Intelligent CIO Middle East Issue 07 | Page 90

FINAL WORD
THE MOST COMPLEX CONCEPT WITH REPORTING ON GROUPS IS TO GET THE RECURSIVE GROUP MEMBERS , I . E ., THE USERS WHO ARE LOCATED IN NESTED GROUPS OF THE MAIN GROUP AND WHO NEED TO BE REPORTED AS WELL . THERE ARE PLENTY OF REPORTING TOOLS THAT CAN GET GROUP MEMBERSHIP RECURSIVELY , THOUGH . POWERSHELL BY MICROSOFT AND ADMANAGER PLUS BY MANAGEENGINE ARE TWO OPTIONS

There are many ways to grant privileges in a Windows environment . Granting privileges is rather easy . Reporting and analysing the current privileged access , however , can be a bit harder as there is no centralised location that shows an administrator or auditor the current privileged access . Understanding the different technologies and features that grant privileged access is the first step . Then , for each area where privileges can be granted , there are five steps that should be taken to ensure ongoing privileged access security . Those steps include :

Reporting on the current settings ;
Analysing the settings to understand who has privileged access ;
Configuring the correct privileged access ;
Monitoring for changes to privileged access ;
Alerting , in real time , for key privileged access changes
The technologies and features in a Windows environment that grant privileged access include :
Group membership
User rights
Delegation
Access control lists or permissions
Group membership get the recursive group members , i . e ., the users who are located in nested groups of the main group and who need to be reported as well .
There are plenty of reporting tools that can get group membership recursively , though . PowerShell by Microsoft and ADManager Plus by ManageEngine are two options .
User rights User rights control global access over different aspects of a domain controller , server , or workstation . User rights are configured using Group Policy , giving granular control of each computer individually . Therefore , each computer could have a unique set of user rights , making the reporting and configuration of these settings difficult and time consuming .
Every Windows computer comes with a built-in tool ,” secpol . msc ”, which can report the current user rights on each computer . The tool must be run locally , but it is extremely powerful and gives precise configurations . Since each user right provides some level of privilege over the computer , each and every user right should be evaluated and configured to meet the minimum requirements for server access .
Access control lists Controlling access to files and folders is essential for assuring the security of data within any organisation . You need to properly configure the access control lists for your key data and ensure that they only provide access to the appropriate people . The wrong privileges granted to a file or folder could severely hurt , or even destroy , a company .
DEREK MELBER
Technical Evangelist at ManageEngine
Depending on how the group is configured in the environment , it can have the highest level of privileges or just a few privileges . For example , the Domain Admins group has nearly the highest level of privileges in the entire Active Directory domain . Just adding a user to this group grants this level of privilege . However , the most complex concept with reporting on groups is to
Reporting on who has access to a file or folder is a monumental task , due to the volume of files and folders on a typical network . Therefore , selection of the most important data must occur , and then those selected files and folders can be the focus of the security hardening . There are many tools that can help report on data access control lists , but if you do not want to purchase a tool you
90 INTELLIGENTCIO www . intelligentcio . com