Wednesday, April 1, 2009

NTFS Permissions

Here is a piece detailing my methodology in dealing with users and network file space. I use NTFS permissions, which is a file security schema implemented in the NTFS file system from Microsoft.

Some of the key rules of NTFS permissions: There are six standard rules for folders, five for files. These standard permissions control general aspects of file security. There are also 14 special permissions which allow a much more detailed control of access and security. Every permission can be explicitly allowed or denied, or they can be inherited from a parent object. Deny can also be implied by the absence of explicit or inherited allow permissions. Permissions are assigned via the presence of objects in an Access Control List(ACL), but permissions belong to the object to which they are assigned, not to the user or group in the ACL.

I use Shares, NTFS Permissions, and User Groups in concert to provide users ever-expanding rings of file access. I begin with the premise that users need, at a minimum, the following areas of file storage: First, they need a private space to keep their work that is in progress, confidential, or other things that are generally not to be shared with others. Second, users who work together need a file space that helps them to work together. Third, users who work together across departmental boundaries also need a shared space to help them get things done.

To accomplish my three levels of access, I create the following folder structure: In my data volume (which is created separate from my operating system volume) I will create a folder called “user data” or some similarly descriptive name that gives me a clue as to the content of that folder. This folder becomes the root of the user share structure. Next, inside the root folder I create a folder called Users. Inside Users I create a folder for every employee's user name. These folders inside Users are the private folders for the employees, also known as “Home Directory” or “Home Drive” and often assigned the drive letter H:(for “Home”). Usually they are shared as jdoe$. The trailing dollar sign makes it a hidden share, so that people poking around the file system will not see the folder if they are coming across the network and don't have access to a folder higher up in the tree. That completes the personal folder.

Next, back up in User Data, I'll create a folder called “Departments.” In that folder I'll create sub-folders like “Finance,” “Marketing,” “Development,” “Human Resources,” and so on. This will give the users in the same department a place to store files that they are sharing with departmental co-workers. I give the department's users full control inside their department shares so that they can create new folder structures inside that are helpful for them.

Next, returning again to User Data, I create a folder called “Public.” The public folder is available to all, and all users have full control. It is akin to the wild west of file systems, but it serves a valuable purpose in allowing users from different departments who may be working together on a project a collaborative space. Additionally, I can create sub folders in Public and block inheritance. This allows me to create, for example, a folder called “HR Info” in which the HR users have full control and all others have read only. HR can then deposit files like the employee handbook or benefits information in that folder and all users can read it. This saves me from having to create too many folders that get mapped as drives.

All employees are trained in the structure of the folder tree and the rights that they and others have throughout. It is made clear to them who can see what, where, and they are also assured that there is no such thing as “privacy” on corporate file servers or computers. We give you a “private” space, but it's always available to the system administrator at the command of the appropriate management staff. It may be called private, but nothing should be in there that would be against any company policy, civil law, or reasonable moral standard.

Once my folders are in place, I go on to create groups for every department. I place the appropriate users in each of the departmental groups, and then I set the NTFS permissions on the Department sub folders by group. The rights to Public are assigned to the “Everyone” group, and rights to the user folders are assigned per user.

At this point you may be saying to yourself “That's a lot of people with full control!” I agree, it is, and the concern over files being inadvertently or maliciously deleted is a legitimate one. For this reason I have implemented other file-security solutions so that I may recover any file in moments. It's the best of both worlds.

There are special circumstances that will occur. For example, let's say a share is desired for the department heads only. I would create a “Department Heads” folder in the Departments sub folder. I would then create a group and give access rights to that group, then finally add the heads to that group.

The way I provide access to the various shares is through a Visual Basic login script. The script uses variables to make it simple. When a user logs on, the script runs and finds the user name and all groups that the user belongs to. With this information it maps network drives on the workstation. H: is the private share, I: is the department share, J: is public, and special folders follow if the user is a member of other groups.

Here is a little graphic to illustrate the folder structure. Hopefully it comes through ok.


D:
|--->User Data - (not shared, no permissions)
|
|------->Users - (not shared, no permission)
| |-------->jdoe$ - (hidden share, permissions only for Jane Doe)
| |-------->tjones$ - (hidden share, permissions only for Tom Jones)
|
|------->Departments - (not shared, no permissions)
| |-------->Finance - (shared, permissions for the Finance group)
| |-------->Marketing - (shared, permissions for the Marketing group)
|
|------->Public - (shared, permissions for the Everyone group)

Wednesday, March 25, 2009

April Fools!

April 1 is the day for pranks and practical jokes. There is, however, a plot afoot that may or may not be quite a bit more troublesome than your average April Fool!

The latest version of a worm out there called Conficker or Downadup, is sceduled to do something on 4/1/2009. What it's going to do is anyone's guess. It could be harmless, or not.

