所以,我们在这里,86天,4小时,17分32秒,计算着Windows 7和Server 2008 R2的寿命还剩下多少天。当然,除非您获得扩展的安全更新。如果您像我们中的许多人一样,您正在进行迁移,或者您已经完成了从Windows 7和server 2008 R2的迁移。作为这个过程的一部分,您可能已经更改了权限,以便复制文件、移动数据、迁移服务器。在完成迁移之后,您是否回过头来检查并确保正确设置了这些权限?例如,如果您使用的是就地升级,权限可能会被遗留在旧的操作系统中,这可能不是您想要的。因此,当您进行迁移时,请考虑这些权限或遗留问题。
当您使用hyper V时,您通常会在迁移过程中更改权限,并且可能不会再更改它们。例如,您可能正在通过网络导出hyper v虚拟机,并得到一个权限错误。这是因为hyper V主机的系统帐户执行导出,并且在网络共享上没有相同的权限。因此,建议更改这些权限,以允许每个系统相互访问。通常,可以使用syinternals公司的PStools之类的工具临时更改权限。做这些动作,在项目的最后他们会把它们变回原来的样子。我在这篇文章里得到了更多的信息。Get Acl是基本的powershell命令,它提供关于资源安全性的信息。它可以是一个文件。它可以是一个注册表项。 And often if you don't go back and check to see what you've set for permissions, you may come back later on and realize they're not set. What you want them to be. There are many scripts out there on the Web that allow you to do a full NTFS directory effective permissions audit so you can see exactly who is the owner, who has rights, who has access to the files. Yes, that's great for on premise file servers, but what about when you moved to the cloud? We need similar tools, but not the same for when we moved to cloud security. In office 365, you have to focus on where the data is located and where it's shared. For example, on onedrive or SharePoint, you can do sharing auditing, reporting in the Office 365 console, which allows the administrator to generate a list of shared resources to enable this report. You go into that protection.office.com and sign in in the left pane of security compliance center. Then click on search. Click on the audit log search. And under activities you want to click sharing and access request activities to search on these sharing related events. So when the Office 365 security and complaints portal, you want to look for search and under activities, you want to scroll down. Until you see sharing an access request activities and review all the options you have there. And what kind of reports you may need. You could also do a quick query with ViewableByExternalUsers=true and ViewableByAnonymousUsers=true. That gives you a quick and dirty report of who has access to links and other resources inside your SharePoint. Take the time to audit and confirm that how you set up the item is what you want it to be. Accidental access permissions can lead to headlines and security events such as earlier this year when the exposure of eight hundred eighty five million mortgage records at First American Financial Corporation occurred because of misconfiguration was done in their web server. It allowed users of their company to access records that they should not have been able to access. If someone had taken the time to audit the permissions set on the web server, they may have saved themselves of these headlines and these issues. Take the time to review permissions and what you've set to ensure what they are, what you intend them to be. Don't forget to sign up for tech. Talk from IDG on the new YouTube channel for the tech news of the Day. Until next time. This is Susan Bradley for CSO Online.