throbber
Microsoft’
`Windows93_
`ResourcekKit
`
`Petitioner RPX Corporation - Ex. 1020, p. 1
`
`

`

`PUBLISHED BY
`Microsoft Press
`
`A Division of Microsoft Corporation
`One Microsoft Way
`Redmond, Washington 98052-6399
`
`Copyright © 1998 by Microsoft Corporation
`
`Material appearing in chapters 17 and 18 is based on material originally created as:
`Novell-Supplied NetWare Clients: The Benefits,
`Copyright © 1997, 1998 Novell, Inc. All rights reserved.
`Used, reproduced, and distributed with permission from Novell, Inc.
`
`All rights reserved. Nopart of the contents of this book may be reproduced or transmitted in any form orby ary
`means without the written permission of the publisher.
`
`Library of Congress Cataloging-in-Publication Data
`Microsoft Windows 98 Resource Kit / Microsoft Corporation.
`p.
`cm.
`Includes index.
`ISBN 1-57231-644-6
`
`1. Microsoft Windows (Computerfile)
`(Computers)
`I. Microsoft Corporation.
`QA76.76.063M5244
`1998
`005.4'469--de21
`
`2. Operating systems
`
`98-2768
`CIP
`
`Printed and bound in the United States of America.
`
`123456789 WCWC
`
`321098
`
`Distributed in Canada by ITP Nelson, a division of Thomson Canada Limited.
`
`A CIP catalogue record for this book is available from the British Library.
`
`Microsoft Press books are available through booksellers and distributors worldwide. For further information about
`international editions, contact your local Microsoft Corporation office or contact Microsoft Press International
`directly at fax (425) 936-7329. Visit our Website at mspress.microsoft.com.
`
`ActiveX, BackOffice, Direct3D, DirectDraw, DirectInput, DirectPlay, DirectSound, DirectX, DoubleSpace,
`DriveSpace, FrontPage, Microsoft, Microsoft Press, MS-DOS, Natural, Picture It!, PowerPoint, Visual Basic,
`Visual C++, WebBot, Win32, Windows, and Windows NTareregistered trademarks and ActiveMovie,
`Authenticode, DirectAnimation, DirectMusic, DirectShow, JScript, MSN, NetMeeting, NetShow, OpenType, and
`Outlook are trademarks of Microsoft Corporation. Novell and NetWareare registered trademarks of Novell, Inc. in
`the United States and other countries.
`
`Other product and company names mentioned herein may be the trademarks of their respective owners.
`
`The example companies, organizations, products, people, and events depicted herein are fictitious. No association
`with any real company, organization, product, person, or event is intended or should be inferred.
`
`Acquisitions Editors: Casey D. Doyle, David Clark, Anne Hamilton
`Project Editor: Maureen Williams Zimmerman
`
`
`
`Petitioner RPX Corporation - Ex. 1020, p. 2
`
`

`

`355
`
`
`CHAPTER 9
`
`Security
`
`Q
`
`In This Chapter
`
`See Also
`
`This chapter presents an overview of security features provided in Microsoft
`Windows 98. It describes their use, together with security features of Internet
`Explorer version 4.0, in a networking environment.It is intended for system
`administrators and others who have authority to set security levels for network
`clients, and for those who need secure communication over the Internet.
`
`356
`Overview of Security Features
`Security Planning Checklist
`360
`Network Security
`361
`Passwords
`370
`376
`Internet Explorer Security
`Security Features in Outlook Express
`Firewalls
`388
`Distributed Component Object Model
`Troubleshooting Security
`393
`
`383
`
`390
`
`« For information aboutfile and printer sharing services and user-level or share-
`level security, see Chapter 18, “Logon, Browsing, and Resource Sharing.”
`« For information about editing system policies, see Chapter 8, “System -
`Policies.”
`=» For information about security for Internet Explorer, see Chapter 20,
`“Internet Access and Tools.”
`= For information about Distributed Component Object Model (DCOM),
`see Chapter 29, “Windows 98 Network Architecture” and Chapter 25,
`“Application Support.”
`
`Petitioner RPX Corporation - Ex. 1020, p. 3
`
`

