DESKTOP

Windows 7 : Managing and Applying LGPOs (part 3) - Using Local Policies

9/20/2011 3:54:49 PM

3. Using Local Policies

Account policies are used to control logon procedures. When you want to control what a user can do after logging on, you use local policies. With local policies, you can implement auditing, specify user rights, and set security options.

To use local policies, first add the Local Computer Policy snap-in to the MMC. Then, from the MMC, follow this path to access the Local Policies folders: Local Computer Policy\Computer Configuration\Windows Settings\Security Settings\Local Policies. Figure 5 shows the three Local Policies folders: Audit Policy, User Rights Assignment, and Security Options. You will look at each of those in the following sections.

Figure 5. Accessing the Local Policies folders

3.1. Setting Audit Policies

Audit policies can be implemented to track the success or failure of specified user actions. You audit events that pertain to user management through the audit policies. By tracking certain events, you can create a history of specific tasks, such as user creation and successful or unsuccessful logon attempts. You can also identify security violations that arise when users attempt to access system management tasks for which they do not have permission.

Real World Scenario: Auditing Failed Attempts

As an IT manager, you have to make sure that you monitor failed attempts to access resources. A failed attempt to access a resource usually means that someone tried to access the resource and they were denied due to insufficient privileges.

Users who try to go to areas for which they do not have permission usually fall into two categories: hackers and people who are just curious to see what they can get away with. Both are very dangerous.

If a user is trying to access an area in which they do not belong, make sure to warn the user about the attacks. This is very common on a network and needs to be nipped in the bud immediately.


When you define an audit policy, you can choose to audit success or failure of specific events. The success of an event means that the task was successfully accomplished. The failure of an event means that the task was not successfully accomplished.

By default, auditing is not enabled, and it must be manually configured. Once auditing has been configured, you can see the results of the audit in the security log using the Event Viewer utility.

Figure 6 shows the audit policies, which are described in Table 3.

Figure 6. The audit policies

Table 3. Audit policy options
PolicyDescription
Audit Account Logon EventsTracks when a user logs on or logs off either their local machine or the domain (if domain auditing is enabled)
Audit Account ManagementTracks user and group account creation, deletion, and management actions, such as password changes
Audit Directory Service AccessTracks directory service accesses
Audit Logon EventsAudits events related to logon, such as running a logon script, accessing a roaming profile. And accessing a server
Audit Object AccessEnables auditing of access to files, folders, and printers
Audit Policy ChangeTracks any changes to the audit policies, trust policies, or user rights assignment policies
Audit Privilege UseTracks users exercising a user right
Audit Process TrackingTracks events such as activating a program, accessing an object, and exiting a process
Audit System EventsTracks system events such as shutting down or restarting the computer as well as events that relate to the security log in Event Viewer

After you set the Audit Object Access policy to enable auditing of object access, you must enable file auditing through NTFS security or print auditing through printer security.

Complete Exercise 5 to configure audit policies and view their results.

Exercise 5: Configuring Audit Policies

  1. Open the LGOP MMC shortcut.

  2. Expand the Local Computer Policy snap-in.

  3. Expand the folders as follows: Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy.

  4. Open the Audit Account Logon Events policy. Check the Success and Failure boxes. Click OK.

  5. Open the Audit Account Management policy. Check the Success and Failure boxes. Click OK.

  6. Log off of your Administrator account. Attempt to log back on as your Administrator account with an incorrect password. The logon should fail (because the password is incorrect).

  7. Log on as an administrator.

  8. Select Start, right-click Computer, and choose Manage to open Event Viewer.

  9. From Event Viewer, open the Security log by selecting Windows Logs => Security. You should see the audited events listed with a Task Category of Credential Validation.


In the next section, we will look at how to configure user rights on a Windows 7 machine.

3.2. Assigning User Rights

The user rights policies determine what rights a user or group has on the computer. User rights apply to the system. They are not the same as permissions, which apply to a specific object.

An example of a user right is the Back Up Files And Directories right. This right allows a user to back up files and folders even if the user does not have permissions that have been defined through NTFS file system permissions. The other user rights are similar because they deal with system access as opposed to resource access.

Figure 7 shows the user rights policies, which are described in Table 4.

