HomeSubject Indexsecurity
Subject Index


Preparing to use Windows 2000 group policies

Change control and distributed security are two issues that affect not only large organizations but also small ones. In some respects, they can be even more important in a small organization than in a larger one. If you allow a...more

Analyze your server's security with the Security Configuration and Analysis Snap-in

There is no question that your Windows 2000 server is secure, right? Or do you only think it’s secure? Often, you won’t know about security holes until a hacker has already found them for you—and then it’s too late. One...more |

Know what's happening on your Windows 2000 server with auditing

Security is a major concern with network administrators. You can't keep up with everything that's going on simultaneously on your network. However, you can configure audit policies to help you track a variety of activities and keep your network safe....more

Creating a Windows 2000 audit policy

Security is often one of the top concerns for network administrators. After all, it's not uncommon for networks to contain confidential data such as employee records or information on new products. Fortunately, there are countless security mechanisms that you can...more

Creating an automatic logon for your Windows server

As you know from years of working with Windows NT, before you can do anything on your server, you must log on. The traditional way of doing so is by pressing [Ctrl][Alt][Del] and providing a password when the server starts...more |

Best practices for securing Windows Server 2003

If you've ever deployed Windows NT Server or Windows 2000 Server, you probably know that Microsoft designed those products to be unsecure by default. Although Microsoft has provided many security mechanisms, it's been up to you to implement them. But...more

Tips to help secure Windows Server 2003 Active Directory

If I were to tell you that Windows NT Server 4.0 was a lot more secure than Windows 2000 Server, you would probably think that I had lost my mind. Sometimes, though, truth is stranger than fiction. In some ways,...more

Securing information with Windows Rights Management Services

Most companies go to great lengths to protect data. All of your efforts to secure files basically boil down to how much you trust your employees. You have always been able to control access to files through authentication and permissions,...more

Run Microsoft Baseline Security Analyzer 1.2 from the command line

With the release of version 1.2 of the Microsoft Baseline Security Analyzer (MBSA 1.2), Microsoft has vastly improved this already excellent proactive security tool and turned it into a much more full-featured utility. The MBSA includes a powerful graphical user...more |

Check Group Policy assignment with RSoP

It's a good bet you're familiar with group policy, which enables administrators to assert change control and set a broad range of settings for the operating system, desktop and working environment, network, and much more for servers and workstations. You...more

New Windows Server 2003 tool boosts group-policy control

Anyone who has ever administered group policies in a Windows 2000 Server environment knows that the process can be both confusing and frustrating. Although Microsoft's hierarchical approach to group policy implementation makes sense at a logistical level, the management interface...more

Enabling automatic logons

Although it does seem to go against basic security rules, there are some situations when you might need to set up an Windows NT machine to log on automatically, completely bypassing the standard logon sequence. This might be necessary for...

Cached credentials: Another security issue

It's amazing how often a simple convenience for you becomes a virtual gift horse for a cracker. And since it seems like everybody's attempting to breach network security, it helps to be aware of the conveniences that may be in...

Auditing failed logons to track hacker activity

Hackers often gain access to a system by setting up an automated program that bombards a server with thousands of possible password combinations. Windows NT provides an auditing utility that can help you recognize these hacking attempts by tracking events...

Dealing with file types that execute automatically

Virus and script attacks leave many users and administrators feeling vulnerable, and for good reason. Antivirus software and other security tools are available, but another way to address some of these attacks is by using certain system settings that can...

Stopping unauthorized DNS zone transfers

If you do not specifically configure your DNS server to accept zone transfer requests only from designated sources, anyone on the Internet with the proper tools can transfer a complete copy of your DNS zone database to their system....

When you create a DNS zone, the name of the logged-on user is automatically placed in the SOA record

Did you know that when you create a new zone file in DNS, you might inadvertently reveal the name of the administrator account? When you create a DNS zone, the name of the logged-on user is automatically placed in the...

Secure the Administrator account

One of the most important user accounts in any network is the Administrator account. Users that can access this account can pretty much do anything they darn well please. You definitely don't want this account falling into the hands of...

Password expiration notification

As you know, security-minded administrators apply policies to user accounts that define password length, uniqueness, and expiration requirements. By default, Windows NT displays the password expiration notification 14 days in advance. If users complain that this is too little or...more

Keeping passwords unique with domain account policies

A solid password aging policy can help secure network resources by forcing users to select different passwords periodically. Not only does this make it more difficult for intruders to guess user passwords, it also limits the amount of time that...more

Other subjects related to "security"

Contact Us | Authors | Subject Index | RSS Feeds

Copyright ©2007