diff --git a/windows/keep-secure/access-control.md b/windows/keep-secure/access-control.md index fd87c67e02..969bd01684 100644 --- a/windows/keep-secure/access-control.md +++ b/windows/keep-secure/access-control.md @@ -9,6 +9,9 @@ ms.pagetype: security # Access Control Overview +**Applies to** +- Windows 10 +- Windows Server 2016 This topic for the IT professional describes access control in Windows, which is the process of authorizing users, groups, and computers to access objects on the network or computer. Key concepts that make up access control are permissions, ownership of objects, inheritance of permissions, user rights, and object auditing. @@ -31,9 +34,9 @@ This content set contains: - [Dynamic Access Control Overview](dynamic-access-control.md) -- [Security Identifiers Technical Overview](security-identifiers.md) +- [Security identifiers](security-identifiers.md) -- [Security Principals Technical Overview](security-principals.md) +- [Security Principals](security-principals.md) - [Local Accounts](local-accounts.md) @@ -111,21 +114,19 @@ User rights grant specific privileges and sign-in rights to users and groups in User rights are different from permissions because user rights apply to user accounts, and permissions are associated with objects. Although user rights can apply to individual user accounts, user rights are best administered on a group account basis. There is no support in the access control user interface to grant user rights. However, user rights assignment can be administered through **Local Security Settings**. -For more information about user rights, see [User Rights Assignment](http://technet.microsoft.com/library/dn221963.aspx). +For more information about user rights, see [User Rights Assignment](user-rights-assignment.md). ## Object auditing With administrator's rights, you can audit users' successful or failed access to objects. You can select which object access to audit by using the access control user interface, but first you must enable the audit policy by selecting **Audit object access** under **Local Policies** in **Local Security Settings**. You can then view these security-related events in the Security log in Event Viewer. -For more information about auditing, see [Security Auditing Overview](security_auditing_overview_glbl). +For more information about auditing, see [Security Auditing Overview](security-auditing-overview.md). ## See also +- For more information about access control and authorization, see [Access Control and Authorization Overview](https://technet.microsoft.com/en-us/library/jj134043(v=ws.11).aspx). -- For more information about authorization and access control, see [Windows Security Collection](http://go.microsoft.com/fwlink/?LinkId=4565). - -- For information about authorization strategy, see [Designing a Resource Authorization Strategy](http://go.microsoft.com/fwlink/?LinkId=4734). diff --git a/windows/keep-secure/active-directory-accounts.md b/windows/keep-secure/active-directory-accounts.md index 8ac05bf562..8acc3ea048 100644 --- a/windows/keep-secure/active-directory-accounts.md +++ b/windows/keep-secure/active-directory-accounts.md @@ -9,6 +9,8 @@ ms.pagetype: security # Active Directory Accounts +**Applies to** +- Windows Server 2016 Windows Server operating systems are installed with default local accounts. In addition, you can create user accounts to meet the requirements of your organization. This reference topic for the IT professional describes the Windows Server default local accounts that are stored locally on the domain controller and are used in Active Directory. @@ -174,7 +176,7 @@ Because the Guest account can provide anonymous access, it is a security risk. I When the Guest account is required, an Administrator on the domain controller is required to enable the Guest account. The Guest account can be enabled without requiring a password, or it can be enabled with a strong password. The Administrator also grants restricted rights and permissions for the Guest account. To help prevent unauthorized access: -- Do not grant the Guest account the [Shut down the system](shut_down_the_system__technical_reference_security_considerations) user right. When a computer is shutting down or starting up, it is possible that a Guest user or anyone with local access, such as a malicious user, could gain unauthorized access to the computer. +- Do not grant the Guest account the [Shut down the system](shut-down-the-system.md) user right. When a computer is shutting down or starting up, it is possible that a Guest user or anyone with local access, such as a malicious user, could gain unauthorized access to the computer. - Do not provide the Guest account with the ability to view the event logs. After