Home > Articles > Certification > Microsoft Certification

This chapter is from the book

Apply Your Knowledge

Exercises

4.1 Setting Up and Testing Account Policy

This exercise demonstrates how to set up domain account policy and then to test that it is functioning properly. This exercise requires that you have a domain controller machine and that the procedures outlined be performed on that machine. Initially, a new test user will be created.

Estimated Time: 10 minutes.

  1. From the Start menu, choose Program Files, Administrative Tools (Common), User Manager for Domains.

  2. Create a new user with a logon name of PolicyTest and a password of "password". Make sure that the user has to change the password at the next logon.

  3. From the Policies menu, choose Account.

  4. In the Account Policies dialog box, change the minimum password length to 8 and the password uniqueness to remember 2 passwords. Click OK to save this configuration.

  5. Log on as PolicyTest with a password of "password". You will be prompted to change your password.

  6. In the Change Password dialog box, enter the password "hello" and confirm it. Click OK to continue. You will get a message telling you that your password must be at least 8 characters long and must not be the same as your two previous passwords. (Your password failed because it had only 5 characters.) Click OK to clear the dialog box.

  7. In the Change Password dialog box, enter the password "password" and confirm it. Click OK to continue. You will again get a message telling you that your password must be at least 8 characters long and must not be the same as your two previous passwords. (Your password failed because it repeated a password that was in the password history.) Click OK to clear the dialog box.

  8. In the Change Password dialog box, enter the password "aardvark" and confirm it. Click OK to continue. This password will pass validation and you will be able to return to the desktop.

  9. At the desktop, press Ctrl+Alt+Del to bring up the Security dialog box. Then click Change Password.

  10. In the Change Password dialog box, type the old password ("aardvark") and then type the new password as "password" and confirm it. You will be told that your new password is invalid. Click OK to clear the dialog box.

  11. In the Change Password dialog box, type the new password as "llamasrule" and confirm it. Click OK to continue. You will get a message that your password has changed. Click OK to clear the dialog box and return to the Security dialog box.

  12. In the Security dialog box, click Change Password and try to change your password back to "password". In this case, you will be successful because the password history contains only "aardvark" and "llamasrule," and not "password". Clear the dialog boxes and return to the desktop.

  13. Log on as someone with administrative privileges and open the Account Policies dialog box again.

  14. In the Account Policies dialog box, change the Minimum Password Age to 10 days and close the dialog box.

  15. Log on as PolicyTest (with a password of "password").

  16. At the desktop, press Ctrl+Alt+Del to bring up the Security dialog box. Then click Change Password.

  17. In the Change Password dialog box, change the password from "password" to "aardvark". When you try to accept this change, you will be told that you cannot change the password at this time. This is because the minimum password duration has been set to 10 days. Note that an administrator could change the password from User Manager for Domains in the case that you forget the current password.

  18. Return to the desktop and log on as Administrator.

4.2 Using System Policy to Control a User's Desktop Environment.

This exercise walks you through the process of creating a system policy that will "lock down" the user's desktop. In addition, you also change computer settings to clear the name of the last person to log on and you create a logon banner.

Estimated Time: 10 minutes.

  1. From the Start menu, choose Programs, Administrative Tools (Common), System Policy Editor.

  2. In the System Policy Editor, select the File menu and choose New Policy.

  3. In the new policy, double-click the Default Computer icon to enable you to make changes that will apply to every computer affected by this policy (all in the domain).

  4. In the Default Computer Properties dialog box, expand the tree under Windows NT System, Logon.

  5. Click in the gray box next to Logon Banner, and at the bottom make the following changes: Change caption to read "Stay away if you are bad," and change the text to "Unauthorized use of this machine will result in severe electric shock!".

  6. Click in the gray box next to Do Not Display Last Logged On User Name.

  7. Verify that there is now a check mark next to Logon Banner and Do Not Display Last Logged On User Name. Then click OK to exit this dialog box.

