Book Image

Learning Microsoft Windows Server 2012 Dynamic Access Control

By : Jochen Nickel
Book Image

Learning Microsoft Windows Server 2012 Dynamic Access Control

By: Jochen Nickel

Overview of this book

Identifying and classifying information inside a company is one of the most important prerequisites for securing the sensitive information of various business units. Windows Server 2012 Dynamic Access Control helps you not only to classify information, but it also gives you the opportunity and the functionality to provide a safe-net policy across your file servers, showing you some helpful ways of auditing and access denied assistance to improve usability. Understanding the architecture, the design, and implementing the solution, to troubleshooting will be covered in a practical and easy-to-read manner. This book is packed with project-based examples with plenty of information about the architecture, functionality, and extensions of Dynamic Access Control to help you excel in real-life projects. The book guides you through all the stages of a successful implementation of Dynamic Access Control. Microsoft Windows Server 2012 Dynamic Access Control will teach you everything you need to know to create your own projects, and is an essential resource for reviewing or extending already existing implementations. The book initially takes you through the task of understanding all of the functionality and extensions with ideas and overviews to help guide you in the decision process. The whole architecture will be explained in the main building blocks of Dynamic Access control. You will have a strong foundation and understanding of the claims model and Kerberos. Classifying information, the hardest part of the prerequisites to fulfil, is also covered in depth. You will also spend time understanding conditional expressions, and the method used to deploy them across your file server infrastructure. A special chapter is included for handling the data quality and the integration in other systems and strategies. Last, but not least, to get your solution up and running you will learn how to troubleshoot a Dynamic Access Control solution.
Table of Contents (16 chapters)
Learning Microsoft Windows Server 2012 Dynamic Access Control
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Building your smart test lab


While building our smart and straightforward test lab, we will start to apply our knowledge in a practical way. Not wanting to spend hours, we start with a minimal lab and extend it step-by-step for our needs.

We start with the following configuration:

  • A domain controller Windows 2012 R2 (build your own Forest, such as inovit.ch)

  • A domain-joined File Server Windows 2012 R2

  • A domain-joined Client Computer Windows 8.1 Pro

You might have noticed that we are using the latest versions. IT professionals always like to touch the newest one! In fact, we need this version because in further labs, we will show you how to integrate Dynamic Access Control in a Bring Your Own Device scenario including a Work Folders configuration.

There are no special requirements on the virtual environment, such as disk, CPU, or memory configuration. Just use your common configurations. Feel free to start as well with the Base Windows 2012 R2 Test Lab Guide at http://www.microsoft.com/en-us/download/details.aspx?id=39638.

On the file server, add an additional virtual disk to provide Shared Folders for our little test company and create a file structure as follows:

  1. Create a shared folder for each country (CH, FR,and MA).

  2. Additionally, create a folder for each office location (Zurich, Paris, Rabat, and Casablanca).

  3. Additionally, create a folder for each department (Sales, Human Resources, Engineering, Marketing, and Help Desk).

  4. Under the department folders, create a folder called Sensitive.

  5. The structure looks like MA | Casablanca | Marketing | Sensitive.

  6. Create a shared folder for some example projects (Project A, Project B, Project C).

  7. Create a shared folder for some public information.