the Guest account is enabled, it is a best practice to monitor this account frequently to ensure that other users cannot use services and other resources, such as resources that were unintentionally left available by a previous user. @@ -343,21 +345,12 @@ For all account types (users, computers, and services) - NTLM authenticated connections are not affected -**Author's Note: **Need technical input for Note - -**Note** -Group Managed Service Accounts and Managed Service Accounts… - - - Because it is impossible to predict the specific errors that will occur for any given user in a production operating environment, you must assume all computers and users will be affected. **Important** Rebooting a computer is the only reliable way to recover functionality as this will cause both the computer account and user accounts to log back in again. Logging in again will request new TGTs that are valid with the new KRBTGT, correcting any KRBTGT related operational issues on that computer. - - -For information how to resolve issues and potential issues from a compromised KRBTGT account, see [Reset the KRBTGT account password](5f4bb6b7-7b20-4d16-b74d-9a59c1ba022b). + ### Read-only domain controllers and the KRBTGT account diff --git a/windows/keep-secure/active-directory-security-groups.md b/windows/keep-secure/active-directory-security-groups.md index b8d9434317..c3856faf75 100644 --- a/windows/keep-secure/active-directory-security-groups.md +++ b/windows/keep-secure/active-directory-security-groups.md @@ -9,6 +9,8 @@ ms.pagetype: security # Active Directory Security Groups +**Applies to** +- Windows Server 2016 This reference topic for the IT professional describes the default Active Directory security groups. @@ -48,7 +50,7 @@ Security groups can provide an efficient way to assign access to resources on yo For example, a user who is added to the Backup Operators group in Active Directory has the ability to back up and restore files and directories that are located on each domain controller in the domain. This is possible because, by default, the user rights **Backup files and directories** and **Restore files and directories** are automatically assigned to the Backup Operators group. Therefore, members of this group inherit the user rights that are assigned to that group. - You can use Group Policy to assign user rights to security groups to delegate specific tasks. For more information about using Group Policy, see [User Rights Assignment](user_rights_assignment_glbl). + You can use Group Policy to assign user rights to security groups to delegate specific tasks. For more information about using Group Policy, see [User Rights Assignment](user-rights-assignment.md). - Assign permissions to security groups for resources. @@ -627,7 +629,7 @@ This security group has not changed since Windows Server 2008.
Default User Rights
[Allow log on locally](allow_log_on_locally__technical_reference_security_considerations): SeInteractiveLogonRight
[Allow log on locally](allow-log-on-locally.md): SeInteractiveLogonRight
Default User Rights |
-[Adjust memory quotas for a process](adjust_memory_quotas_for_a_process__technical_reference_security_considerations): SeIncreaseQuotaPrivilege -[Access this computer from the network](access_this_computer_from_the_network__technical_reference_security_considerations): SeNetworkLogonRight -[Allow log on locally](allow_log_on_locally__technical_reference_security_considerations): SeInteractiveLogonRight -[Allow log on through Remote Desktop Services](allow_log_on_through_remote_desktop_services__technical_reference_security_considerations): SeRemoteInteractiveLogonRight -[Back up files and directories](back_up_files_and_directories__technical_reference_security_considerations): SeBackupPrivilege -[Bypass traverse checking](bypass_traverse_checking__technical_reference_management_security_considerations): SeChangeNotifyPrivilege -[Change the system time](change_the_system_time__technical_reference_security_considerations): SeSystemTimePrivilege -[Change the time zone](change_the_time_zone__technical_reference_security_considerations): SeTimeZonePrivilege -[Create a pagefile](create_a_pagefile__technical_reference_security_considerations): SeCreatePagefilePrivilege -[Create global objects](create_global_objects__technical_reference_security_considerations): SeCreateGlobalPrivilege -[Create symbolic links](create_symbolic_links__technical_reference_security_considerations): SeCreateSymbolicLinkPrivilege -[Debug programs](debug_programs__technical_reference_security_considerations): SeDebugPrivilege -[Enable computer and user accounts to be trusted for delegation](enable_computer_and_user_accounts_to_be_trusted_for_delegation__technical_reference_security_considerations): SeEnableDelegationPrivilege -[Force shutdown from a remote system](force_shutdown_from_a_remote_system__technical_reference_security_considerations): SeRemoteShutdownPrivilege -[Impersonate a client after authentication](impersonate_a_client_after_authentication__technical_reference_security_considerations): SeImpersonatePrivilege -[Increase scheduling priority](increase_scheduling_priority__technical_reference_security_considerations): SeIncreaseBasePriorityPrivilege -[Load and unload device drivers](load_and_unload_device_drivers__technical_reference_security_considerations): SeLoadDriverPrivilege -[Log on as a batch job](log_on_as_a_batch_job__technical_reference_security_considerations): SeBatchLogonRight -[Manage auditing and security log](manage_auditing_and_security_log__technical_reference_security_considerations): SeSecurityPrivilege -[Modify firmware environment values](modify_firmware_environment_values__technical_reference_security_considerations): SeSystemEnvironmentPrivilege -[Perform volume maintenance tasks](perform_volume_maintenance_tasks__technical_reference_security_considerations): SeManageVolumePrivilege -[Profile system performance](profile_system_performance__technical_reference_security_considerations): SeSystemProfilePrivilege -[Profile single process](profile_single_process__technical_reference_security_considerations): SeProfileSingleProcessPrivilege -[Remove computer from docking station](remove_computer_from_docking_station__technical_reference_security_considerations): SeUndockPrivilege -[Restore files and directories](restore_files_and_directories__technical_reference_security_considerations): SeRestorePrivilege -[Shut down the system](shut_down_the_system__technical_reference_security_considerations): SeShutdownPrivilege -[Take ownership of files or other objects](take_ownership_of_files_or_other_objects__technical_reference_security_considerations): SeTakeOwnershipPrivilege |
+[Adjust memory quotas for a process](adjust-memory-quotas-for-a-process.md): SeIncreaseQuotaPrivilege +[Access this computer from the network](access-this-computer-from-the-network.md): SeNetworkLogonRight +[Allow log on locally](allow-log-on-locally.md): SeInteractiveLogonRight +[Allow log on through Remote Desktop Services](allow-log-on-through-remote-desktop-services.md): SeRemoteInteractiveLogonRight +[Back up files and directories](back-up-files-and-directories.md): SeBackupPrivilege +[Bypass traverse checking](bypass-traverse-checking.md): SeChangeNotifyPrivilege +[Change the system time](change-the-system-time.md): SeSystemTimePrivilege +[Change the time zone](change-the-time-zone.md): SeTimeZonePrivilege +[Create a pagefile](create-a-pagefile.md): SeCreatePagefilePrivilege +[Create global objects](create-global-objects.md): SeCreateGlobalPrivilege +[Create symbolic links](create-symbolic-links.md): SeCreateSymbolicLinkPrivilege +[Debug programs](debug-programs.md): SeDebugPrivilege +[Enable computer and user accounts to be trusted for delegation](enable-computer-and-user-accounts-to-be-trusted-for-delegation.md): SeEnableDelegationPrivilege +[Force shutdown from a remote system](force-shutdown-from-a-remote-system.md): SeRemoteShutdownPrivilege +[Impersonate a client after authentication](impersonate-a-client-after-authentication.md): SeImpersonatePrivilege +[Increase scheduling priority](increase-scheduling-priority.md): SeIncreaseBasePriorityPrivilege +[Load and unload device drivers](load-and-unload-device-drivers.md): SeLoadDriverPrivilege +[Log on as a batch job](log-on-as-a-batch-job.md): SeBatchLogonRight +[Manage auditing and security log](manage-auditing-and-security-log.md): SeSecurityPrivilege +[Modify firmware environment values](modify-firmware-environment-values.md): SeSystemEnvironmentPrivilege +[Perform volume maintenance tasks](perform-volume-maintenance-tasks.md): SeManageVolumePrivilege +[Profile system performance](profile-system-performance.md): SeSystemProfilePrivilege +[Profile single process](profile-single-process.md): SeProfileSingleProcessPrivilege +[Remove computer from docking station](remove-computer-from-docking-station.md): SeUndockPrivilege +[Restore files and directories](restore-files-and-directories.md): SeRestorePrivilege +[Shut down the system](shut-down-the-system.md): SeShutdownPrivilege +[Take ownership of files or other objects](take-ownership-of-files-or-other-objects.md): SeTakeOwnershipPrivilege |
Default User Rights
[Allow log on locally](allow_log_on_locally__technical_reference_security_considerations): SeInteractiveLogonRight
-[Back up files and directories](back_up_files_and_directories__technical_reference_security_considerations): SeBackupPrivilege
-[Log on as a batch job](log_on_as_a_batch_job__technical_reference_security_considerations): SeBatchLogonRight
-[Restore files and directories](restore_files_and_directories__technical_reference_security_considerations): SeRestorePrivilege
-[Shut down the system](shut_down_the_system__technical_reference_security_considerations): SeShutdownPrivilege
[Allow log on locally](allow-log-on-locally.md): SeInteractiveLogonRight
+[Back up files and directories](back-up-files-and-directories.md): SeBackupPrivilege
+[Log on as a batch job](log-on-as-a-batch-job.md): SeBatchLogonRight
+[Restore files and directories](restore-files-and-directories.md): SeRestorePrivilege
+[Shut down the system](shut-down-the-system.md): SeShutdownPrivilege
Default User Rights
[Log on as a batch job](log_on_as_a_batch_job__technical_reference_security_considerations): SeBatchLogonRight
[Log on as a batch job](log-on-as-a-batch-job.md): SeBatchLogonRight
Default User Rights
[Access this computer from the network](access_this_computer_from_the_network__technical_reference_security_considerations): SeNetworkLogonRight
-[Bypass traverse checking](bypass_traverse_checking__technical_reference_management_security_considerations): SeChangeNotifyPrivilege
[Access this computer from the network](access-this-computer-from-the-network.md): SeNetworkLogonRight
+[Bypass traverse checking](bypass-traverse-checking.md): SeChangeNotifyPrivilege
Default User Rights
[Allow log on locally](allow_log_on_locally__technical_reference_security_considerations): SeInteractiveLogonRight
-[Load and unload device drivers](load_and_unload_device_drivers__technical_reference_security_considerations): SeLoadDriverPrivilege
-[Shut down the system](shut_down_the_system__technical_reference_security_considerations): SeShutdownPrivilege
[Allow log on locally](allow-log-on-locally.md): SeInteractiveLogonRight
+[Load and unload device drivers](load-and-unload-device-drivers.md): SeLoadDriverPrivilege
+[Shut down the system](shut-down-the-system.md): SeShutdownPrivilege
Default User Rights
[Allow log on locally](allow_log_on_locally__technical_reference_security_considerations): SeInteractiveLogonRight
-[Back up files and directories](back_up_files_and_directories__technical_reference_security_considerations): SeBackupPrivilege
-[Change the system time](change_the_system_time__technical_reference_security_considerations): SeSystemTimePrivilege
-[Change the time zone](change_the_time_zone__technical_reference_security_considerations): SeTimeZonePrivilege
-[Force shutdown from a remote system](force_shutdown_from_a_remote_system__technical_reference_security_considerations): SeRemoteShutdownPrivilege
-[Restore files and directories](restore_files_and_directories__technical_reference_security_considerations): Restore files and directories SeRestorePrivilege
-[Shut down the system](shut_down_the_system__technical_reference_security_considerations): SeShutdownPrivilege
[Allow log on locally](allow-log-on-locally.md): SeInteractiveLogonRight
+[Back up files and directories](back-up-files-and-directories.md): SeBackupPrivilege
+[Change the system time](change-the-system-time.md): SeSystemTimePrivilege
+[Change the time zone](change-the-time-zone.md): SeTimeZonePrivilege
+[Force shutdown from a remote system](force-shutdown-from-a-remote-system.md): SeRemoteShutdownPrivilege
+[Restore files and directories](restore-files-and-directories.md): Restore files and directories SeRestorePrivilege
+[Shut down the system](shut-down-the-system.md): SeShutdownPrivilege
1
Policy name
[User Account Control: Run all administrators in Admin Approval Mode](user_account_control_run_all_administrators_in_admin_approval_mode_technical_reference_mgmt_security_considerations)
[User Account Control: Run all administrators in Admin Approval Mode](user-account-control-run-all-administrators-in-admin-approval-mode.md)
Policy name
[User Account Control: Run all administrators in Admin Approval Mode](user_account_control_run_all_administrators_in_admin_approval_mode_technical_reference_mgmt_security_considerations)
[User Account Control: Run all administrators in Admin Approval Mode](user-account-control-run-all-administrators-in-admin-approval-mode.md)
1
Policy name
[Deny access to this computer from the network](deny_access_to_this_computer_from_the_network__technical_reference_security_considerations)
[Deny access to this computer from the network](deny-access-to-this-computer-from-the-network.md)
Policy name
[Deny log on through Remote Desktop Services](deny_log_on_through_remote_desktop_services__technical_reference_security_considerations)
+[Deny log on through Remote Desktop Services](deny-log-on-through-remote-desktop-services.md)
(Windows Server 2008 R2 and later.)