  8. In the System Policy Editor dialog box, select the Edit menu and choose Add User.

  9. In the Add User dialog box, type the name PolicyTest and click OK to confirm.

  10. Double-click the icon labeled PolicyTest to enable you to make changes that affect only that user.

  11. In the PolicyTest Properties dialog box, expand the tree Shell, Restrictions and click next to remove Run Command from Start Menu and Hide Network Neighborhood. Verify that check marks appear beside each of these entries and then collapse the Shell tree.

  12. Expand the System, Restrictions tree and click beside Disable Registry Editing Tools. Verify that a check mark appears and then click OK to confirm the changes.

  13. In the System Policy Editor dialog box, select the File menu and choose Save.

  14. In the Save As dialog box, navigate to the path WINNT\Repl\Import\Scripts and save the file as NTCONFIG.POL.

  15. Close the System Policy Editor and return to the desktop.

  16. Log on as PolicyTest.

  17. At the desktop, check that Network Neighborhood is missing and that the Start menu does not have a Run command.

  18. From the Start menu, choose Programs, Command Prompt.

  19. At the command prompt, attempt to invoke the Registry Editor by typing regedit and pressing Enter. You will be told that Registry editing tools have been disabled.

  20. Log on as Administrator. When you do, notice that the logon banner now comes up and the username is no longer automatically filled in. Complete the logon as usual.

  21. At the desktop, notice that the restrictions applied to PolicyTest do not apply here.

4.3 Configuring Auditing and Viewing Security Logs

This exercise walks you through the process of setting audit policy, configuring auditing on file and system resources, and viewing audit records in the security log. This exercise assumes that you have created the PolicyTest user in Exercise 4.1 and that C: is formatted NTFS.

Estimated Time: 10 minutes.

  1. Start User Manager for Domains.

  2. From the Policies menu, choose Audit.

  3. In the Audit Policy dialog box, modify the settings so that they appear as in Figure 4.30. Click OK to continue.

    Figure 4.30. Modify the audit policy to look like this.

  4. Open My Computer and create the folder C:\AuditTest.

  5. In the AuditTest folder, create a file called DELETEME.TXT.

  6. Right-click DELETEME.TXT and, from the menu that appears, choose Properties.

  7. From the Properties dialog box, choose the Security tab.

  8. On the Security Property sheet, clear the check box at the bottom that reads Allow Inheritable Permissions from Parent to Propagate to This Object. When the Security dialog box appears, click Remove.

  9. Click the Add button and add the Administrators group to the ACL. Modify the permissions for this group to allow Full Control. The ACL should look like Figure 4.31. Do not close this dialog box yet.

    Figure 4.31. Modify the ACL so that it looks like this.

  10. From the Properties dialog box, click the Advanced button and click the Auditing tab. At the bottom of the Auditing Property sheet, clear the check box that reads Allow Inheritable Auditing Entries to Propagate to This Object. (When the confirmation dialog box appears, click Remove.)

  11. On the Auditing property sheet, click the Add button. When the Add User or Group dialog box appears, double-click Everyone and click OK. When the Audit Entry dialog box appears, choose to audit failed Delete attempts, as shown in Figure 4.32. Click OK until you return to the desktop.

    Figure 4.32. Watch for failed attempts to delete

  12. Log on as PolicyTest.

  13. Navigate to the AuditTest folder, locate the DELETEME.TXT file, and attempt to delete it. You will get an error message telling you that you cannot delete the file because access is denied.

  14. Log on as Administrator.

  15. From the Start menu, choose Programs, Administrative Tools (Common), Event Viewer.

  16. In the Event Viewer, select the Log menu and choose Security to view the security log.

  17. Locate the first audit failure (it has a lock beside it) and double-click the entry to open it. Note that the event detail indicates that the user PolicyTest tried to delete DELETEME.TXT and that operation failed (see Figure 4.33). Click Close to close the Event Detail. Close the Event Viewer.

    Figure 4.33. This event record indicates that PolicyTest tried to delete DELETME.TXT but was unsuccessful.

  18. Log on as Administrator.

4.4 Using the Security Configuration Editor to Perform a Security Audit and Configure a System.

This exercise walks you through the process of creating a security configuration template and database, auditing your domain controller, and making configuration changes. This exercise assumes that you have downloaded and installed the SCE and that you have created a security console as per the step by steps outlined in the chapter.

Estimated Time: 10 minutes.

  1. Start your security management console. (For information on how to set this up, consult Step by Step 4.11.)

  2. Create a customized security template by doing the following:

    1. Expand the tree Console Root, Security Configuration Manager, Configurations, C:\WINNT\Security\Templates.

    2. Right-click the template called basicdc4 and, from the menu that appears, choose Save As.

    3. In the Save As dialog box, type EnhancedDC4 and press Save.

    4. Expand EnhancedDC4, Account Policies, and click Password Policies. (This will bring up a set of properties in the right pane.)

    5. Locate the Attribute Passwords Must Meet Complexity Requirements option (in the right pane) and double-click it.

    6. In the Passwords Must Meet Complexity Requirements dialog box, select Enabled and click OK.

    7. Right-click EnhancedDC4, and choose Save in the menu that appears.

  3. Right-click Database and choose Import Configuration from the menu that appears

  4. In the Select Configuration to Import dialog box, double-click EnhancedDC4.

  5. Analyze the Current DC to see whether it conforms to the EnhancedDC4 template by doing the following:

    1. Right-click Database and choose Analyze System Now from the menu that appears.

    2. In the Perform Analysis dialog box, click OK to accept the default log file path.

    3. Expand the tree Database, Account Policy and click Password Policy. Note that, at least Passwords Must Meet Complexity Requirements has an "X" next to it. (It might be that other attributes do as well.)

  6. Modify the configuration database to ensure that appropriate settings are being made by doing the following:

    1. Expand Database, Local Policies, Security Options.

    2. Double-click Message Text for Users Attempting to Log On and, in the dialog box that opens, select the check box that reads Exclude from Future Configurations and Analysis. (This will prevent the configuration database from changing your current settings.)

    3. Repeat step B for Message Title for Users Attempting to Log On.

    4. Right-click Database and choose Save from the menu that appears.

  7. Configure your DC using the configuration database.

    1. Right-click Database and, from the menu that appears, choose Configure System Now.

    2. In the Configure System dialog box, click OK to accept the default log file path.

    3. When the configuration is complete, close the SCM console.

  8. Test the new Password restrictions by completing the following:

    1. At the desktop, press Ctrl+Alt+Del to bring up the security dialog box.

    2. In the Windows NT Security dialog box, click Change Password.

    3. In the Change Password dialog box, type in the current password ("password") and then change it to "aardvark". Although this password conforms to the account policy, it does not meet with the password complexity requirements, and so it is rejected.

    4. In the Change Password dialog box, type in the new password as "A1administrator". This password also is rejected because it contains the name of the current user.

    5. In the Change Password dialog box, type in the new password as "A1". This password will be accepted.

    6. In the Windows NT Security dialog box, click Cancel to exit to the desktop.

4.5 Establishing Trust Relationships.

This exercise walks you through the process of creating a one-way trust between two domains and then logging on using the account of one from a computer in the other. This exercise requires that you have two domains and a computer for each running simultaneously. In this exercise, the first (trusted) domain will be referred to as DOMZ and the second (trusting) will be referred to a DOMY. Change them to your domain names as you work through the exercise.

Estimated Time: 10 minutes.

  1. Configure the trusted domain (DOMZ) as follows:

    1. From an administrative workstation in DOMZ, open the User Manager for Domains.

    2. In the User Manager for Domains, open the menu Policies, Trust Relationships.

    3. In the Trust Relationships dialog box, click Add next to the Trusting Domains field.

    4. In the Add Trusting Domain dialog box, type DOMY in the Trusting Domain field, and click OK.

    5. In the Trust Relationships dialog box, click Close.

  2. Configure the trusting domain (DOMY) as follows:

    1. From an administrative workstation in DOMY, open the User Manager for Domains.

    2. In the User Manager for Domains, open the menu Policies, Trust Relationships.

    3. In the Trust Relationships dialog box, click Add next to the Trusted Domains field.

    4. In the Add Trusted Domain dialog box, type DOMZ in the Trusted Domain field and click OK.

    5. When the User Manager for Domains dialog box appears with the message indicating that the trust has been established, click OK to clear the box.

