Join Lisa Bock for an in-depth discussion in this video Understanding permission behavior, part of IT Security Foundations: Operating System Security.
- We've looked at different types of permissions…on folders and files, however special permissions…can implicate the way that the permission-behavior…responds to when someone tries to access a resource.…Now, I'm in Windows 7 Operating System,…and there is the folder Secret.…I'm going to right-click and I'll go to Properties,…and here's where we can see…some of those folder and file permissions…and some special permissions that we can modify.…I'll select Security and here I'll say Advanced,…but before we do, here are your permissions,…listed for Sherlock Holmes.…
Also, the system, Security Basics,…which is the name of this system and Administrators.…Now, when we look at permissions itself,…you see the two icons represents a group.…A single icon or head, represents a single user.…Now what I'm going to do is,…you can see that Sherlock Holmes,…we have there that he has listed,…he has some special permissions.…Let's select Advanced.…Now I'm going to take a look at Sherlock Holmes here,…and I'm going to ask to Change Permissions.…
Note: This training maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). See https://www.microsoft.com/learning/en-us/exam-98-367.aspx for more information.
- Apply security principles to create a strong password.
- Define RADIUS.
- Describe how permissions work.
- Review how to save and secure audit files.
- Explain hardening, updates, and patches.
- Identify ways to protect the email server.