MS-FSSO]: File Access Services System Overview

Total Page:16

File Type:pdf, Size:1020Kb

MS-FSSO]: File Access Services System Overview [MS-FSSO]: File Access Services System Overview Intellectual Property Rights Notice for Protocol Documentation .Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages, standards as well as overviews of the interaction among each of these technologies. Copyrights. This documentation is covered by Microsoft copyrights. Regardless of any other terms that are contained in the terms of use for the Microsoft website that hosts this documentation, you may make copies of it in order to develop implementations of the technologies described in the Open Specifications and may distribute portions of it in your implementations using these technologies or your documentation as necessary to properly document the implementation. You may also distribute in your implementation, with or without modification, any schema, IDL‘s, or code samples that are included in the documentation. This permission also applies to any documents that are referenced in the Open Specifications. No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation. Patents. Microsoft has patents that may cover your implementations of the technologies described in the Open Specifications. Neither this notice nor Microsoft's delivery of the documentation grants any licenses under those or any other Microsoft patents. However, a given Open Specification may be covered by Microsoft's Open Specification Promise (available here: http://www.microsoft.com/interop/osp) or the Community Promise (available here: http://www.microsoft.com/interop/cp/default.mspx). If you would prefer a written license, or if the technologies described in the Open Specifications are not covered by the Open Specifications Promise or Community Promise, as applicable, patent licenses are available by contacting [email protected]. Trademarks. The names of companies and products contained in this documentation may be covered by trademarks or similar intellectual property rights. This notice does not grant any licenses under those rights. Reservation of Rights. All other rights are reserved, and this notice does not grant any rights other than specifically described above, whether by implication, estoppel, or otherwise. Tools. The Open Specifications do not require the use of Microsoft programming tools or programming environments in order for you to develop an implementation. If you have access to Microsoft programming tools and environments you are free to take advantage of them. Certain Open Specifications are intended for use in conjunction with publicly available standard specifications and network programming art, and assumes that the reader either is familiar with the aforementioned material or has immediate access to it. Preliminary Documentation. This Open Specification is preliminary documentation for this technology. Since the documentation may change between this preliminary version and the final version, there are risks in relying on preliminary documentation. To the extent that you incur additional development obligations or any other costs as a result of relying on this preliminary documentation. 1 / 141 [MS-FSSO] – v20090529 File Access Services System Overview Copyright © 2009 Microsoft Corporation. Release: Friday May 29, 2009 Abstract File Access Services are the software and protocols that enable network file access and sharing in Microsoft Windows operating environments. File Access Services allow a client computer to discover, access, and share files that are hosted on, and made available by, a server computer. This document describes the intended functionality of the File Access Services System, how it interacts with systems and applications that need file services, and how it interacts with administrative clients to configure and manage the system. File Access Services uses multiple protocols for file access and file server administration. This document lists those protocols and describes how they are used to implement the File Access Services System. Date Comments 2009.05.29 First draft. 2 / 141 [MS-FSSO] – v20090529 File Access Services System Overview Copyright © 2009 Microsoft Corporation. Release: Friday May 29, 2009 Table of Contents Table of Contents .......................................................................................................... 3 1 Introduction ............................................................................................................ 8 1.1 Glossary .............................................................................................................. 8 1.2 References ......................................................................................................... 12 1.2.1 Normative References .................................................................................... 12 1.2.2 Informative References .................................................................................. 14 2 Overview ............................................................................................................... 16 2.1 System Summary ............................................................................................... 16 2.2 List of Member Protocols ...................................................................................... 17 2.3 Relevant Standards ............................................................................................. 18 3 Foundation ............................................................................................................ 19 3.1 Background Knowledge and System-Specific Concepts ............................................ 19 3.1.1 Domains, Workgroups, and Naming ................................................................. 19 3.1.2 Identity, Accounts and Account Types .............................................................. 20 3.1.3 Domains and Forests ..................................................................................... 20 3.1.4 Group Policy and Active Directory .................................................................... 