S 3.28 User training on Windows client operating system security mechanisms

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Supervisor, Head of IT

The security of the data stored on Windows systems depends to a large extent on the ability of the users to properly handle the security mechanisms of the Windows systems. Users of Windows systems must receive the appropriate training in order to use these mechanisms effectively, whereby a concept is required to do so.

Security mechanisms from the user's perspective

When operating Windows systems, the user can be relieved of a large part of the security-related settings if the administrator performs the corresponding preparations and pre-settings. In order to achieve uniform and verifiable system configurations, such an approach is indispensable (see S 2.326 Planning the Windows XP, Vista and Windows 7 group policies).

Some security-related settings, though, can be specified by the user himself. This includes specifying the access rights to his/her own files and directories. The access rights can be denied or granted to individual users or user groups. If the access rights configured for a user contradict each other, access is denied. This would be the case if the user is a member of both groups A and B and access is allowed for group A, but is denied for group B, for example. In general, the rights granted to a user so the user can access his own files are pre-set by the administrator, and these rights are automatically transferred to new files and folders. However, since users are normally allowed to change these access rights, it is necessary to train every user accordingly (see also S 4.149 File and share authorisation under Windows for more information). The policies of the institution should define which users are allowed to make which settings or whether changing the access rights by the user is prohibited in general. It is recommended to have at least the mobile client users trained on how to grant access rights to their data. For users with stationary clients, this can be agreed upon optionally.

Another point that must be covered in such a user training programme is the use of the Encrypting File System (EFS). In addition to informing the users on how to avoid pitfalls when using the EFS, the training programme should also place special emphasis on the extent to which EFS can protect the confidentiality of the data in the files and provide information about the limits of this protection (see also S 4.147 Secure use of EFS under Windows). When using Windows Vista and Windows 7, the users should also be informed of the possibilities offered through the simultaneous use of EFS and BitLocker for hard drive encryption. The users must be taught how to manage the encryption information in order to ensure that the data is available at all times.

When using BitLocker for hard drive encryption (see S 4.337 Use of BitLocker drive encryption), the user training programme should also deal with the level of protection of confidentiality that can be reached with it. Furthermore, the procedure selected for user authentication for BitLocker when starting Windows Vista or Windows 7, the significance of the recovery password, and the limits of the protection provided should be explained to the users in the training programme.

Windows Vista and Windows 7 offer different data backup methods (see S 6.76 Creation of a contingency plan for failure of a Windows network).

The user must be informed of which data backup methods he/she must use. Furthermore, the user must know where to find the backed up data, how he/she can access these backups when needed, and what he/she needs to do to restore his/her data.

Contents of the training programme

The following bullet points summarise necessary training contents for the users being able to safely handle Windows systems:

Use of access rights in the NTFS file system

Use of the integrated Windows firewall

Use of EFS (see also S 4.147 Secure use of EFS under Windows)

Other security instructions

Review questions: