PLEASE USE WINDOWS SERVER 2016 AND PROVIDE DETAILED STEPS ALONG WITH SCREENSHOTS FOR EACH STEP! (LITERALLY EACH STEP!!)
note** if you don't have windows server 2016, use virtual box and download the ISO image for the datacenter edition
1. How to assign NTFS permissions
2. How to Audit NTFS permissions
3. How to create shares
4. How to share permissions
how to Assign NTFS permissions
click on the drive and click on property then you will see the properties menu in which you will find the below screenshot from there go to security and click on advanced to set the properties of each users.
how to Create Shares
create a folder which you want to share , click on its properties by right click on that and click share.
how to Share Permissions
here in advanced sharing you will find the permissions tab click on that to set to whom you want to share the folder with and with what rights like read write execute and full permission .
How to Audit NTFS permissions
*******************************************
Step 1: Open Local Security Policy
Go to “Administrative Tools” and open “Local security policy”.
Step 2: Enable Audit Object Access policy.
In “Local Security Policy”, click “Local Policies”, and click “Audit Policy”. List of all Local Security Policies is displayed in the right pane.
In the policy list, double click “Audit object access” to open “Properties” window.
Step 3: Track permission changes
Next, locate the folders whose permission changes have to be tracked. Right-click on it and select “Properties” from the context menu. In “Properties” window, switch to “Security Tab”.
Click “Advanced” to access the advanced settings
Step 4: Add a new auditing entry
In “Advanced Security Settings”, go to “Auditing” tab.
Click “Add” to add a new auditing entry. “Auditing entry… ” window appears on the screen.
Enter the following information in this dialog box:
Principal: Click on “Select a Principal” link to select users for auditing. You can also select “Everyone”, for that type “Everyone” in the text box and click “Check
Click “OK”. It takes you back to “Auditing Entry” window.
if you have any doubt then please ask me without any hesitation in the comment section below , if you like my answer then please thumbs up for the answer , before giving thumbs down please discuss the question it may possible that we may understand the question different way and we can edit and change the answers if you argue, thanks :)
PLEASE USE WINDOWS SERVER 2016 AND PROVIDE DETAILED STEPS ALONG WITH SCREENSHOTS FOR EACH STEP! (LITERALLY...
Provide screenshots and detail instructions of how to do the following things in Windows Sever 2016 1. How to create an MMC console 2. How to create user and groups 3. How to add users to groups 4. How to configure NTFS permissions
Windows 2016 Server supports the use of Hyper-V. Hyper-V is a role you can install to create what are known as virtual machines or VM’s. What do you think are some interesting kinds of things a VM can do to allow you to expand the functionality of your network? Be as detailed in your response as you can. At the same time, what are some useful ways you can see that VMs could be used to reduce the cost of...
Topic: Organic Chemistry Please provide step by step solutions to each problem along with a brief explanation as to why you picked your answer. To whoever helps me, please know that I am stuggeling so hard with this class. I'm not smart like everyone else, so please (if you can) be detailed and if you have time, please try to explain to me why you did what you did. I just don't get this subject, it seems so random and...
The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...
I need help with my very last assignment of this term PLEASE!!, and here are the instructions: After reading Chapter Two, “Keys to Successful IT Governance,” from Roger Kroft and Guy Scalzi’s book entitled, IT Governance in Hospitals and Health Systems, please refer to the following assignment instructions below. This chapter consists of interviews with executives identifying mistakes that are made when governing healthcare information technology (IT). The chapter is broken down into subheadings listing areas of importance to understand...