Chapter 7. Advanced Techniques for Managing Access

In This Chapter

  • Understanding how Vista determines whether you have access to an object

  • Managing NT File System (NTFS) permissions through standard and advanced interfaces

  • Using the Regedit tool to secure your system

  • Defining audit and event log policies

  • Tips on defining object auditing for files, folders, Registry keys, and services

Microsoft has done its best to make Vista as secure as possible without compromising the ease of use that has made Windows so popular. One of the ways how Microsoft provides this ease of use is by not requiring you to understand all the complicated mechanisms for setting access control on your system. However, access control to different areas of Vista is a powerful tool that can help you secure your system — if you use it properly.

In this chapter, I discuss the fundamental concept of objects and their security mechanisms. Then, I show you how to protect your machine through NTFS permissions, the Registry, and auditing. A lot of information in this chapter is meant for those readers interested in the more advanced how‐and‐why of the Vista security system. This chapter goes into some advanced and complicated concepts that general readers might not be interested in.

Managing Object‐Level Security

An object is any item on the computer that you, a program, or Vista itself might try to access. Objects include (but are not be limited to) items such as files, folders, printers, shares, Registry keys, services, and ...

Get Windows Vista Security For Dummies® now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.