Securing the Windows 2000 workstation
When applying security to network equipment the network administrator needs to pay special attention to securing the Windows 2000 workstation. Certain security procedures remain the same as compared to the server the following steps can be applied when looking to implement security to the Windows 2000 workstation:
- Use NTFS partitions to apply security permissions and be able to perform audit procedures on files and folders;
- Rename the Guest Account which will help prevent unauthorized personnel from logging on to the workstation locally;
- Rename the Administrator Account can help prevent an unauthorized user from gaining access to the computer locally and performing administrative functions such as altering user restriction options;
- Apply user-level restrictions after consultation with the CIO. When a user account is created the network administrator is presented with various user restriction options that specify what level of access the user has to the workstation;
- Make sure that the anti-virus engine and its virus definitions are always updated to prevent files from being infected;
- Limit the number of users logging on to the workstation locally;
- Don't identify workstations on the network using standard naming conventions, such as Jim Brown or J. Brown. It is preferable to use workstation serial numbers
- A workstation that is to be used for Internet access should have file sharing disabled. Otherwise, it presents an open port for a hacker to browse through the hard drive.
Adesh Rampat has 10 years experience with network and IT administration. He is a member of the Association Of Internet Professionals, the Institute For Network Professionals, and the International Webmasters Association. He has also lectured extensively on a variety of topics.
Did you like this tip? If so, (or if not) why not let us know. Send an email to us and sound off. Or visit our tips page to rate this tip, or submit one of your own.
Windows NT and 2000 Workstation and Server, 1/e
Author : Jim Mohr
Publisher : Prentice Hall
ISBN/CODE : 0130830682
Cover Type : Soft Cover
Pages : 500
Published : Jan 2000
In this book, James Mohr--who currently supports over 1,000 Windows users worldwide--brings together real-world solutions and best practices for a variety of system administration challenges. Discover better ways to document and standardize your Windows network and IP addressing scheme--and practical techniques for protecting yourself against intruders and viruses. Master today's best processes for tracking support calls and measuring your responses. Learn how to select the most appropriate hardware for home and satellite offices; compare your options for managing desktops, software, and licenses; and much more.
This was first published in March 2001