The top 10 networking security tips from 2007 teach you how to test network security, manage Windows network rights...
and manage network passwords. Our top networking security tip of the year, Hunting down a hacker, can also help you track down an intruder in your network.
Another popular networking security topic on our site this year was network rights management. Many of our readers wanted to know how to secure settings for shared files, how to grant admin privileges in Windows and how to manage Windows folder permission.
Check out our top 10 list for tips that could help you solve some of your Windows network security concerns once and for all.
Hunting down a hacker
Learn how to track down users who have hacked your Windows network with this expert advice.
Secure settings for shared files
Proper file sharing settings are vital to ensuring that important and commonly used documents stay exactly the way you want them. In this tip, get the information you need on how to keep your shared files intact.
Use a network analyzer to sniff the network
A network analyzer is a useful tool, helping you do things like track traffic and malicious usage on the network. Learn how to use a "sniffer" and all its capabilities.
Using sudowin to grant administrator privileges in Windows
With sudowin, it's easy to achieve privilege escalation in Windows, which allows you to run programs with administrator privileges in one user account. Find out how in this tip.
Use GPOs to specify Windows network access for users
If you properly configure Group Policy Objects (GPOs), you can control which users can access your network and from where they can do it. Learn how to give specific users access to one specific machine in this tip.
Manage folder permissions in Windows networks
Learn how to prevent users from creating and deleting folders, and improve folder management and file management for Windows network security.
Group Policy management: Disabling CMD
You can disable CMD in Group Policy in two steps according to Wes Noonan, our Windows-based network infrastructure security design expert. In this tip, he'll tell you how to prevent your network users from enabling CMD.
NTFS and the Registry in Vista packaged up
Windows Vista packages the Registry and NTFS functions, omitting transaction failure and allowing for "roll backs" instead. See an example in this excerpt by Mark Minasi.
Locate removable device IDs for Group Policy settings
Learn to locate the necessary removable storage device IDs in order to configure Group Policy settings and prevent the use of these vulnerable devices.
How to manage network access for single users in AD
Alter a few settings to limit single user network access in an AD domain to simplify Active Directory management.