Skip to main content

Configuring central access policies to secure data on CIFS servers

There are several steps that you must take to secure access to data on the CIFS server using central access policies, including enabling Dynamic Access Control (DAC) on the CIFS server, configuring central access policies in Active Directory, applying the central access policies to Active Directory containers with GPOs, and enabling GPOs on the CIFS server.

Before you begin

  • The Active Directory must be configured to use central access policies.

  • You must have sufficient access on the Active Directory domain controllers to create central access policies and to create and apply GPOs to the containers that contain the CIFS servers.

  • You must have sufficient administrative access on the storage virtual machine (SVM) to execute the necessary commands.

About this task

Central access policies are defined and applied to group policy objects (GPOs) on Active Directory. You can consult the Microsoft TechNet Library for instructions about configuring central access policies and GPOs.

Microsoft TechNet Library

  1. Enable Dynamic Access Control on the SVM if it is not already enabled by using the vserver cifs options modify command.

    Example

    vserver cifs options modify -vserver vs1 -is-dac-enabled true

  2. Enable group policy objects (GPOs) on the CIFS server if they are not already enabled by using the vserver cifs group-policy modify command.

    Example

    vserver cifs group-policy modify -vserver vs1 -status enabled

  3. Create central access rules and central access policies on Active Directory.
  4. Create a group policy object (GPO) to deploy the central access policies on Active Directory.
  5. Apply the GPO to the container where the CIFS server computer account is located.
  6. Manually update the GPOs applied to the CIFS server by using the vserver cifs group-policy update command.

    Example

    vserver cifs group-policy update -vserver vs1

  7. Verify that the GPO central access policy is applied to the resources on the CIFS server by using the vserver cifs group-policy show-applied command.

    Example

    The following example shows that the Default Domain Policy has two central access policies that are applied to the CIFS server:

    vserver cifs group-policy show-applied

    Vserver: vs1
    -----------------------------
    GPO Name: Default Domain Policy
    Level: Domain
    Status: enabled
    Advanced Audit Settings:
    Object Access:
    Central Access Policy Staging: failure
    Registry Settings:
    Refresh Time Interval: 22
    Refresh Random Offset: 8
    Hash Publication Mode for BranchCache: per-share
    Hash Version Support for BranchCache: all-versions
    Security Settings:
    Event Audit and Event Log:
    Audit Logon Events: none
    Audit Object Access: success
    Log Retention Method: overwrite-as-needed
    Max Log Size: 16384
    File Security:
    /vol1/home
    /vol1/dir1
    Kerberos:
    Max Clock Skew: 5
    Max Ticket Age: 10
    Max Renew Age: 7
    Privilege Rights:
    Take Ownership: usr1, usr2
    Security Privilege: usr1, usr2
    Change Notify: usr1, usr2
    Registry Values:
    Signing Required: false
    Restrict Anonymous:
    No enumeration of SAM accounts: true
    No enumeration of SAM accounts and shares: false
    Restrict anonymous access to shares and named pipes: true
    Combined restriction for anonymous user: no-access
    Restricted Groups:
    gpr1
    gpr2
    Central Access Policy Settings:
    Policies: cap1
    cap2

    GPO Name: Resultant Set of Policy
    Level: RSOP
    Advanced Audit Settings:
    Object Access:
    Central Access Policy Staging: failure
    Registry Settings:
    Refresh Time Interval: 22
    Refresh Random Offset: 8
    Hash Publication Mode for BranchCache: per-share
    Hash Version Support for BranchCache: all-versions
    Security Settings:
    Event Audit and Event Log:
    Audit Logon Events: none
    Audit Object Access: success
    Log Retention Method: overwrite-as-needed
    Max Log Size: 16384
    File Security:
    /vol1/home
    /vol1/dir1
    Kerberos:
    Max Clock Skew: 5
    Max Ticket Age: 10
    Max Renew Age: 7
    Privilege Rights:
    Take Ownership: usr1, usr2
    Security Privilege: usr1, usr2
    Change Notify: usr1, usr2
    Registry Values:
    Signing Required: false
    Restrict Anonymous:
    No enumeration of SAM accounts: true
    No enumeration of SAM accounts and shares: false
    Restrict anonymous access to shares and named pipes: true
    Combined restriction for anonymous user: no-access
    Restricted Groups:
    gpr1
    gpr2
    Central Access Policy Settings:
    Policies: cap1
    cap2
    2 entries were displayed.