`

`356
`
`Microsoft Windows 98 Resource Kit
`
`Overview of Security Features
`Computer security refers to the protection of all components—hardware,
`software, and stored data—of a computeror a group of computers from
`damage,theft, or unauthorized use. A computer security plan that is weil
`thought out, implemented, andmonitored makes authorized computer use
`easy and unauthorized use or accidental damage difficult or impossible.
`
`Personal computing depends increasingly on computers connected through
`networks, and more often through the Internet and intranets, You can use
`Windows 98 security to prevent unauthorized access to shared resources on
`computers in a network. The security features built into Windows 98 are
`described briefly in this section, and in more detail later in the chapter.
`
`Logon Security
`Windows 98 allows users to log on fully. In a networking environment, you can
`set your system up so that when a name and password pair have been validated
`againstthe security authority of a network server, the Windows 98user interface
`is displayed.
`
`Logon Password
`A user can log on to all networks and Windows98 at the sametime. If a user’s
`password for Windows 98 or for another network is the same as the password
`for the primary logon client, Windows 98 automatically logs the user on to
`Windows 98 and all networks using that password.
`
`Note A unified password prompt does not enhancesecurity, but eases logging on
`to the system. As the system administrator, you can require additional passwords
`for a more secure system.
`
`For more information aboutthe logon prompt, see “Using the Windows 98 Logon
`Password”later in this chapter. Once users log on to their machines, they have the
`option to cache their passwords. These passwords are cached in a file with a .pwl
`extension. The file nameis the same as the user’s name. See “Password Caching”
`later in this chapter.
`
`Network Validation
`With system policies, you can prevent users from logging on to Windows 98
`if their Windows NT or Novell NetWare network logonis notvalidated. This
`causes the network logon dialog to appear before, or instead of, the Windows 98
`logon prompt. Also, the user list may not be network wide, but specific to a
`server, and may be different for different servers.
`
`Petitioner RPX Corporation - Ex. 1020, p. 4
`
`

`

`
`
`Chapter9 Security 357
`
`For more information about logon security, see “Network Security”later in
`this chapter. For more information about system policies, see “Using System
`Policies to Enforce Password Security”later in this chapter, and Chapter8,
`“System Policies.”
`
`Shared-Resource Security .
`When a computeris ranning Windows 98 with file and printer sharing services,
`other users can connect to shared printers, volumes,directories, and CD-ROM
`drives on that computer. To protect these shared resources, Windows 98 provides
`user-level and share-level security.
`:
`
`User-Level Security
`With user-level security, a user’s request to access a shared resource is passed
`through to a security provider, such as a Windows NT or NetWareserver.
`The security provider grants or denies the request by checking the requestor’s
`user name and password against a network-wide or server-wide stored list. User-
`level security does not require file and printer sharing services. These accounts
`must be created on the machine providing user-level authentication, such as a
`Windows NT or NetWare server. Windows 98 cannotact as an authentication
`server for user-level security.
`
`This type of security allows fine-grained control over per-user access and allows
`individual accountability. The disadvantages are that you must create a user
`account for each user you want to grant access to, and you must grantthat user
`the access.
`
`,
`
`Share-Level Security
`With share-level security, users assign passwords to their shared resources.
`Any user who can provide the correct password is permitted to access the shared
`resource. The passwordis stored and checked by the computer where the resource
`resides. Share-level security requires file and printer sharing services.
`ee
`Note Any subfolders of the shared folder,if they are also shared, mustbe set with
`the same level of security as the parent folder.
`
`The advantageof this type of security paradigm is thatit allows granting access
`to a broad range of people with very little effort. However, it is not as secure as
`user-level security, because the password is widely distributed and there is no
`notion of personal accountability.
`
`Petitioner RPX Corporation - Ex. 1020, p. 5
`
`