Conficker is a very complex and sophisticated worm. It's latest version (C) has stealth capabilities, and it disables Windows Update and the Windows Security Center as part of its behavior.

There are ways to beat this bad-boy. First, many antivirus manufacturers say they can still detect it, so make sure your A/V is up to date and do a scan of your entire system. Maybe try it in safe mode.

Also, the way Conficker knows what to do is by "calling home" to several algorithmically determined web servers. Since the web addresses are generated by the same algorithm, the professionals in the IT world have identified all of them from the A and B versions. These bad DNS names can then be blocked at the DNS level. (DNS is like the phone book of the Internet. It's where your computer looks up the numerical address for a human-friendly computer name.). OpenDNS.com is a DNS provider that will block Conficker's known destinations, so configuring your computer to use this free DNS service is a great step in defeating the worm.

Of course, it wouldn't be a bad idea to backup your personal files and documents, etc. Put them on removable media like a Flash drive or USB hard drive, and put it somewhere safe.

Start doing backups regularly if you don't already, and do it before the first.

Links:
PC Magazine article
CNN Story
Wikipedia Article

Wednesday, March 18, 2009

A Couple Vista Features

A couple of features stand out in my mind as great things in Windows Vista.

First is Windows Defender. While technically not a Vista-only feature since Microsoft has released versions for XP and Server 2003, it made it’s debut on Vista, and is included as a part of Vista. The versions for XP and Server 2003 are available as a free download.



Why Defender? Well, in the immortal words of Tony the Tiger, it’s great! Having this kind of security embedded into the OS is a good thing. The average user does not usually know when they are infecting themselves with some malicious software (malware). Sure, they’ve heard the term, but they probably aren’t savvy to the little tip-offs they encounter that should be warning signals. Instead, they end up clicking something that invites malware in to their PC. With Windows Defender, the OS will detect it and stop it, on the fly.

Windows Defender is peer-driven. That means that a large community of users is constantly contributing in some way to keep it up to date. The more eyes you have on a problem, the better equipped you are to solve it, so having users from every walk of life contributing their experiences to the project ensures comprehensive coverage.

For advanced users there is a “Software Explorer” in the Tools menu that allows you to view details about the software running on your system grouped by various categories. From the Software Explorer you can disable or enable programs, end processes and remove software.

Cnet called Defender "perhaps the best free antispyware application we looked at this year" when they reviewed it in December of 2007. It’s one of several great tools you should have in your anti-spyware/malware arsenal.

The other feature I really like about Vista is ReadyBoost. RAM is the component in a PC that most directly affects Windows performance. With ReadyBoost, the non-technical user can essentially dramatically expand the available RAM in their PC without taking covers off and messing with memory modules. All they need to do is pick up a cheap USB flash drive or an SD card and insert it into the computer. In the properties of the device there is a tab for ReadyBoost. Click the “Use this” option and you’re on your way to a perceptible improvement in system performance. You can never have too much RAM!

These two features are just a part of what makes Windows Vista a worthy operating system. The continuance of these feature into Windows 7 will make that OS even more truly impressive.

Friday, March 13, 2009

Debunking the Hype/Myth

Remember the PC vs. Mac commercial that had Mac say "Hi PC" and a third guy in a Secret Service suit said to PC "Mac issued a greeting; accept or reject?" It went on and on, every step of the dialogue filtered through the security thug.

It was a funny commercial, and it made a lot of sense if you were frustrated by that feature of windows.

But if you understand what's going on in Vista with that pop-up message, you might have more appreciation for it.

The Usser Account Control feature is what is responsible for those messages. When you start functions that could change your system, you are asked by the UAC if you are sure you want to do this.

A natural response is to get frustrated and huff "I clicked it! Of course I want to continue."

But everyone knows about "malware," right? It is the term to refer to malicious software written to take advantage of you and your system. And of course Spyware, which reports on your activities without your knowledge, and then there are viruses, trojan horses, etc.

Well these nefarious programs don't pop up a nice splash screen when they start with a title and a short description. You never see the "Welcome to the I LOVE YOU Trojan" screen. They just start up and run as quietly as possible, stealing your passwords, mailing screenshots of your bank account info back to the hacker who wrote it, taking part in Denial of Service attacks against other machines.

Enter the UAC. If one of these programs starts up and tries to do it's thing in Vista, the UAC will stop *everything* and ask you "Hey, this program is trying to run and change some of your system settings. Do you really want to allow that?"

Oh...that's what that's for. Doesn't seem like such a bad thing then, eh?

Yeah, it was marketing genius playing upon the ignorance of the common man. But once you understand, it looks a little different.

Tuesday, March 3, 2009

File Sharing

There are different kinds of file sharing. One is where computers on the same network agree to allow each other access to certain publicized resources via domain or workgroup membership and trust.

