Selecting a boot partition security

Selecting a boot partition security
Adesh Rampat

When you set up a boot partition on a network servers, chances are you may use NTFS, as opposed to FAT, for the following major reasons:

Requires Free Membership to View

  • Security


  • Assigning Disk Quotas


  • Encryption features


  • Transaction logging


But even though it seems counter-intuitive, when you install either Windows NT or Win2k, consider partitioning the hard drive in two separate partitions, making the boot partition FAT and the reminder NTFS.

This may seem to be a risky procedure, since FAT partitions contain no measure of security. The reason for using FAT as the boot partition, though, is that in the event of a boot failure, it is much easier to apply recovery procedures to a FAT partition than an NTFS partition.

Because the FAT partition offers the least security you can get, it must contain only the operating system. In no circumstance should the FAT partition contain any applications or data pertaining to the organization's operations. This information should be stored on the NTFS partition.

Whether you're using FAT or NTFS partitions, you should have the server in a secure environment, protecting it from unauthorized personnel at all times.

Adesh Rampat is a member of the Association of Internet Professionals, the Institute for Network Professionals and the International Webmasters Association. He has also lectured extensively on a variety of topics.

Did you like this tip? If so, (or if not) why not let us know. Send an email to us and sound off. Or visit our tips page to rate this tip, or submit one of your own.

Related Book

Windows 2000 Security Handbook
Author : Tom Sheldon and Phil Cox
Publisher : McGraw-Hill
Published : Dec 2000
Summary :
Deploy and administer bullet-proof Windows 2000 security policies. This book explains how to safeguard intranet, Internet, and e-commerce transactions with IPSec, defend against hacking, spoofing, sniffing, and DDS attacks, and secure your network with firewalls, proxy servers, and VPNs.


This was first published in April 2001

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.