root) Root T3m9P@5s
RHEL Amanley lol92rofl
CentOS(root) Root lol92rofl
CentOS Amanley T3m9P@5s
OpsView Admin lol92rofl
Wiki Admin T3m9P@5s
Windwoes Administrator T3m9P@5s
…show more content…
For example Password Settings Objects do not do anything to harden a system but will disallow users from creating a short or bad password. This would disable hackers immediate (relatively) entry into the system, but will not stop their attempts. These objects can also be applied on different levels such as domain, site, organizational unit. This would be useful for someone in an administrative position as they would have access to more sensitive information when compared to a peon within the company. You could then force administration to use stronger passwords which makes this sensitive information harder to get …show more content…
For example if someone in the “dip” (dip a wax model of a part into plaster to create a mold) department had an engineer log on to be able to use the computer because the other employee could not remember the standard Factory username and password we could deem that machine as a security risk as it had much more information available to employees that normally would never see anything of the sort. This is only one example of security auditing using Group Policy Objects.

Another example was that we would track any and all objects created within our local domain, during my time there, my controller only ever had user accounts created by me, but if someone got access to the administrator account I could tell what they had created, when and how. Being that no one could have accessed our network, I never saw this happen once, but was assured that it would

Related Documents

  • Great Essays

    Nt1330 Unit 1 Assignment 1

    • 1566 Words
    • 7 Pages

    C. Services & Applications 1. TRUSTED a) Microsoft Active Directory (AD) Domain: In order to resolve the issues inherent in a peer-to-peer network, a centralized means of user authentication and resource sharing must be implemented. Microsoft Active Directory (AD) is a centrally administered, hierarchical structure designed to manage user access to shared network resources in a domain. Windows Server 2012 R2 Datacenter edition operating system (OS) is required to establish and manage the company’s AD domain.…

    • 1566 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    A root user has more control on the machine (Why is it bad to login as root?,…

    • 1228 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3

    • 483 Words
    • 2 Pages

    Microsoft was the one to develop Active Directory. Directory services are provided by Active Directory to windows domain network. It stores all the information related to files, users, resources and computers. It places them in proper hierarchal logical groupings. It uses this information to provide the right access and authority to the right user.…

    • 483 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3 Quiz

    • 507 Words
    • 3 Pages

    1. Go to your home directory and run: Most file systems have designated directories to assign permissions or access rights to specific users. File permission controls users to view, change, navigate & execute the designated contents of the file directories. LINUX/UNIX coherently use file permission to enable access to ownership for files & directories. File permission includes rwx is for read, write, and execute permissions.…

    • 507 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    • Authentication- this domain controller is made only for routine security processes. Due to this, it can perform these processes much faster than another server that is busy running programs and processing resources. Using a domain controller makes it easier for a user to access the domain and network, and the time savings are often rather large if this is used across a big network. Resource Authentication.…

    • 484 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Task 2 (P2) Describe the following physical security measures and explain how they may be used to help keep systems secure. • Locks Locks are physical security measure that can be used in different aspect within the company. The locks can be put on the door to avoid people who not supposed be in the building or employees who not supposed be on that room. There are different types of locks that can be used within the company such as Password locks that be put on the doors, this will avoid anyone coming to room without password identification to enter the room. Also the company can use ID IDENIFACTION on the door so any employees comes have to use their ID in order to enter the building, this will…

    • 806 Words
    • 4 Pages
    Decent Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    4. CORRESPONDING DUTIES: As a user of the company network you have the following obligations: 1) To answer for your personal account granted to you by CRI company. 2) To keep confidentiality of company’s information, maintaining its integrity and keeping information from being accessed by non-authorized users.…

    • 1019 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Abstract This whitepaper will review the concepts, how to apply them, and issues that arise regarding the principle of least privilege. This practice was implemented to restrict user access to certain aspects while still allowing them to produce maximum work efficiency. This whitepaper also uses real-world examples as well as theoretical examples to provide the reader a better understanding of the principle of least privilege. Though most examples shown can argue that this is not a flawless concept, the rarity of real life incidences prove that it is an effective practice that is necessary for any network.…

    • 1203 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Information security policy is to protect the data and assets. We can apply policies to the users. What to access and what not to access. These security policies can protect the networks, computers, applications of the company.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Workstation Security Policy A workstation policy provides standards for access to information inside the facility in a controlled manner, respecting guidelines set by the Health Insurance Portability and Accountability Act (HIPPA). The purpose of this policy is to provide guidelines to properly ensure workstation security within healthcare companies. Workstation security policy ensures the security of information on the workstation and information accessed by the workstation. Additionally, this policy provides guidelines on how to ensure that the requirements of HIPPA are met.…

    • 636 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    A Risk Assessment Plan plays a big role in any company, whether it is big or small company. The risk assessment will help identify the vulnerabilities and threats to the Wells Fargo IT resources. Which will help determine the impact of those vulnerabilities, threats, and unauthorized access. Having some knowledge of what type of risks expect will help mitigate them faster. There are a several steps needed for a good risk assessment plan, which will essentially help the company be in compliance with FISMA and other federal laws.…

    • 720 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    7/A. P2: Explain the principles of information security when protecting the IT systems of organizations 7/A. P3: Explain why organization must adhere to legal requirements when considering IT system Security. 7/AB. D1: Evaluate the effectiveness of the technique used to protect organisations from security threats whilst taking account of the principles of information security and legal requirements. Principles of information security…

    • 1392 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    There are many risks in the world. Risk can be defined as the degree of probability of loss. Risk could also be referred to as a threat. In the information technology world there are many threats that are known and can be anticipated.…

    • 1174 Words
    • 5 Pages
    Improved Essays

Related Topics