`

`358
`
`Microsoft Windows 98 ResourceKit
`
`Note You cannotuse share-level security on NetWare networks, because the File
`and Printer Sharing for NetWare Networksutility does not support passwords.
`You can limit access, however, by defining a resource as read-only.
`
`Password Controls
`
`In addition to setting up passwordsfor security, Windows98 also provides
`password caching, Password List Editor, and system policies.
`
`Password Caching
`Like unified logon, password caching provides a convenient and secure way to
`access protected resources. The first time a user connects to the resources and
`saves the password, Windows 98 caches the password in a PWL file. Whenever
`the user logs on again, the logon password-unlocks the PWLE file and the resource
`passwordsit contains, and the user then has free access to those resources. If
`password caching is disabled, users must type the password each time they
`connect to a password-protected resource.
`PasswordList Editor
`Password List Editor lets you view resources on a passwordlist. It also lets a user
`view or edit his or her own password file WL). You may then delete a password
`{you cannot view the actual password) so that it can be replaced.
`
`System Policies -
`System policies let you enforce a password policy with some orall of these
`restrictions:
`
`» Disable password caching.
`= Require an alphanumeric Windows 98 logon password.
`» Require a minimum Windows 98 logon password length.
`
`You can also define system policies that prevent users from enabling peer
`resource sharing services arid that enforce other security techniques, such as
`preventing users from configuring system components.
`
`For more information, see “Using System Policies to Enforce Password Security”
`later in this chapter, and Chapier 8, “System Policies.”
`
`Petitioner RPX Corporation - Ex. 1020, p. 6
`
`

`

`
`
`Chapter9 Security 359opA
`
`Internet and Intranet Security
`The Internetis an effective way to communicate and share information with
`others, but with its use comes a greater need for security. The following security
`features make it easier for you to protect your computer and your privacy when
`using the Internet.
`
`Internet Explorer
`Internet Explorer 4.0 has new security options that let you configure a security
`level to a specific Web site according to how muchyoutrust the content of that
`Website. Four security zones are set up in Internet Explorer 4.0. They are:
`
`» An Internet zone that by default contains all Internetsites.
`« A Trusted sites zone to which you can assign Websites youtrust.
`« A Restricted sites zone to which you can assign Web sites you do nottrust.
`» A Local intranet zone for computers connectedto a local area network.
`
`Outlook Express
`Outlook Express includes tools to protect you from fraud, ensure your privacy,
`and prevent unauthorized access to your computer. These tools enable you to
`send and receive secure e-mail messages and to control potentially harmful e-mail
`messages through security zones.
`
`Distributed Component Object Model
`A distributed application consists of multiple processes that cooperate to
`accomplish a single task. The Distributed Component Object Model (DCOM)
`can be used to integrate distributed applications in a network, thus allowing
`specified users to have accessto certain processes.
`
`Firewalls
`A firewall enforces a boundary between networks. The boundary prevents
`unauthorized access of private networks by preventing the passage ofpackets
`
`between networks.
`
`Petitioner RPX Corporation - Ex. 1020, p. 7
`
`

`

`360
`
`Microsoft Windows 98 Resource Kit
`
`Security Planning Checklist
`
`You needto determinethe type of exposureor risk you potentially have, and
`develop a security policy that reflects this level of risk. On the basis ofthat
`analysis, choose products, network technology, and businesspractices for the
`installation, integration, and managementof your system.
`
`Before you integrate Windows 98 security into your network security model,
`consider the following issues:
`
`Whatkind of logon security do you need? Do you allow users to log on
`to Windows 98 and the network with the same password? Do you wantto
`require alphanumeric or minimum-length passwords for the Windows 98 logon
`password? Do you wantto require that users be validated by the network security
`provider before being able to log on to Windows 98? For both Windows NT
`and NetWare networks, you can use system policies to require validation by a
`Windows NT or NetWare server before allowing access to Windows 98 andto
`specify other Windows 98 passwordrestrictions.
`
`What kind of resource protection do you need on Microsoft networks? If you
`enable peer resource sharing, you must decide how to protect those resources
`with share-level or user-level security. User-ievel security provides greater
`security because the network security provider must authenticate the user name
`and password before access to the resource is granted. Share-level security is
`not available for NetWare networks.
`
`For more information about NetWare networks, see Chapter 17, “Windows 98
`on Third-Party Networks.”
`What kinds of accessrights will users have to resources protected by user-level
`security? You can specify the types of rights users or groups of users have to
`resources by setting Sharing properties for the shared resource(such as a folder
`or drive). For example, you can restrict other users to read-only accessto files or
`give them read-access and write-accessto files.
`
`How do you wantto enable user-level security? You can enable security in a
`setup script or in system policies. If you enable user-level security in either a
`setup script or Control Panel, remote administration is enabled by default for
`domain administrators on a Windows NT network andfor supervisors on a
`NetWare network.
`
`Should password caching be allowed? You can use system policies to disable
`password caching and thus require users to type a password each time they access
`a password-protected resource,
`
`Petitioner RPX Corporation - Ex. 1020, p. 8
`
`

