Windows Access Control Policies can control who can access the files and folders on a disk, who can access the data blocks on a disk, or both. The rules are independent, which means that you create one list of users who have filesystem-level access and a separate list of users that have block-level access. You can specify both local and Active Directory (AD) users and groups in the rule permission lists.
We recommend that you create both types of rules in all Windows Access Control Policies so that your data disks are fully protected. We also recommend that you include only AD users and groups in your permissions lists. For more information, see Windows Access Control Rule Recommendations and Considerations.
The following procedure describes how to create a Windows Access Control Policy. For Linux, see Creating a Linux Access Control Policy.
Before You Begin
Procedure
In the Create Policy Wizard Details page, enter the following information:
Field |
Description |
|||
---|---|---|---|---|
Name |
Enter a name for the Access Control Policy (1-256 characters). The name can include special characters and spaces. |
|||
OS Type |
Select Windows.
|
|||
Cloud Administrator Group |
Select the Cloud Admin Group with which this policy should be associated.
|
|||
Description |
Enter an optional description for the policy. This description is displayed in the KeyControl webGUI when a user selects the Access Control Policy to associate with the disk. |
In the Create Rule Wizard Details page, enter the following information:
Field |
Description |
---|---|
Name |
Enter a name for the Access Control Rule (1-256 characters). The name can include special characters and spaces and it does not need to be unique. |
Description |
Enter an optional description for the rule. |
Rule Type |
Select the rule type.
|
In the Permissions page, click Add permission now.
Note: | If this is a block-level access rule, you do not have to add a user to the permission list if you do not want anyone to be able to access the data blocks on the disk. If this is a filesystem-level access rule, you must add at least one user to the permissions list. |
In the Create Permission dialog box, enter the following information:
Field |
Description |
|||
---|---|---|---|---|
User or Group Name |
Enter a user or group name. The user or group can be local or can come from Active Directory.
We strongly recommend that you only specify AD users and groups so that the removal of a local user account cannot invalidate the entire Access Control Policy. If the Policy Agent encounters an invalid AD account entry, it simply ignores that entry and enables the rest of the Access Control Policy. For security reasons, we also recommend that you do not add SYSTEM as a whitelisted user. |
|||
Domain |
You can select:
|
|||
Permission |
Specify whether the user should be allowed or denied access to the data on the disk. The default permission is "Deny" for all users not explicitly allowed or not included in an explicitly-allowed group. |
If any of the entries in the permissions list are groups, make sure the order of the entries is correct.
When the Policy Agent receives an access request, it processes the permissions list in order, from top to bottom. As soon as it finds an entry that matches the account that requested the data, it assigns that permission level to the user and stops processing the permissions list. If you have added an entry to deny a particular user access but the user is part of a group that was granted permission higher in the list, that user's request for access will be granted. For details, see Windows Access Control Rule Processing.
What to Do Next
Associate the Access Control Policy with one or more Windows data disks as desribed in Associating an Access Control Policy with a Disk.