Another kind of file sharing is what's commonly known as Peer to Peer File Sharing. First made popular by Napster, there are many variations on the theme, including Limewire, Kazaa, and others.

In the news lately, sensitive documentation of the President's helicopter was found on a computer in Iran. Whooops! It happened because the computer that originally held the documents also ran peer-to-peer file sharing software.

It just goes to show you how dangerous this kind of thing is. If you are not extremely careful about how you set it up and run it, you are opening your computer up to anyone. This could have devastating effects on your personal and business life.

I hate this type of software. I never run it at home, and strive to eradicate all traces of it on any network that is my responsibility.

I also refuse to run "legitimate" versions like NBC's new HD program downloader NBC Direct. If you read the terms, you will see that it is a peer-to-peer program. You aren't downloading from NBC, you are downloading from other users who have the software. Then when you have your copy, others download from you. Without authentication, without access controls.

So be careful. You don't want your classified documents in the wrong hands.

Saturday, February 14, 2009

For Your Eyes Only!



Do you have any data on your computer that is private? Any social security numbers? Tax returns? Medical histories? Customer accounts? Credit Card numbers? Sales pitches? New product details?

Anything sensitive? Anything that could risk your identity if compromised? Anything that could cost your business or your customers if compromised.

That's a pretty wide swath of data, and chances are good that yes, there is some "classified" data on your PC.

Does it need to be protected? That's a good question. For laptop users the answer is easy: Yes. Your machine is light and portable and is frequently out and about, and could be picked up and carried off without much trouble. Then someone else has all your data. Whether or not you use a login ID and password is meaningless. That is not data protection. Neither are the password options in MS Office to "protect" files.

What if you use a desktop computer that you don't take on the subway with you? I suppose it depends on personal comfort levels, how many other people can physically access that computer, who those people are, if the computer is on a network/the Internet, etc. There are a lot of considerations, but I lean towards Yes in all cases. Better safe than sorry, and all that.

So how can you protect your sensitive data?

Encryption. It's easy and free.

En-what?

Encryption. It takes the contents of your files and jumbles them up using complicated mathematical algorithms. The best kind of encryption requires complex keys in addition to passwords to provide nearly unbeatable protection. I say "nearly unbeatable" because I don't know what kind of power the Gov't has these days, but for "normal" folk it would take a hundred years to break good encryption using the best computing equipment commercially available.

So how can you do it? There are options available. You can encrypt files, containers of files, or the entire hard disk.

For those laptop folks, I suggest encrypting the entire hard disk. This way if your laptop "walks off," it takes more than just putting the disk in another machine to read it. Your machine can only be useful if the disk is formatted and the existing data erased. It doesn't make your machine less prone to theft, but it does protect the data.

If you don't want or don't think you need to encrypt the entire hard drive, you can encrypt individual files, or create "containers" on the disk, the contents of which are encrypted. I prefer the container because all I need to remember is the one password to open the container, and not one password for each file.

My top two for encryption are Cypherix LE, and Truecrypt.

With Cypherix, you create a "vault" on the drive or USB memory stick, etc. This vault is mounted like a disk drive and you now have on the fly drag-and-drop encryption. Just take that file, drag it to your vault, and drop it in there. As soon as you unload the vault, it is as good as gone. Cypherix also allows you to create encrypted emails in a simple manner. Basically an encrypted self-extracting file is created and attached to the email. No one can read the contents without the password. There is a 25Mb size restriction on your vault, so if you have a lot of data, you may need to make multiple vaults on your media.

Truecrypt is a much more complex, much more comprehensive product. It offers the same container-style operation of cypherix, but will also do complete hard disk encryption, hidden volumes, and even hidden operating systems. Just reading the documentation is fascinating...ok, maybe just for nerdy types. If you are a laptop user or desire an offering with more options, Truecrypt may be the one to look at.

And lastly...do not go through the trouble of encrypting your data and then write the password down somewhere. That defeats the whole purpose. As a computer professional for 18 years, when I arrive to support a user and I hit a password challenge and the user is not there, the first thing I do is look under the keyboard. Then I read the sticky-notes on the monitor, then the ones on the vertical surfaces of the desk. I find a lot of passwords that way.

As always, feel free to leave comments and questions, or contact me at scott at schreibnet dot com for advice and/or help with encryption and any other issues.

Friday, February 13, 2009

Thinking About a New PC?

Hold Off!

The little IT Birdies are chirping. The scuttlebut is that starting on or around June 1, if you buy a new PC with Windows Vista, you will be entitled to a free upgrade to Windows 7. This will be in effect until January 31, 2010, according to rumor.


So if you can, hold off until this announcement is made official. You'll get free "Upgrade Assurance."