`

`Chapter9 Security
`
`361
`
`Should users be able to change Control Panelsettings? You can use system
`policies to restrict users’ ability to change the configuration of system
`components, their desktops, applications, or network connections in the
`Control Panel folder.
`
`Doesa particular hard disk need extra protection? Windows 98 security
`obstructs hacking over the network; butif a person has physical access to the
`computer,critical data could still be taken from the hard disk where it resides
`by using Safe Modeora floppy disk to start the workstation. If specific data
`requires greater levels of security, you should store critical files on a secure
`server. If computers require greater levels of security, Windows NT Workstation
`is recommended, becauseit provides a meansto protect resources on a hard disk
`based on a user’s identity.
`
`Are there applications that should not be run? You may needtorestrict accessto
`someapplications while supplying access to other applications in your system. To
`implementthis type of security, use system policies. You can also restrict access
`to parts of an application by using DCOM.
`Do certain processes of an application need protection? If security is required
`for a distributed application—that is, one whose componentprocesses are
`distributed over more than one computer in the network—-use DCOM. DCOM
`providesthe structure to share applications at the component ievel between a
`server and clients. The components can be shared overthe Internet or an intranet.
`Using DCOMtoseta security level for the application automatically applies that
`security level to each component, whereverlocated.
`
`Should Internet or intranet access be limited? You may need to limit access
`to certain sites on the Internet and on your intranet. To implementthis type of
`security, use Internet Explorer security features.
`
`Network Security
`Windows 98 allows users to log on fully. The first thing most users encounter
`after booting their Windows98 systemsis a logon dialog box, which varies
`depending onthe type of network. Once the proper user name and password are
`validated against the security authority of the network server, the Windows 98
`user interface is displayed.
`System administrators can configure the Windows 98 system to allow éntry into
`the operating system with no network access (this configuration is the default). As
`an alternative solution to this problem, system administrators can specify guest
`accounts that-have limited network access.
`
`Petitioner RPX Corporation - Ex. 1020, p. 9
`
`

`

`362
`
`Microsoft Windows 98 ResourceKit
`
`The Windows 98 user logon should not be construed as a mechanism to fully
`secure personal computers. Because personal computersarestill vulnerable to a
`floppy boot, all data stored ontheir disks is potentially available. The underlying
`file system in Windows98 is the MS-DOSfile allocation table (FAT) file system,
`which has no built-in encryption or other security mechanisms.
`
`Network resources are secured under Windows 98 using the same security
`mechanisms employed by network servers on corporate networks. The user
`name and password in Windows 98 can be configured to be the same as those
`used by the network server. By doing this, the network manager can control
`network access, provide user-level security for access to shared resources on the
`local computer, control the various agents in Windows 98, and limit who has
`remote administration authority on this Windows 98 system.In this fashion,
`Windows 98 leverages the existing investment in network servers, management
`tools, utilities, and infrastructure. System administrators can manage user
`accounts centrally on the server, just as they always have. They can also use
`familiar tools for managing user accounts.
`
`Implementing Network Security
`Implementing security in a Windows 98 networking environmentinvolves the
`following types of activity:
`

`
`« Define user accounts on a network server or domain controller for user-level
`security. For more information, see the documentation for the software on the
`network security provider.
`Install file and printer sharing services, and then enable user-level or share-
`level security.
`« Define access rights for resources protected by user-level security.
`« Make the Windows 98 logon password and network logon password the
`same. Disable password caching if you do not want this feature. For more
`information, see “Using the Windows 98 Logon Password” and “Using the
`Windows 98 Password Cache”later in this chapter.
`« Define system policies to restrict users’ ability to configure the system or
`shared resources, and to enforce password policies.
`= Define Internet and intranet security zones. For more information, see “Setting
`Up Security Zones” later in this chapter.
`
`Sharing Resources
`Windows 98 provides share-levelor, alternatively, user-level security for
`protecting shared resources on computers running Windows 98 (the share
`level requires file and printer sharing services).
`
`Petitioner RPX Corporation - Ex. 1020, p. 10
`
`