20 3.1.5 Windows Branch Cache .................................................................................. 21 3.1.6 Additional Network Infrastructure .................................................................... 21 3.1.7 System-Specific Concepts ............................................................................... 21 3.2 System Purposes ................................................................................................ 22 3.3 System Use Cases ............................................................................................... 22 3.3.1 Stakeholders and Interests Summary .............................................................. 22 3.3.2 Supporting Actors and System Interests Summary ............................................ 23 3.3.3 Use Case Diagrams ........................................................................................ 24 3.3.4 Use Case Descriptions .................................................................................... 29 3.3.4.1 Summary Use Cases ................................................................................ 29 3.3.4.1.1 Configure File Service — Admin Tool ..................................................... 29 3.3.4.1.2 Find File in Workgroup — Application .................................................... 30 3.3.4.1.3 Find File in Domain — Application ......................................................... 31 3.3.4.1.4 Communicate through Shared File — Application .................................... 32 3.3.4.2 Detail Use Cases ...................................................................................... 33 3.3.4.2.1 Create Share SMB — Admin Tool .......................................................... 33 3.3.4.2.2 Configure Share Directory — Admin Tool ............................................... 35 3.3.4.2.3 Create DFS Standalone Namespace — Admin Tool .................................. 36 3.3.4.2.4 Create DFS Domain Namespace — Admin Tool ....................................... 37 3.3.4.2.5 Create DFS Link — Admin Tool ............................................................. 38 3.3.4.2.6 List Computers — Application ............................................................... 39 3.3.4.2.7 List Shares SMB — Application ............................................................. 41 3.3.4.2.8 List Shares NFS — Application .............................................................. 42 3.3.4.2.9 List Files SMB — Application ................................................................ 43 3.3.4.2.10 List Files NFS — Application ................................................................. 44 3.3.4.2.11 Open File SMB — Application ............................................................... 45 3.3.4.2.12 Open File NFS — Application ................................................................ 46 3.3.4.2.13 Perform File Operation SMB—Application ............................................... 48 3.3.4.2.14 Perform File Operation NFS — Application .............................................. 49 3.3.4.2.15 Act on Directory Change Notification SMB — Application .......................... 50 4 System Context ..................................................................................................... 52 4.1 System Environment ........................................................................................... 52 4.2 System Assumptions and Preconditions
Recommended publications
  • TCP/IP Fundamentals for Microsoft Windows
    TCP/IP Fundamentals for Microsoft Windows Microsoft Corporation Published: May 21, 2006 Updated: Jan 9, 2012 Author: Joseph Davies Editor: Anne Taussig Abstract This online book is a structured, introductory approach to the basic concepts and principles of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite, how the most important protocols function, and their basic configuration in the Microsoft® Windows Vista™, Windows Server® 2008, Windows® XP, and Windows Server 2003 families of operating systems. This book is primarily a discussion of concepts and principles to lay a conceptual foundation for the TCP/IP protocol suite and provides an integrated discussion of both Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6). The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This content is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. The terms of use of this document can be found at http://www.microsoft.com/info/cpyright.mspx. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
    [Show full text]
  • Windows Server 2003 Security Guide
    Microsoft Solutions for Security and Compliance Windows Server 2003 Security Guide April 26, 2006 © 2006 Microsoft Corporation. This work is licensed under the Creative Commons Attribution-Non Commercial License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc/2.5/ or send a letter to Creative Commons, 543 Howard Street, 5th Floor, San Francisco, California, 94105, USA. Table of Contents iii Contents Chapter 1: Introduction to the Windows Server 2003 Security Guide ............. 1 Overview....................................................................................................1 Executive Summary .....................................................................................1 Who Should Read This Guide.........................................................................2 Scope of this Guide......................................................................................2 Chapter Summaries .....................................................................................3 Chapter 1: Introduction to the Windows Server 2003 Security Guide .............4 Chapter 2: Windows Server 2003 Hardening Mechanisms ............................4 Chapter 3: The Domain Policy..................................................................4 Chapter 4: The Member Server Baseline Policy ...........................................4 Chapter 5: The Domain Controller Baseline Policy .......................................5 Chapter 6: The Infrastructure Server Role .................................................5
    [Show full text]