    6. In the Trust Relationships dialog box, click Close.

  3. Test the Trust relationship as follows:

    1. From an administrative workstation in DOMY, log off.

    2. B. -In the Logon Information dialog box, click the down arrow to the right of the Domain field and choose DOMZ.

    3. Log on as the administrator of DOMZ. The domain controller for DOMZ will be contacted to authenticate the logon (using passthrough authentication).

Review Questions

  1. Which two modes can the policy editor be operated in, and what are the functions of each mode?

  2. What is the purpose of the minimum password age in the account policy?

  3. What are the names for the policy files for Windows NT machines and non-NT machines respectively? Where do these files need to be stored to be applied properly?

  4. How do the GUI and command-line installations of the Security Configuration Editor differ from each other?

  5. What two steps need to be done to audit access to a specific file on a Windows NTFS partition?

  6. What utility do you use to examine entries for auditing?

  7. When configuring a trust relationship, which domain is trusted, the resource domain or the user domain?

  8. What domain models were identified in this chapter? Which is most desirable administratively?

Exam Questions

  1. You are the administrator of a Windows NT domain. You suspect that a user named John is attempting to gain access to folders that contain sensitive information. Which feature can you enable in Windows NT Server to create a log of attempted accesses?

    1. You can use the System Option in Control Panel to enable the auditing feature of Windows NT.

    2. You can use the Windows NT Accounting System.

    3. You can use Directory Logging.

    4. You can create an audit policy in User Manager for Domains and then enable auditing on the folder in question.

  2. You are the administrator in a domain with trusts configured as per Figure 4.34.

  3. Figure 4.34. This represents your domain model.

    Into which domain should you add new user accounts to ensure the most flexibility in logon and resource access?

    1. DOMA

    2. DOMB

    3. DOMC

    4. You cannot create accounts in this environment.

  4. You are the administrator in the XYZ domain. You have installed the command-line version of the SCM on a Windows NT 4.0 Server. You want to audit this machine using a security configuration database called XYZDC. Which of the following would perform that task?

    1. secedit /analyze /db XYZDC.sdb

    2. secedit /audit /db XYZDC.sdb

    3. secedit /analyze XYZDC.sdb

    4. secedit /audit XYZDC.sdb

  5. You are the administrator in an environment with both Windows 9x and Windows NT Workstation computers in it. You have just upgraded the operating system on Alexander's computer from Windows 95 to Window NT Workstation. However, the policy settings no longer seem to function, because the settings are now different than they were before the upgrade. How can you remedy this situation?

    1. Configure Alexander's account in User Manager for Domains to use a different policy.

    2. Modify NTCONFIG.POL so that its settings conform to CONFIG.POL.

    3. Modify CONFIG.POL so that its settings conform to NTCONFIG.POL

    4. Move the NTCONFIG.POL file from the Import folder to the Export folder.

  6. You are the network administrator of the BanksRUs domain. You have implemented an account policy that permanently locks a user account after three failed attempts. You are concerned about computer vandals purposely failing logon on the Administrator account to lock you out. How can you configure your system to avoid this problem?

    1. Ensure that the check box "Does Not Apply to Administrator Account" is selected in the Account Policy dialog box.

    2. Ensure that the check box "Lockouts Do Not Apply Locally to Administrator Account" is selected in the Account Policy dialog box.

    3. Ensure that the Registry setting HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lockout\ExemptAdministrator is set to 1.

    4. There is no need to configure for this.

  7. You are the new administrator of a multidomain structure. This structure consists of four domains configured with a complete trust model. Which of the following is true about your Windows NT domain environment? Choose 2.