`

`
`
`Chapter9 Security 363
`
`Share-level security protects shared network resources on the computer running
`Windows 98 with individually assigned passwords, For example, you can assign
`a password to a folder or a locally attachedprinter. If other users wantto accessit,
`they needto type in the appropriate password.If you do notassign a password to
`a shared resource, every user with access to the network can access that resource.
`
`User-level security protects shared network resources by requiring that a security
`provider authenticate a user’s request to access resources. The security provider,
`such as a Windows NT domain controller or a NetWare server, grants access to
`the shared resource by verifying that the user name and passwordare the same as
`those on the user accountlist stored on the network security provider. Because the
`security provider maintains a network-widelist of user accounts and passwords,
`each computer running Windows 98 doesnot haveto store a list of accounts.
`
`Note For Microsoft networks, the security provider must be a Windows NT
`domain or workstation. For NetWare networks, it must be either a NetWare 4.x
`server running bindery emulation or a NetWare 3.x server.
`
`Figure 9.1 shows howuser-level security works for Microsoft networks. The
`reference numbers are explainedafter the illustration.
`
`Network server
`(security provider)
`
`Joe's
`
`
`
`Figure 9.1 User-level security
`
`1. Joe’s computer is running Windows98. Joe enters a password to access a
`shared resource protected by user-level security.
`2. The Windows 98 computer passes a request to the server (security provider)
`to authenticate Joe’s identity.
`3. The security provider sends a verification to the computerif Joe’s name and
`password combination are valid.
`4. Windows 98 grants access to the shared resource according to rights assigned
`to Joe on the Sharing property sheet for that resource.
`
`Petitioner RPX Corporation - Ex. 1020, p. 11
`
`

`

`364
`
`Microsoft Windows 98 ResourceKit
`
`Joe’s password is stored on his computer’s PWL file to be used for authentication
`when he accesses that resource again. He will not be prompted for the password
`again during that session. When he logs off, the computer will erase his password
`from thefile.
`
`Setting Up Security for Shared Resources
`Before a user can share a resource on a computer running Windows98,the
`computer must be configured for share-level or user-level security, and file
`and printer sharing services must be installed by using the Network option in
`Control Panel. Configuring share-level or user-level securityis described
`briefly in the following sections, and in Chapter 18, “Logon, Browsing, and
`Resource Sharing.”
`
`Note Share-level security is not available on NetWare networks.
`
`> To set up share-levelsecurity
`1. Install File and Printer Sharing for Microsoft Networks, as descfibed in the
`“Installing Peer Resource Sharing” section of Chapter 18, “Logon, Browsing,
`and Resource Sharing.”
`2, On the computer that hosts the resource to be shared, in Control Panel, double-
`click Network, and then click the Access Controltab.
`3. Click Share-level access control, and then click OK.
`
`.
`
`> Toset up user-level security on a Microsoft network
`1. Install File and Printer Sharing for Microsoft Networks, as described in the
`“Installing Peer Resource Sharing” section of Chapter 18, “Logon, Browsing,
`and Resource Sharing.”
`2. In Control Panel, double-click Network, and then click the Access Control
`tab.
`
`3. Click User-level access control,
`
`4, In the User-level access control box, type the name of the Windows NT
`domain or Windows NT workstation where the user accounts reside.
`
`5. Click OK.
`
`> To set up user-level security on a NetWare network.
`1. Install File and Printer Sharing for NetWare Networks, as described in the
`“Installing Peer Resource Sharing” section of Chapter 18, “Logon, Browsing,
`and Resource Sharing.”
`2. In Control Panel, double-click Network, and then click the Access Control
`tab.
`
`Petitioner RPX Corporation - Ex. 1020, p. 12
`
`

`

`Chapter 9 Security
`
`365
`
`3. Click User-level access control.
`4, In the User-level access control box, type the name of the NetWareserver.
`5. Click OK.
`
`Forinformation about specifying values for security in custom setup scripts, see
`Appendix D, “Msbatch.inf Parameters for Setup Scripts.” For information about
`using System Policy Editor to set user-level security and other security options,
`see Chapter8, “System Policies.”
`
`Using Share-Level Security
`You can restrict access to resources such as a shared folderor a printer by either
`defining it as read-only or assigning a password to it.
`
`To share a folder or printer with share-level security
`1. In Windows Explorer, right-click the folder or printer to be shared, and then
`click Properties.
`2. In the Properties menu,click the Sharingtab.
`3. Click Shared As, and type the resource’s share name.
`The shared resource name will be the computer name plus the share name. For
`example, inthe following screen shot, if the computer name is mycomputer,
`
`this shared resource is \wnycomputer\mydocuments.
`
`Petitioner RPX Corporation - Ex. 1020, p. 13
`
`

`

`366
`
`Microsoft Windows 98 Resource Kit
`
`4. Specify whether you want users to have read-only or full access to this
`resource.
`
`Note There is no read-only share-level access for a printer or remote
`administration.
`
`5. Type the password for the specified access, and click OK.
`
`
`Tip You can share a folder but hide it from the Network Neighborhood browsing
`list by adding a dolar sign ($) to the end of its share name (for example,
`PRIVATES},
`
`Using User-Level Security
`Windows 98 uses the logon process to provide user-level security for a variety of
`services beyond network resource access, including the following services that are
`remotely accessible:
`
`4
`
`= Fie and printer sharing.
`= Dial-up network access gateway control.
`= Backup.
`« Network and system management.
`
`Pass-through security is implemented in Windows 98 as the mechanism to
`enable user-level security. Pass-through literally means that Windows 98
`passes authentication requests through to a Windows NT or NetWareserver.
`Windows98 does not implementits own unique user-level security mechanism
`but instead uses the services of an existing server on the network.
`
`Enabling pass-through security is a two-step process.First, user-level security
`must be enabled using the Control Panel. Second, the device must be shared,
`and users with access privileges must be specified. Right-clicking the drive C
`icon in My Computer and selecting Properties from the Shortcut menu displays
`a property sheet that shows which shares already exist and which users have
`access, It also allows new devices to be shared and new users to be added to
`specific shares. The Windows NTserver or the NetWare bindery supplies the
`user nameslisted in this property sheet.
`
`For more information aboutfile and printer sharing, see Chapter 18, “Logon,
`Browsing, and Resource Sharing.”
`
`Petitioner RPX Corporation - Ex. 1020, p. 14
`
`

`

`Chapter? Security
`
`367
`
`The Remote Administration function of a Windows 98 personal computer
`specifies the users or groups who have authority to manage the Windows 98
`system, including the following:
`
`Dial-up network access gateway control.
`Backup.
`Remote access to the registry.
`Remoie NetWatcher access.
`
`Remoie system performance monitoring.
`
`Remote Administration is controlled through the Passwords option in Control
`Panel. For more information about Remote Administration, see Chapter 23,
`“System and Remote Administration Tools.”
`
`For each network resource governed by user-level security, there is a list of users
`and groups that can access that resource.
`
`To share a resource with user-level security
`1.
`In Windows Explorer or My Computer, right-click the icon for the resource to
`be shared, and then click Properties.
`2. In the Properties menu,click the Sharingtab.
`. Click Add.
`
`.
`
`In the Add Users dialog box, click a user or group, and then assign access
`rights as described in the following paragraphs.
`Assign, for each user, a set of rights for the resource. The kindsof rights that
`you assign depend on the kind of resource you are securing:
`« For shared directories, you can let a user have read-only access,full access,
`or custom access. Within custom access, you can grant the user any orall
`of the following rights: read, write, create, list, delete, change file
`attributes, and change accessrights,
`-
`Forshared printers, a user either has the right to access the printer or not.
`=
`« For remote administration, a user either has the right to be an administrator
`” or not as defined in the Passwords option in Control Panel.
`Permissions are enforced for a resource as follows:
`


`

`
`Jf the user has explicit rights to the resource, those rights are enforced.
`Ifthe user does not have explicit rights to the resource, the permissions
`are determined by takingall of the rights of each group to which the user
`belongs.
`Ifnoneof the groups to which the user belongs has anyrights to that
`resource, the user is not granted access to the resource.
`
`Petitioner RPX Corporation - Ex. 1020, p. 15
`
`