  • Management Through Firewalls in Relation to Microsoft NT and Windows 2000
    Management through firewalls in relation to Microsoft NT and Windows 2000 Claus Jespersen Hewlett-Packard A/S Vestre Kongevej 4-6 DK-8260 Viby J Denmark Direct: (45) 4599 1829 Fax: (45) 8733 1888 e-mail: Mobile: (45) 4060 1829 [email protected] Solution Architect OpenView/Internet specialist Prepared by: Claus Jespersen Solution Architect Openview/Internet specialist Date Prepared: Februar 2000 Windows 2000 management Management through firewalls in relation to Microsoft NT and Windows 2000 ÿ Document Information Project Name: Management through firewalls in relation to Windows 2000 Project Manager: Document Version No: 1.0 FocusPM Phase: Document Version Date: 17. February 2000 Quality Review Method: Prepared By: Claus Jespersen Preparation Date: 17. February 2000 Reviewed By: Review Date: Distribution List From Date Phone/Fax Claus Jespersen, Hewlett-Packard Denmark, 17. February +4545991829 [email protected] 2000 To Action* Due Date Phone/Fax * Action Types: Approve, Review, Inform, File, Action Required, Attend Meeting, Other (please specify) Version History Ver. No. Ver. Date Revised By Description Filename 1.0 17. First finished version after a few drafts win2kfwmgt-v1.0.doc February 2000 FocusPM White paper by Claus Jespersen, HP Denmark Page2of2 Template (3 /2-Apr-1999) win2kfwmgt-v1.0 Last printed 16-Feb-00 21:58 Windows 2000 management Management through firewalls in relation to Microsoft NT and Windows 2000 ÿ 1. Proprietary Notice..............................................................................................................................................7
    [Show full text]
  • DPS7000/XTA User's Guide Security on the DIANE System
    A Security of the DIANE System ASCALE 7000 DPS7000/XT NOV Security REFERENCE 47 A2 02EL 01 DPS7000/XTA NOVASCALE 7000 Security of the DIANE System Security September 2004 BULL CEDOC 357 AVENUE PATTON B.P.20845 49008 ANGERS CEDEX 01 FRANCE REFERENCE 47 A2 02EL 01 The following copyright notice protects this book under Copyright laws which prohibit such actions as, but not limited to, copying, distributing, modifying, and making derivative works. Copyright Bull SAS 2004 Printed in France Suggestions and criticisms concerning the form, content, and presentation of this book are invited. A form is provided at the end of this book for this purpose. To order additional copies of this book or other Bull Technical Publications, you are invited to use the Ordering Form also provided at the end of this book. Trademarks and Acknowledgements We acknowledge the right of proprietors of trademarks mentioned in this book. Intel® and Itanium® are registered trademarks of Intel Corporation. Windows® and Microsoft® software are registered trademarks of Microsoft Corporation. UNIX® is a registered trademark in the United States of America and other countries licensed exclusively through the Open Group. Linux® is a registered trademark of Linus Torvalds. The information in this document is subject to change without notice. Bull will not be liable for errors contained herein, or for incidental or consequential damages in connection with the use of this material. Preface Preface Purpose This document targets customers requiring information about security issues on the Diane system (DPS7000/XTA). Several aspects of security are dealt with: NTFS permissions, essential services for the smooth running of the system and its maintenance, user groups and accounts, the NetBios share, the use of an antivirus software and the Windows updates.
    [Show full text]
  • Netbios, Netbeui, NBF, NBT, NBIPX, SMB, CIFS Networking
    NetBIOS, NetBEUI, NBF, NBT, NBIPX, SMB, CIFS Networking Timothy D Evans NetBIOS, NetBEUI, NBF, NBT, NBIPX, SMB, CIFS Networking by Timothy D Evans Copyright © 1998, 2003 by Timothy D Evans Unlimited non-commercial distribution of this document in its entirety is encouraged, please contact the author prior to commercial publication. Important: This documentation is revised from time to time. Some of the technology described is constantly changing and being developed, especially the higher level protocols. Thus this document may not always be up to date. The reader is encouraged to ensure they have the latest version. All trade marks are respectfully acknowledged. While every precaution has been taken in the preparation of this documentation the author assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. Table of Contents Preface.....................................................................................................................................7 Who should read this documentation.......................................................................7 Organization of this documentation .........................................................................7 Acknowledgments .......................................................................................................8 Notation.........................................................................................................................8 Language .......................................................................................................................8
    [Show full text]
  • Threats and Countermeasures: Security Settings in Windows Server 2003 and Windows XP
    Solutions for Security and Compliance Threats and Countermeasures: Security Settings in Windows Server 2003 and Windows XP Version 2.0 Published: December 2005 For the latest information, please see www.microsoft.com/technet/security © 2005 Microsoft Corporation. This work is licensed under the Creative Commons Attribution-NonCommercial License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc/2.5/ or send a letter to Creative Commons, 543 Howard Street, 5th Floor, San Francisco, California, 94105, USA. Threats and Countermeasures iii Contents 1 1 Introduction to Threats and Countermeasures: Security Settings in Windows Server 2003 and Windows XP..............................................1 Chapter Summaries ............................................ 4 Tools and Templates ........................................................ 6 2 7 Domain Level Policies.............................................. ...........................7 Account Policies ........................................................................... 7 More Information ......................................................................... 21 3 22 Audit Policy...................................................................................... .22 Audit Settings .................................................................. 24 More Information ......................................................................... 31 4 32 User Rights...................................................................... .................32