    1. A complete trust model provides maximum flexibility for the placement of users and resources.

    2. A complete trust model provides you with an efficient structure that is easy to maintain.

    3. A complete trust model ensures that all users can log on from all locations.

    4. A complete trust model is preferred over a single master trust model because it is less complex.

  8. You are the administrator in a multidomain Windows NT 4.0 environment. You currently have a single master trust relationship with DOMZ being the trusted domain and DOMX and DOMY being the trusting domains. You have just changed the name of DOMY to DOMA and now your trust relationships are no longer working. Given the Trust Management dialog box shown in Figure 4.35, what are the first two steps you must take here to reestablish the trust?

  9. Figure 4.35. This is the content you currently see.

    1. Remove DOMY from the trusting list and add DOMA to the trusting list.

    2. Remove DOMY from the trusting list and add DOMA to the trusted list.

    3. Remove DOMX from the trusting list and remove DOMY from the trusting list.

    4. Remove DOMX and Y from the trusting list and add DOMA to the trusting list.

  10. You are a help desk support person in a large organization. You get a call from Susan and determine that, to fix her Windows NT Professional machine, you must make a Registry change. What is the best way for you to do this?

    1. Have Susan use Regedt32 to modify the Registry setting herself.

    2. Use System Policy Editor in Policy mode to create a policy for her machine. Copy this file to Susan's machine and have her save this change as NTCONFIG.POL and then restart the machine.

    3. Use the System Policy Editor in Registry mode to connect to her machine and make the Registry change remotely.

    4. Use the System Policy Editor in Policy mode to create a policy for her machine. Save this file on the PDC as NTCONFIG.POL and have Susan restart her computer.

  11. You are the administrator of a Windows NT network in a large manufacturing plant. You are finding that, lately, many users are staying past their shift to surf the Internet and check email (a practice that is beginning to cause resource shortages). You have configured valid logon times for your users, but they do not seem to force users to log off at their defined times. What must you do to fix this problem and make users log off when their valid logon time has expired.

    1. Select the "Forcibly Disconnect Remote Users from Server When Logon Hours Expire" in the Account Policy.

    2. Select the "Forcibly Disconnect Remote Users from Server When Logon Hours Expire" in the system policy.

    3. Select the "Forcibly Disconnect Report Users from the Server When Logon Hours Expire" in the account properties.

    4. Select the "Forcibly Disconnect Remote Users from Server When Logon Hours Expire" in the audit policy.

  12. You are creating a security model for your domain controllers using the SCM. You want to copy the template that most closely resembles your needs before you modify it. In your environment, although you want good security, when forced to choose, you want to err on the side of application functionality. Which of the following templates most closely resembles your configuration needs?

    1. basicdc.inf

    2. compdc.inf

    3. securdc4.inf

    4. hisecdc4.inf

  13. You are creating a system policy for the Crackers domain. Barney is a member of the Managers group and the Accountants group. In the system policy file, there are entries for Barney, Managers, and Accountants in addition to the default entry. Table 4.8 shows Barney's current configuration as well as the policy settings for Barney, Managers, Accountants, and Default.

  14. Table 4.8. Registry Settings for Barney and the Policy file.

    Barney Current

    Barney Policy

    Managers Policy

    Accountants Policy

    Default Policy

    Wallpaper: A.bmp

    Wallpaper: B.bmp

    Wallpaper: Ignore

    Wallpaper: C.bmp

    Wallpaper: Ignore

    Hide Drives: No

    Hide Drives: Ignore

    Hide Drives: Ignore

    Hide Drives: Ignore

    Hide Drives: Yes

    Remove Run: No

    Remove Run: Yes

    Remove Run: Yes

    Remove Run: Yes

    Remove Run: No


    1. Wallpaper: A.bmp; Hide Drives: No; Remove Run: No

    2. Wallpaper: C.bmp; Hide Drives: No; Remove Run: No

    3. Wallpaper: B.bmp; Hide Drives: No; Remove Run: Yes

    4. Wallpaper: C.bmp; Hide Drives: Yes; Remove Run: Yes

  15. You are the person responsible for file security in your IT department. To track access to sensitive information, you decided to turn on auditing for files and folders. Having turned on auditing for File and Object Access, you have been monitoring the security log but you do not see any audit activity, even after one of the files was deleted from the server. Which of the following must be done to complete your configuration of file auditing? Choose two.

    1. You must log on as Administrator.

    2. You must enable auditing in the system policy.

    3. You must convert the host file system from FAT to NTFS.

    4. You must enable auditing on the file objects that you want to monitor.

  16. To provide consistent configuration of all the servers in your domain, you have created a security configuration template called MYDC.INF. Which syntax do you use if you want to use the command-line SCE to configure a server with this database?

    1. secedit /configure /cfg MYDC.INF

    2. secedit /configure /db MYDC.INF

    3. secedit /configure /tmplt MYDC.INF

    4. secedit /configure /load MYDC.INF

  17. Mark is the administrator for a small board games manufacturer. Many of his 20 users are new to computers and have a difficult time understanding the need for security. Mark wants to set up an account policy to ensure that the users must change their passwords once a month and that they cannot reuse a password more than once a year. Which of the following will enable him to do that?

    1. Set the password history to 12 and set the maximum password age to 30.

    2. Set the password history to 12 and set the minimum password age to 30.

    3. Set the maximum password age to 30 and the minimum password age to 28.

    4. Set the password history to 12, the minimum password age to 28, and the maximum password age to 30.

  18. You are the administrator of a Windows NT environment consisting of three domains: DOMA, DOMB, and DOMC. These domains are configured with trust relationships: DOMA trusts DOMB, and DOMB trusts DOMC. Which of the following describes the relationship between DOMA and DOMC.

    1. DOMA trusts DOMC.

    2. DOMC trusts DOMA.

    3. DOMA trusts DOMC, and DOMC trusts DOMA.

    4. DOMA and DOMC do not have a relationship.

Answers to Review Questions

  1. The System Policy Editor can be operated in Policy mode and Registry mode. Policy mode is used when you want to create a policy file (for Windows NT it is NTCONFIG.POL). Registry mode is used when you want to edit Registry settings on the local machine or a remote machine. See the section "The Policy Editor."

  2. Minimum password age ensures that a password is kept for at least a minimum amount of time before it can be changed. This setting enables you to prevent users from changing their password back to a password they like (and always use) as soon as they have changed to a new one. See the section "Minimum Password Age."

  3. Policy files are either NTCONFIG.POL (for Windows NT machines) or CONFIG.POL (for non-NT machines). It is important that if you have Windows 9x or ME machines, you set up a CONFIG.POL file because the NTCONFIG.POL file will not work for them. For these files to correctly be accessed by client machines, they need to be placed in the \<winnt_root>\System32\Repl\Import\Scripts folder of the domain controller's boot partition. (This folder is shared as Netlogon$ on the DC.) See the section "Policy File Mode."

  4. The GUI and command-line installations of the SCM differ from each other in a number of ways. First (and most obviously) the GUI version is graphics-based whereas the command-line version is text-based. Second, the GUI version enables you to edit templates and databases, whereas the command-line version enables you only to create templates from databases but does not include a facility to edit either. See the section "Using the GUI Security Configuration Manager."

  5. To set up file (object) auditing on an NTFS partition, you must first configure object auditing in the audit policy and then you must set up auditing on the specific file (or files) that you want to audit. This file-level configuration consists of a list of accounts (user or group) that you want to watch and the events that you are interested in tracking. See the section "Enabling Auditing of Files and Folders."

  6. Audit entries are examined by looking at the security log using the Event Viewer. See the section "Monitoring the Security Log for Audit Entries."

  7. In a trust relationship, the trusted domain is the domain with the users, and the trusting domain is the domain with the resources. In domains that are not pure (resources and users in a single domain), a specific domain may be both trusted and trusting but each trust relationship must involve one or the other roles. See the section "Maintaining Trust Relationships."

  8. There were five domain models identified in this chapter: single domain, single master domain, multiple master domain, and complete trust domain. In terms of desirability, the model that is most desired is the one with the fewest trusts: the single-domain model. As the number of trusts increases, administrative overhead also increases, thus making the model less desirable. See the section "The Domain Models."

Answers to Exam Questions

  1. D. Using the domain audit policy, you can configure observation of object access. Then, by specifically setting up the folder(s) in question to be audited, you can track John's (or anyone else's) access to the folder. See the section "Audit Policy and Auditing Object Access."

  2. A. This diagram represents a single master model with multiple resource domains. Both DOMB and DOMC trust DOMA, which means that DOMA is the user domain. Therefore, you should add new users to DOMA to ensure that no additional trusts are needed. See the section "Maintaining Trust Relationships."

  3. A. In this example, the first important switch is /analyze (not /audit) which indicates that the security of a Windows NT machine should be evaluated against a configuration database. The second switch /db indicates the name of the security configuration database. (In the absence of this switch, the default dataset is used.) See the section "Using the Command-Line Security Configuration Editor."

  4. B. This problem arose because Alexander's computer is no longer using the CONFIG.POL file, because it is no longer a Windows 9x machine. To ensure that his settings remain the same, you need to modify NTCONFIG.POL to be the same as CONFIG.POL. See the section "System Policies and the Policy Editor."

  5. D. There is no need to change configurations to prevent the Administrator account from being locked out because it is exempt from the lockout policy. See the section "Account Policies."

  6. A, C. Although complete trusts are difficult to maintain (and therefore are undesirable), they do provide for maximum flexibility in placing users and resources in domains (anything can go anywhere). In addition, they also provide for any user logging on from anywhere. See the section "Maintaining Trust Relationships."

  7. A. Once a trust is broken, it must be removed to reestablish it. As a result, you must first remove the entry for DOMY from the trusting list and then add DOMA to the trusting list. This would be followed by opening the Trust Properties in DOMA and removing DOMZ and then adding DOMZ again. See the section "Maintaining Trust Relationships."

  8. C. The safest way for the Registry to be configured is for you to open Susan's Registry remotely from the System Policy Editor. It is not safe at all to teach Susan to edit the Registry herself, and creating policies for the purpose of changing the Registry settings for a single user is more work than is reasonable. See the section "System Policies and the Policy Editor."

  9. A. In the account policy, there is a check box labeled "Forcibly Disconnect Remote Users from Server When Logon Hours Expire." This check box ensures that users are kicked off of the server when their log off time arrives. See the section "Account Policies."

  10. B. The template designed with security in mind but which defers to program execution when forced to choose is COMPDC.INF. See the section "The Security Configuration Manager."

  11. A. When policies are applied to users, the specific configuration for an individual user is first applied. If there is no explicit configuration for a specific user, the groups are applied in order (including default). If there is an explicit configuration for a user, the groups (including default) are ignored. See the section "System Policies and the Policy Editor."

  12. C, D. To audit access to files or folders, the host partition must be formatted NTFS, you must enable auditing in the audit policy (a step not mentioned in the question), and you must enable auditing on the specific resource you want to audit. See the section "Enabling Auditing of Files and Folders."

  13. A. To configure a server using command-line SCM, use the switch /configure. To use a template (which gets loaded into a database before configuration happens), you must provide the name of the template using the /cfg switch. You would use the /db switch if you were providing a security configuration database rather than a template. See the section "Using the Command-Line Security Configuration Editor."

  14. D. To prevent a user from quickly changing between a couple of favorite passwords, you must configure both minimum and maximum ages. In addition, by specifying a password history of 12 you can ensure that the same password cannot be reused for 1 year. See the section "Account Policies."

  15. D. Because trusts in Widows NT are not transitive, there is no implicit relationship between domains just because they trust or are trusted by a third domain. As a result, there is no relationship between DOMA and DOMC. See the section "Maintaining Trust Relationships."

Suggested Readings and Resources

The following are some recommended readings in the area of analyzing, configuring, and monitoring basic security:

  1. MS Windows NT Server 4.0 Concepts and Planning Manual (Microsoft Press; also available on Microsoft TechNet CD/DVD)

    • Chapter 1 – Managing Windows NT Server Domains

    • Chapter 3 – Managing User Work Environments

  2. MS Windows NT Server 4.0 Networking Guide (Microsoft Press; also available in the Windows NT Server Resource Kit)

    • Chapter 2 – Network Security and Domain Planning

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020