Tip

Securing the Windows 9.x workstation

Securing the Windows 9.x Workstation
Adesh Rampat

You probably have users on Windows 9.x. This tip offers some ideas for providing security on those workstations. Do you have more ideas? Why not send them in, and we'll enter you in our tips contest for some neat prizes.

Implementing security using Windows 9.x operating system requires a little more patience as opposed to a Windows NT/2000 operating system. The major reason for this is that Windows 9.x was designed without many security features. If you have users who still use the Windows 95 or 98 operating system, here is some insight when implementing security for those workstations.

Many users implement a screen saver password to prevent unwanted access to the workstation. The screen saver password by itself is not an effective means of protecting a workstation. When used, however, with additional security features mentioned below it can be an effective tool.

If implemented properly, the network logon password can be an effective form of security. Through the use of the sSystem policy editor, you can prevent someone who does not have a network password from gaining access to the workstation. When setting this up, however, make sure that the box that says, "Don't show last logon" is unchecked. This allows the previous username to be displayed in the event that someone with a valid username and password were to logon to the network using the workstation.

    Requires Free Membership to View

The Windows password offers no security. This password only identifies which user preferences to load. If there is more than one user using the workstation, the Windows password may be needed to load various user preferences.

File sharing should at all times be prohibited especially when performing Internet browsing. If the workstation is to be setup for Internet use, then disable File Sharing.

File security is generally not provided in Windows 9.x. Have users save confidential data to a server where it is better protected. If a user desires to protect a file stored on the local hard drive then in most cases the file(s) that require protection would be used by Microsoft Office Suite. The recommended approach would be to use Microsoft Office application's protection features.


Adesh Rampat has 10 years experience with network and IT administration. He is a member of the Association of Internet Professionals, the Institute for Network Professionals and the International Webmasters Association. He has also lectured extensively on a variety of topics.

Did you like this tip? Why not let us know. Email to sound off.

Related Book

Microsoft® Windows® 98 Field Guide
Author : Stephen L. Nelson
Publisher : Microsoft Press
Published : Feb 2000
Summary :
MICROSOFT® WINDOWS® 98 FIELD GUIDE is the fast way to find practical answers about Microsoft® Windows® 98. With this handy reference and guide, accurate information about everything from tools to terms to techniques is always close at hand.


This was first published in July 2001

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.