Figure 7. The user rights policies

Table 4. User Rights Assignment Policy Options
RightDescription
Access Credential Manager As A Trusted CallerUsed to back up and restore Credential Manager.
Access This Computer From The NetworkAllows a user to access the computer from the network.
Act As Part Of The Operating SystemAllows low-level authentication services to authenticate as any user.
Add Workstations To DomainAllows a user to create a computer account on the domain.
Adjust Memory Quotas For A ProcessAllows you to configure how much memory can be used by a specific process.
Allow Log On LocallyAllows a user to log on at the physical computer.
Allow Log On Through Terminal ServicesGives a user permission to log on through Terminal Services. Does not affect Windows 2000 computers prior to SP2.
Back Up Files And DirectoriesAllows a user to back up all files and directories regardless of how the file and directory permissions have been set.
Bypass Traverse CheckingAllows a user to pass through and traverse the directory structure, even if that user does not have permissions to list the contents of the directory.
Change The System TimeAllows a user to change the internal time and date on the computer.
Change The Time ZoneAllows a user to change the time zone.
Create A PagefileAllows a user to create or change the size of a page file.
Create A Token ObjectAllows a process to create a token if the process uses an internal API to create the token.
Create Global ObjectsAllows a user to create global objects when connected using Terminal Server.
Create Permanent Shared ObjectsAllows a process to create directory objects through Object Manager.
Create Symbolic LinksAllows a user to create a symbolic link.
Debug ProgramsAllows a user to attach a debugging program to any process.
Deny Access To This Computer From The NetworkAllows you to deny specific users or groups access to this computer from the network. Overrides the Access This Computer From The Network policy for accounts present in both policies.
Deny Log On As A Batch JobAllows you to prevent specific users or groups from logging on as a batch file. Overrides the Log On As A Batch Job policy for accounts present in both policies.
Deny Log On As A ServiceAllows you to prevent specific users or groups from logging on as a service. Overrides the Log On As A Service policy for accounts present in both policies.
Deny Log On LocallyAllows you to deny specific users or groups access to the computer locally. Overrides the Log On Locally policy for accounts present in both policies.
Deny Log On Through Terminal ServicesSpecifies that a user is not able to log on through Terminal Services. Does not affect Windows 2000 computers prior to SP2.
Enable Computer And User Accounts To Be Trusted For DelegationAllows a user or group to set the Trusted For Delegation setting for a user or computer object.
Force Shutdown From A Remote SystemAllows the system to be shut down by a user at a remote location on the network.
Generate Security AuditsAllows a user, group, or process to make entries in the security log.
Impersonate A Client After AuthenticationEnables programs running on behalf of a user to impersonate a client.
Increase A Process Working SetAllows the size of a process working set to be increased.
Increase Scheduling PrioritySpecifies that a process can increase or decrease the priority that is assigned to another process.
Load And Unload Device DriversAllows user to dynamically unload and load device drivers. This right does not apply to Plug And Play drivers.
Lock Pages In MemoryAllows an account to create a process that runs only in physical RAM, preventing it from being paged.
Log On As A Batch JobAllows a process to log on to the system and run a file that contains one or more operating system commands.
Log On As A ServiceAllows a service to log on in order to run.
Manage Auditing And Security LogAllows a user to enable object access auditing for files and other Active Directory objects. This right does not allow a user to enable general object access auditing in the Local Security Policy.
Modify An Object LabelAllows a user to change the integrity level of files, folders, or other objects.
Modify Firmware Environment VariablesAllows a user to install or upgrade Windows. It also allows a user or process to modify the firmware environment variables stored in NVRAM of nonx86-based computers. This right does not affect the modification of system environment variables or user environment variables.
Perform Volume Maintenance TasksAllows a user to perform volume maintenance tasks such as defragmentation and error checking.
Profile Single ProcessAllows a user to monitor nonsystem processes through performance-monitoring tools.
Profile System PerformanceAllows a user to monitor system processes through performance-monitoring tools.
Remove Computer From Docking StationAllows a user to undock a laptop through the Windows 7 user interface.
Replace a Process Level TokenAllows a process, such as Task Scheduler, to call an API to start another service.
Restore Files And DirectoriesAllows a user to restore files and directories regardless of file and directory permissions.
Shut Down The SystemAllows a user to shut down the Windows 7 computer locally.
Synchronize Directory Service DataAllows a user to synchronize Active Directory data.
Take Ownership Of Files or Other ObjectsAllows a user to take ownership of system objects, such as files, folders, pr inters, and processes.

In Exercise 6, you'll apply a user rights policy.

Exercise 6: Applying User Rights

  1. Open the LGOP MMC shortcut.

  2. Expand the Local Computer Policy snap-in.

  3. Expand the folders as follows: Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment.

  4. Open the Log On As A Service user right.

  5. Click the Add User Or Group button. The Select Users Or Groups dialog box appears.

  6. Click the Advanced button, and then select Find Now.

  7. Select a user. Click OK.

  8. Click OK in the Select Users Or Groups dialog box.

  9. In the Log On As A Service Properties dialog box, click OK.


In the next section, we will look at how users can install resources on Windows 7 without being an administrator by using User Account Control.

Other  
  •  Windows 7 : Managing and Applying LGPOs (part 2) - Using Account Policies
  •  Windows 7 : Managing and Applying LGPOs (part 1) - Configuring Local Security Policies
  •  Windows 7 : Managing Security
  •  Windows 7 : Creating and Managing Groups
  •  Windows 7 : Managing User Properties
  •  Windows 7 : Working with User Accounts (part 2)
  •  Windows 7 : Working with User Accounts (part 1)
  •  Windows Server : Designing a Software Update Infrastructure (part 2)
  •  Windows Server : Designing a Software Update Infrastructure (part 1)
  •  Securing Windows Server 2008 in the Branch Office
  •  Windows 7 : Configuring Network Connectivity - Configuring DirectAccess
  •  Windows 7 : Configuring Network Connectivity - Understanding BranchCache
  •  Windows 7 : Configuring Remote Management
  •  Configuring Windows 7 on a Network
  •  Windows Server : Branch Office Deployment - Branch Office Services (part 2)
  •  Windows Server : Branch Office Deployment - Branch Office Services (part 1)
  •  Windows Server : Planning Application Virtualization
  •  Windows 7 : Understanding TCP/IP (part 2)
  •  Windows 7 : Understanding TCP/IP (part 1) - Basics of IP Addressing and Configuration
  •  Windows Server 2008 : Planning Operating System Virtualization (part 2) - Planning for Server Consolidation
  •  
    Top 10
    Silverlight Recipes : Managing XAML Resources
    Windows Server 2008: Improvements for Thin Client Remote Desktop Services
    Xen Virtualization : Installing Xen from Binary Packages
    Windows Server 2008 R2 monitoring and troubleshooting : Event Viewer - Configuring event-based tasks & Setting up event log forwarding
    Accessing Silverlight Content with JavaScript
    SharePoint 2010 : Securing SharePoint’s SQL Server Installation
    Programming with DirectX : Sound in DirectX - XACT3 (part 2) - XACT3 Demo
    SQL Server 2008 : Explaining Advanced Query Techniques - Controlling Execution Plans (part 1)
    Remote Administration of Exchange Server 2010 Servers : RDP with Exchange Server 2010 (part 2)
    Android Security : Files and Preferences
    Most View
    Active Directory Federation Services (ADFS)
    Improvements in Server Roles in Windows Server 2008 R2
    Creating and Managing Views in SQL Server 2008 : Partitioned Views
    Migrating from Legacy SharePoint to SharePoint Server 2010 : Formulating a Migration Strategy
    SQL Server 2008 : Service Broker - Message Types
    Administrative Improvements with Windows Server 2008 R2
    Microsoft SQL Server 2005 : Report Definition and Design (part 2) - Business Intelligence Development Studio
    ASP.NET AJAX : Partial Refreshes (part 3) - Triggers
    Documenting an Exchange Server 2010 Environment : Benefits of Documentation
    The SQL Programming Language : Complex Queries and Join Queries (part 1)
    SQL Server 2008 : Audit-Related Startup and Shutdown Problems
    Vectors in WPF
    Silverlight : Make Your Application Run out of the Browser
    Multifaceted Tests : Attempting PHP Include File Injection Interactively & Creating Decompression Bombs
    Securing SharePoint Sites with Forefront TMG 2010 (part 2) - Creating a SharePoint Publishing Rule Using Forefront TMG
    Protecting SQL Server Data : SCHEMA ARCHITECTURE STRATEGIES - Using Views
    Getting the Most Out of the Microsoft Outlook Client : Deploying Outlook 2007
    Windows Phone 7 Development : Internationalization - Using Resource Files to Localize Content
    Defensive Database Programming with SQL Server : Using TRY...CATCH blocks to Handle Errors
    Android Security : Services