`

`368
`
`Microsoft Windows 98 ResourceKit
`
`When youdo not explicitly assign access rights to a file or folder, Windows 98
`uses implied rights. Jmplied rights are those assigned to the nearest parent folder
`ofafile or folder. If none of the parent folders (up to and including the root
`directory of the drive) have explicit rights, no access is allowed.
`
`
`Note Implied rights are displayed automatically on the property sheet for the
`shared file or folder.
`
`Specifying Folder Access Rights in User-Level Security
`Accessrights specify what a user can do in a folder protected by user-level
`security. The access rights you define for a folder apply to ail of its subfolders.
`You cannot, however, assign access rights to individual files in Windows98.
`(Both Windows NT and NetWarelet you assign accessrights to files.)
`
`
`Note Any subfolders of the shared folder, if they are also shared, mustbe set with
`the same level of security as the parent folder.
`
`For each folder, you can assign read-only, full, or custom access. Custom access
`lets you further specify exactly what each,user or group can doin the folder, as
`specified in Table 9.1.
`
`Table 9.1 Custom access options
`Required permissions
`Readfiles
`
`File operation
`Read from a closed file
`
`See a file name
`
`Search a folderforfiles
`
`Write to a closed file
`
`Run an executablefile
`
`Create and write to a file
`
`Copyfiles from a folder
`Copy files to a folder
`Make a new folder
`
`Deletea file
`
`Remove a folder
`
`List files
`
`List files
`
`Write, create, delete, changefile attributes
`
`Read,list files
`Create files
`
`Read,list files
`
`Write, create, list files
`Create files
`
`Delete files
`
`Delete files
`
`Changefolderorfile attributes
`Renamea file or folder
`
`Change access rights
`
`Changefile attributes
`Changefile attributes
`Change access control
`
`Petitioner RPX Corporation - Ex. 1020, p. 16
`
`

`

`
`
`Chapter9 Security 369
`
`>» To define custom access
`
`1, Open the Add Users dialog box in a shared resource’s properties (described
`in the procedure, “To share a resource with user-level security” earlier in this
`chapter).
`2. In the Add Usersdialog box,click a user or group, click Custom, and then
`click OK.
`
`3.
`
`In the Add Users dialog box, click a user or group from the Namelist, and
`then click Custom.
`
`4, In the Change Access Rights dialog box,click the type of rights the user or
`group of users may have in the folder, and then click OK.
`5. To removea user or group of users, click that user or group, and then click
`Remove.
`
`6. To edit the access rights for a user or group of users, click that user or group,
`and then click Edit.
`
`Managing UserLists
`Windows 98 user-level security depends on a list of accounts and groups located
`on a security provider. You cannot add or remove users and groups from the
`security providerlist by using Windows 98 tools. However, you can do this by
`running User Manager for a Windows NT domain, SYSCON for NetWare 3-x,
`and NETADMIN for NetWare 4.x in a NetWare bindery environment. You can
`use these tools on a computer running Windows 98. These tools are provided by
`the respective vendors and not by Windows 98. Under Windows 98, you specify
`what rights users have to specific resources on the local computer as described in
`“Using Share-Level Security” earlier in this chapter. For more information about
`changing a user’s access rights, see “Specifying Folder Access Rights in User-
`Level Security” earlier in this chapter.
`
`Note Although Windows NT networks allow multiple domains, a computer
`running-Windows 98 can specify only one domain for user-level security.
`However, you.can set permissions for users or groups from any domain in the
`Sharing properties for the shared resource, as long as the two domains have a
`proper trust relationship. Also, rights may include user accounts from different
`trusted domains. To use a trust relationship to access multiple domains, you
`should consult the Microsoft Windows NT Server 4.0 Concepts and Planning
`Guide, part of the Windows NT Server documentation set.
`
`Petitioner RPX Corporation - Ex. 1020, p. 17
`
`

`

`370
`Microsoft Windows 98 Resource Kit
`
`Managing Security for Windows 98 in NetWare Bindery
`Environmenis
`NetWare 3.x servers store all the information about users, groups, passwords, and
`tights in a database stored on the server called the bindery. NetWare 4.x servers
`can appear to have a bindery through

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket