Professional Windows Server 1002003 Security A Technical Reference [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Professional Windows Server 1002003 Security A Technical Reference [Electronic resources] - نسخه متنی

Roberta Bragg

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید







Controlling Access to Registry Keys


Registry keys are permissioned by default and should not be modified without a thorough understanding of the impact of the modification. Registry keys are also added by applications and via configuration settings. Changing permissions on these keys may prevent applications from running.

Default Registry Permissions


Figure 5-27 displays registry permissions, and they are listed and described in Table 5-8. Alhough registry permission names are different from file permissions, they are similar in use. Two main permissions, Full Control and Read, are composed of special permissions. Special permissions can be explicitly assigned.

Figure 5-27. Registry permissions work similarly to file permissions but consist of a different permission set.

Table 5-8. Registry Permissions

Permission

Description

Full Control

Combination of all permissions

Read Query

Includes enumerate, notify, read control

Query Value

Read value of a key

Set Value

Create, delete a set registry value

Create Subkey

Add a key

Enumerate Subkeys

List subkeys

Notify

If present, can request change notifications for a registry key or its subkeys. This is useful, for example, in auditing.

Create Link

Used by the system to create links between registry paths

Delete

Delete key

Write DAC

Modify DACL, security permissions

Write Owner

Rights write, set value, create subkey

Read Control

Read permissions

Registry key permissions inheritance is similar to that described in the file system and can be blocked to protect permissions on sensitive subkeys, as shown in Figure 5-28.

Figure 5-28. Registry keys can also inherit or block inheritance of permissions.

[View full size image]

Applying Registry Permissions


Registry permissions, like object permissions for files and folders, may be applied directly using the object picker within the Registry Editor, by application through security templates, and by using Group Policy,

The regedt32.exe program is not part of Windows XP or Windows Server 2003. However, the features that differentiate it from regedit.exe, such as the ability to set security permissions, set audit permissions, and assign ownership of a key, have been added to regedit. An additional feature of regedit in Windows Server 2003 is the Favorites feature. As you work with registry keys, you can put your frequently used keys on the Favorites menu in regedit. Clicking the menu entry opens the stored subkey record.

To modify registry key permissions, follow these steps:


1.

Select the key.

2.

From the Edit menu, select Permissions, and then click Add.

3.

Use the Locations box of the Select Users, Computers or Groups dialog box to select the computer or domain of the users and groups to give permission to.

4.

Enter the group name and click Check Users to verify, or click the Advanced button and then the Find Now button to obtain a list of the users and groups. Then select the user or group to give permissions to.

5.

In the Permissions dialog box, assign the type of access to the selected user or group, or click the Advanced button, select the User, and click the Edit button to select special permissions.


Changing ownership of a registry key is a two-part process: First, an administrator or other user with ownership permission must assign ownership to a new user, and then the designated user must take ownership. The exception to this rule is that users with the Take Ownership permission may change ownership to their own account. To change ownership of a registry key, do the following:


1.

Select the key to change ownership for.

2.

Select Permissions from the Edit menu.

3.

Select Advanced, and then select the Owner tab.

4.

Select Change Owner to select the new owner.


The new owner completes the owner change process by using Take Ownership of the key to complete the process. This two-part process serves a distinct security role. It separates the process of giving ownership permission from the process of taking ownership. This is important because it prevents a malicious person with the Take Ownership right from taking ownership, giving themselves permissions, changing, viewing, or deleting data, and then giving ownership back to the original owner in an attempt to avoid detection or to avoid being held accountable for his act. Because the duties are separated, the attacker retains ownership of the object and cannot deny that he had the opportunity to use this capability to obtain information or to do some task that he is not authorized to do.


/ 194