    [Show full text]
  • Windows 2000
    AppendixC Windows 2000 The Microsoft Windows operating system is a 32-bit preemptive multitasking operating system for Intel Pentium and later microprocessors. The successor to the Windows NT operating system, it was previously named Windows NT Version 5.0. Key goals for the system are portability, security, Portable Oper- ating System Interface (POSIX or IEEE Std. 1003.1) compliance, multiprocessor support, extensibility, international support, and compatibility with MS-DOS and Microsoft Windows applications. In this appendix, we discuss the key goals for this system, the layered architecture of the system that makes it so easy to use, the file system, networks, and the programming interface. C.1 History In the mid-1980s, Microsoft and IBM cooperated to develop the OS/2 operating system, which was written in assembly language for single-processor Intel 80286 systems. In 1988, Microsoft decided to make a fresh start and to develop a “new technology” (or NT) portable operating system that supported both the OS/2 and POSIX application programming interfaces (APIs). In October 1988, Dave Cutler, the architect of the DEC VAX/VMS operating system, was hired and given the charter of building this new operating system. Originally, the team planned for NT to use the OS/2 API as its native environment, but during development, it was changed to use the 32-bit Windows API (or Win32 API), reflecting the popularity of Windows 3.0.The first versions of NT were Windows NT 3.1 and Windows NT 3.1 Advanced Server. (At that time, 16-bit Windows was at Version 3.1.) Windows NT 4.0 adopted the Windows 95 user interface and incorporated Internet web-server and web-browser software.
    [Show full text]
  • Page 1 of 22 Appendix B
    Appendix B - Windows 2000 Network Architecture Page 1 of 22 Windows 2000 Server Appendix B - Windows 2000 Network Architecture Microsoft® Windows® 2000 network architecture is composed of software components that provide networking abilities to the Windows 2000 operating system. This appendix describes the components, protocols, and interfaces within Windows 2000. In addition, it introduces the networking concepts that provide a foundation for the other chapters in this book to build upon. In This Appendix Overview of Windows 2000 Network Architecture Network Driver Interface Specification Network Protocols Transport Driver Interface Network Application Programming Interfaces Interprocess Communication Basic Network Services Related Information in the Resource Kit l For more information about SNA protocols, see "Interoperability with IBM Host Systems" in the Microsoft® Windows® 2000 Server Resource Kit Internetworking Guide. Overview of Windows 2000 Network Architecture This chapter describes software and hardware components and the connections between them that allow computers to function as a network. Windows 2000 network components are arranged in layers. Each layer has specific tasks to perform and within each layer more than one component can perform a similar task. The Windows 2000 network layers are described in the following sections from the bottom of the network architecture model up to the top. The layers are: Network Driver Interface Specification (NDIS) Layer NDIS is the layer that provides a communication path from a network transport to a physical device, such as a network adapter. NDIS acts as a boundary layer between network adapters and network protocols and manages the binding between these components. NDIS adds support for connection-oriented network media such as ATM and Integrated Services Digital Network (ISDN) and continues to support traditional connectionless network media such as Ethernet, Token Ring, and Fiber Distributed Data Interface (FDDI).
    [Show full text]
  • Sniffer Network Optimization and Troubleshooting Handbook Copyright © 2002 by Syngress Publishing, Inc.All Rights Reserved
    219_sniffer_FM.qxd 6/28/02 2:28 PM Page i [email protected] With more than 1,500,000 copies of our MCSE, MCSD, CompTIA, and Cisco study guides in print, we continue to look for ways we can better serve the information needs of our readers. One way we do that is by listening. Readers like yourself have been telling us they want an Internet-based ser- vice that would extend and enhance the value of our books. Based on reader feedback and our own strategic plan, we have created a Web site that we hope will exceed your expectations. [email protected] is an interactive treasure trove of useful infor- mation focusing on our book topics and related technologies. The site offers the following features: ■ One-year warranty against content obsolescence due to vendor product upgrades. You can access online updates for any affected chapters. ■ “Ask the Author” customer query forms that enable you to post questions to our authors and editors. ■ Exclusive monthly mailings in which our experts provide answers to reader queries and clear explanations of complex material. ■ Regularly updated links to sites specially selected by our editors for readers desiring additional reliable information on key topics. Best of all, the book you’re now holding is your key to this amazing site. Just go to www.syngress.com/solutions, and keep this book handy when you register to verify your purchase. Thank you for giving us the opportunity to serve your needs. And be sure to let us know if there’s anything else we can do to help you get the maximum value from your investment.