Deny logon through Terminal Services
(Windows Server 2008)
Product evaluation
[What's New for Managed Service Accounts](whats_new_for_managed_service_accounts_vil)
+[What's New for Managed Service Accounts](https://technet.microsoft.com/library/hh831451(v=ws.11).aspx)
[Managed Service Accounts Documentation for Windows 7 and Windows Server 2008 R2](http://technet.microsoft.com/library/ff641731.aspx)
[Service Accounts Step-by-Step Guide](http://technet.microsoft.com/library/dd548356.aspx)
-[Getting Started with Group Managed Service Accounts](getting_started_with_group_managed_service_accounts)
[Getting Started with Group Managed Service Accounts](https://technet.microsoft.com/library/jj128431(v=ws.11).aspx)
Deployment
Related technologies
[Security Principals Technical Overview](security-principals.md)
-[Active Directory Domain Services Overview](39dd9b55-2512-49d8-8927-a283697f0547)
[What's new in Active Directory Domain Services](https://technet.microsoft.com/library/mt163897.aspx)
Default User Rights
[Access this computer from the network](access_this_computer_from_the_network__technical_reference_security_considerations): SeNetworkLogonRight
-[Add workstations to domain](add_workstations_to_domain__technical_reference_security_considerations): SeMachineAccountPrivilege
-[Bypass traverse checking](bypass_traverse_checking__technical_reference_management_security_considerations): SeChangeNotifyPrivilege
[Access this computer from the network](access-this-computer-from-the-network.md): SeNetworkLogonRight
+[Add workstations to domain](add-workstations-to-domain.md): SeMachineAccountPrivilege
+[Bypass traverse checking](bypass-traverse-checking.md): SeChangeNotifyPrivilege
Default User Rights Assignment
[Access this computer from the network](access_this_computer_from_the_network__technical_reference_security_considerations): SeNetworkLogonRight
-[Allow log on locally](allow_log_on_locally__technical_reference_security_considerations): SeInteractiveLogonRight
[Access this computer from the network](access-this-computer-from-the-network.md): SeNetworkLogonRight
+[Allow log on locally](allow-log-on-locally.md): SeInteractiveLogonRight
Default User Rights
[Access this computer from the network](access_this_computer_from_the_network__technical_reference_security_considerations): SeNetworkLogonRight
-[Act as part of the operating system](act_as_part_of_the_operating_system__technical_reference_security_considerations): SeTcbPrivilege
-[Bypass traverse checking](bypass_traverse_checking__technical_reference_management_security_considerations): SeChangeNotifyPrivilege
[Access this computer from the network](access-this-computer-from-the-network.md): SeNetworkLogonRight
+[Act as part of the operating system](act-as-part-of-the-operating-system.md): SeTcbPrivilege
+[Bypass traverse checking](bypass-traverse-checking.md): SeChangeNotifyPrivilege
Default user rights
[Adjust memory quotas for a process](adjust_memory_quotas_for_a_process__technical_reference_security_considerations): SeIncreaseQuotaPrivilege
-[Bypass traverse checking](bypass_traverse_checking__technical_reference_management_security_considerations): SeChangeNotifyPrivilege
-[Change the system time](change_the_system_time__technical_reference_security_considerations): SeSystemtimePrivilege
-[Change the time zone](change_the_time_zone__technical_reference_security_considerations): SeTimeZonePrivilege
-[Create global objects](create_global_objects__technical_reference_security_considerations): SeCreateGlobalPrivilege
-[Generate security audits](generate_security_audits__technical_reference_security_considerations): SeAuditPrivilege
-[Impersonate a client after authentication](impersonate_a_client_after_authentication__technical_reference_security_considerations): SeImpersonatePrivilege
-[Replace a process level token](replace_a_process_level_token__technical_reference_security_considerations): SeAssignPrimaryTokenPrivilege
[Adjust memory quotas for a process](adjust-memory-quotas-for-a-process.md): SeIncreaseQuotaPrivilege
+[Bypass traverse checking](bypass-traverse-checking.md): SeChangeNotifyPrivilege
+[Change the system time](change-the-system-time.md): SeSystemtimePrivilege
+[Change the time zone](change-the-time-zone.md): SeTimeZonePrivilege
+[Create global objects](create-global-objects.md): SeCreateGlobalPrivilege
+[Generate security audits](generate-security-audits.md): SeAuditPrivilege
+[Impersonate a client after authentication](impersonate-a-client-after-authentication.md): SeImpersonatePrivilege
+[Replace a process level token](replace-a-process-level-token.md): SeAssignPrimaryTokenPrivilege
Default User Rights
[Adjust memory quotas for a process](adjust_memory_quotas_for_a_process__technical_reference_security_considerations): SeIncreaseQuotaPrivilege
-[Bypass traverse checking](bypass_traverse_checking__technical_reference_management_security_considerations): SeChangeNotifyPrivilege
-[Create global objects](create_global_objects__technical_reference_security_considerations): SeCreateGlobalPrivilege
-[Generate security audits](generate_security_audits__technical_reference_security_considerations): SeAuditPrivilege
-[Impersonate a client after authentication](impersonate_a_client_after_authentication__technical_reference_security_considerations): SeImpersonatePrivilege
-[Restore files and directories](restore_files_and_directories__technical_reference_security_considerations): SeAssignPrimaryTokenPrivilege
-[Replace a process level token](replace_a_process_level_token__technical_reference_security_considerations): SeAssignPrimaryTokenPrivilege
[Adjust memory quotas for a process](adjust-memory-quotas-for-a-process.md): SeIncreaseQuotaPrivilege
+[Bypass traverse checking](bypass-traverse-checking.md): SeChangeNotifyPrivilege
+[Create global objects](create-global-objects.md): SeCreateGlobalPrivilege
+[Generate security audits](generate-security-audits.md): SeAuditPrivilege
+[Impersonate a client after authentication](impersonate-a-client-after-authentication.md): SeImpersonatePrivilege
+[Restore files and directories](restore-files-and-directories.md): SeRestorePrivilege
+[Replace a process level token](replace-a-process-level-token.md): SeAssignPrimaryTokenPrivilege
Default User Rights
[Create global objects](create_global_objects__technical_reference_security_considerations): SeCreateGlobalPrivilege
-[Impersonate a client after authentication](impersonate_a_client_after_authentication__technical_reference_security_considerations): SeImpersonatePrivilege
[Create global objects](create-global-objects.md): SeCreateGlobalPrivilege
+[Impersonate a client after authentication](impersonate-a-client-after-authentication.md): SeImpersonatePrivilege
Default User Rights
[Bypass traverse checking](bypass_traverse_checking__technical_reference_management_security_considerations): SeChangeNotifyPrivilege
-[Increase a process working set](increase_a_process_working_set__technical_reference_security_considerations): SeIncreaseWorkingSetPrivilege
[Bypass traverse checking](bypass-traverse-checking.md): SeChangeNotifyPrivilege
+[Increase a process working set](increase-a-process-working-set.md): SeIncreaseWorkingSetPrivilege