Selecting a boot partition security
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
When you set up a boot partition on a network servers, chances are you may use NTFS, as opposed to FAT, for the following major reasons:
- Assigning Disk Quotas
- Encryption features
- Transaction logging
But even though it seems counter-intuitive, when you install either Windows NT or Win2k, consider partitioning the hard drive in two separate partitions, making the boot partition FAT and the reminder NTFS.
This may seem to be a risky procedure, since FAT partitions contain no measure of security. The reason for using FAT as the boot partition, though, is that in the event of a boot failure, it is much easier to apply recovery procedures to a FAT partition than an NTFS partition.
Because the FAT partition offers the least security you can get, it must contain only the operating system. In no circumstance should the FAT partition contain any applications or data pertaining to the organization's operations. This information should be stored on the NTFS partition.
Whether you're using FAT or NTFS partitions, you should have the server in a secure environment, protecting it from unauthorized personnel at all times.
Adesh Rampat is a member of the Association of Internet Professionals, the Institute for Network Professionals and the International Webmasters Association. He has also lectured extensively on a variety of topics.
Did you like this tip? If so, (or if not) why not let us know. Send an email to us and sound off. Or visit our tips page to rate this tip, or submit one of your own.
Windows 2000 Security Handbook
Author : Tom Sheldon and Phil Cox
Publisher : McGraw-Hill
Published : Dec 2000
Deploy and administer bullet-proof Windows 2000 security policies. This book explains how to safeguard intranet, Internet, and e-commerce transactions with IPSec, defend against hacking, spoofing, sniffing, and DDS attacks, and secure your network with firewalls, proxy servers, and VPNs.