    [Show full text]
  • DAVE 2.5 Manual
    Network Your Macintosh With Wintel PCs DADAVEVE TM for Macintosh Copyright, Warranty and Trademark Notices This manual and the software it describes are Copyright © 1996-1999 by Thursby Software Systems, Inc., All Rights Reserved. The software described is furnished under license and may be used or copied only in accordance with the terms of such license. A copy of that license is included in Appendix A of this manual. Thursby Software Systems, Inc. (TSS) warrants that at the time of delivery of the original software supplied to the Licensee, and for a period of ninety (90) days thereaf- ter, that the original software will perform in accordance with the specifications described in this manual. TSS does not warrant that the Software will meet all of Licensee’s requirements or will operate uninterrupted or error-free. The extent of TSS’s liability under this warranty shall be limited to supplying, as soon as practicable, Code Corrections which TSS determines to be necessary, provided that written notice of a claimed problem is received by TSS within the warranty period. If after repeated efforts, TSS is unable to make the software operate as warranted, the Licensee may discontinue the DAVE license(s) and receive a refund of the License Fee(s) paid. THURSBY SOFTWARE SYSTEMS, INC. MAKES NO WARRANTIES, EITHER EXPRESSED OR IMPLIED, REGARDING THE ENCLOSED COMPUTER SOFT- WARE PACKAGE, ITS MERCHANTABILITY OR ITS FITNESS FOR ANY PARTICULAR PURPOSE. THE EXCLUSION OF IMPLIED WARRANTIES IS NOT PERMITTED BY SOME STATES. THE ABOVE EXCLUSION MAY NOT APPLY TO YOU. THIS WARRANTY PROVIDES YOU WITH SPECIFIC LEGAL RIGHTS.
    [Show full text]
  • File and Printer Sharing with Microsoft Windows
    Operating System File and Printer Sharing with Microsoft Windows Microsoft Corporation Published: November 2003 Abstract File and printer sharing in Microsoft® Windows® allows you to share the contents of selected folders and locally attached printers with other computers. Windows XP, Windows 2000, Windows 98, Windows Millennium Edition (Me), and Windows NT® 4.0 support file and printer sharing. For each of these operating systems, this article describes the features, components, connection process, how to share a folder and connect to a shared folder, how to share a printer and connect to a shared printer, and how to manage file sharing in a small office/home office environment. Microsoft® Windows® XP Technical Article The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO THE INFORMATION IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document.
    [Show full text]
  • Ethernet Design Considerations for Control System Networks an INTRODUCTION
    Ethernet Design Considerations for Control System Networks AN INTRODUCTION PUBLICATION ENET-SO001A-EN-E–November 2007 Contact Rockwell Customer Support Telephone — 1.440.646.3434 Online Support — http://www.rockwellautomation.com/support/ Copyright Notice © 2007 Rockwell Automation Technologies, Inc. All rights reserved. Printed in USA. This document and any accompanying Rockwell Software products are copyrighted by Rockwell Automation Technologies, Inc. Any reproduction and/or distribution without prior written consent from Rockwell Automation Technologies, Inc. is strictly prohibited. Please refer to the license agreement for details. Trademark Notices Allen-Bradley, ControlLogix, FactoryTalk, Rockwell Automation, Rockwell Software, RSLinx, RSView, and the Rockwell Software logo, are registered trademarks of Rockwell Automation, Inc. The following logos and products are trademarks of Rockwell Automation, Inc.: FactoryTalk Batch, FactoryTalk Historian Classic, FactoryTalk Directory, FactoryTalk Security, FactoryTalk View. Any Rockwell software or hardware not mentioned here are also trademarks, registered or otherwise, of Rockwell Automation Technologies, Inc. Other Trademarks ActiveX, Microsoft, Microsoft Access, SQL Server, Visual Basic, Visual C++, Visual SourceSafe, Windows, Windows ME, Windows NT, Windows 2000, Windows Server 2003, and Windows XP are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Adobe, Acrobat, and Reader are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. ControlNet is a registered trademark of ControlNet International. DeviceNet is a trademark of the Open DeviceNet Vendor Association, Inc. (ODVA). Ethernet is a registered trademark of Digital Equipment Corporation, Intel, and Xerox Corporation. OLE for Process Control (OPC) is a registered trademark of the OPC Foundation.
    [Show full text]