Security principals are Active Directory objects that are assigned security identifiers (SIDs). A SID is a unique identifier that is used to manage any object to which permissions can be assigned.

     A foreign security principal allows permissions to be assigned to users that are not part of the Acitve Directory forest. The foreign security principals can be added to Domain Local groups which, in turn, can be granted permissions for resources within the domain.

     Delegation is the process by which a higher-level security administrator assigns permissions to other users. This is useful assigning other users small administrative tasks such as managing an OU or resetting passwords for an OU.

     There are three basic types of Active Directory objects that serve as security principals and are the basis of the Active Directory security architecture. These are:


Users and Groups

     The fundamental security principals that are used for security administration include Users and Groups. Here, we will focus on how Users and Groups interact and the different types of Groups that can be created.

Group Scope

     The scope of a Group defines two characteristic, first, it determines the level of security that applies to a Group, second, it determines which users can be added to the group. Group scope is an important concept in network environments because it ultimately defines which resources users will be able to access.

The three types of Group scope are as follows:
Built-in Local Groups

     Built-in Local groups are used to perform adminstrative functions on the local server. These groups have predefined permissions and priviledges which allow administrators to easily assign common management functions.
Predefined Global Groups

     Global groups are used for managing permissions at the domain level. The following predefined Global groups are installed in the Users folder:
The Enterprise and Schema Admins groups are stored in the Forest Root Domain (the first domain created in the forest). These groups are global groups in mixed mode, universal groups in native mode. The only default member of the Enterprise Admins group is the administrator from the forest root domain.



Permissions

     Once you have users grouped, you will need to set the permissions that will apply to the users and groups. The permissions available will vary with different types of AD objects.


Administrative Tools

Local Security Policy

     The Local Security Policy settings pertain to the local computer only. These settings are useful when you have specific computers that require custom security configurations (web server vs. database server).

Domain Security Policy

     The Domain Security Policy utility is used to view security settings that apply to all of the objects within a domain. This utility allows you to specify settings such as the audit policy, System Service settings, and other options. Unless specifically overridden, these settings will apply to all of the domain controllers within the domain.

Domain Controller Security Policy

     The Domain Controller Security Policy utility is similar to the Domain Security Policy utility. The difference is that the settings you make with this tool apply only to the local domain controller rather than to all domain controllers. This utility is useful when you want to specify different settings on different domain controllers.



Security Configuration and Analysis Tool

     The Security Configuration and Analysis tool can be used to create, modify, and apply security settings in the Registry through the use of Security Template files. Security Templates allow systems administrators to define security settings once and then store this information in a file that can be applied to other computers. This tool is not listed in the Administrative Tools program group. You must open an MMC console and choose it from the list of snap-ins.

The process for working with the Security Configuration and Analysis tools is as follows:
  1. Open or create a Security Database file.
  2. Import an existing Template file.
  3. Analyze the local computer.
  4. Make any setting changes.
  5. Save any template changes.
  6. Export the new template (optional).
  7. Apply the changes to the local computer (optional).
The Security Template files are stored by default in the \WINNT\Security\Templates\ directory.

     The Security Templates and Security Configuration and Analysis Tools allow you to make permanent changes to the computer in the local registry. You will see similar settings in the Group Policy Tool under [Computer|User] Configuration/Windows Settings/Security Settings/. The difference is that the changes made by Group Policy are for the duration of the Computer and User connection in which it is applied. After logoff, the configuration is out of scope and the changes are dropped. Changes made by Security Templates are entered into the local computer's registry and are never lost.


Universal groups and Domain Local groups can contain members from
througout the forest. Other group types cannot.

Universal groups can be moved between domains while all of the other group
types must be re-created manually.

To enable auditing:

	1.   Enable auditing with the AD Users and Computers tool.

	2.1. Specify auditing options on OU w/AD Users and Computers tool.

	2.2. Enable failure and success auditing settings for specific file
	     stores on NTFS volumes.

	3.   View the audit log using the Event Viewer tool.


Group Policy can be linked to OUs, but not to AD Users, Computers, or Groups.
An OU is not a security principal, AD Users, Computers, and Groups are.