-----------------------------------------------------------
SearchWin2000.com's Security Tip
-----------------------------------------------------------

TODAY'S SECURITY TIP: Special access permissions

==========================================================
SPONSORED BY: SurfControl 
==========================================================
SECURITY ALERT: This threat comes from inside your company.
Confidentiality leaks and "inappropriate" jokes can cost your company
millions. It doesn't stop there -- your unmanaged email system is
left vulnerable to spam and spoof attacks -- even worse, virus
attacks! Improve your email system efficiency, increase security and
limit legal liability the easy way. Install 
SuperScout Email Filter -- Try it FREE for 30-days. DOWNLOAD now at:
http://www.surfcontrol.com/offer/TTST0612 
 
===========================================================
"Special access permissions"
By Adesh Rampat

When assigning a user access rights to files or folders, you can
provide more detail than just the standard permissions available,
e.g. Full Control, Read, Write etc. You can also assign special
access permission that allows for advanced security restriction to
files and folders.

This may be required especially if the user is not trusted. If that
is the case, the following procedure can be applied:

� Right-Click on the file/folder to be shared 
� Click on the Security Tab then select the Advanced button 
� Click on the Add button in order to add a user 

Apply the necessary permissions for that user. Select the drop down
button in the "Apply onto" field to select where the permissions
should be applied.

If you want to change the permissions for a user who is already
granted access to the folder, right click on the folder and select
Advanced as above. Then highlight the user in the dialog box, and
click the View/Edit button. You have a list now that you can use to
fine-tune the permissions for that user.

Finally, you can also select the Auditing TAB to audit user activity
for the permissions set.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Adesh Rampat is a member of the Association of Internet
Professionals, the Institute for Network Professionals and the
International Webmasters Association. He has also lectured
extensively on a variety of topics.
========================================================
Did you like this tip? If so, (or if not) why not let us know? Send
an email to us at mailto:[EMAIL PROTECTED] and sound off.

==========================================================
SPONSORED BY: ConfigureSoft 
==========================================================
Secure Your Enterprise - With Enterprise Configuration Manager
Configuration problems cause the majority of security breaches. ECM
is the only tool that allows you to explore and manage security
configurations in sufficient detail to eliminate these errors before
breaches occur. ECM 3.5 collects thousands of configuration settings
from every machine in your network, provides group and enterprise
views of security-related data, and compares actual settings to
established standards. It also enables you to fix most problems from
the central console. Find out what ECM collects and how you can
secure your enterprise using ECM: 
http://ad.doubleclick.net/clk;2970280;5058249;m?http://www.configuresoft.com/getuserinfo.asp?code=swk0612s

========================================================
Featured Book
========================================================
"Windows 2000 Administration in a Nutshell" 
Author: Mitch Tulloch 
Publisher: O'Reilly & Associates 
Published: Feb 2001 
 
Anyone who installs Windows 2000, creates a user, or adds a printer
is a 2000 system administrator. This book covers all the important
day-to-day administrative tasks, and the tools for performing each
task are included in a handy easy-to-look-up alphabetical reference.
What's the same and what's different between the Windows 2000 and
Windows NT platform? Has the GUI or the networking architecture
changed, and if so, how? Windows 2000 Administration in a Nutshell
addresses the problems associated with bridging the gap between the
Windows NT and Windows 2000 platforms.
http://www.digitalguru.com/dgstore/product.asp?isbn=1565927133&ac_id=73 
====================================================================
WIN! WIN! WIN!
--------------------------------------------------------------------
Our June Tip of the Month contest just got started. DON'T MISS YOUR
CHANCE TO WIN THIS MONTH'S PRIZE - A TOSHIBA DVD-ROM/CD-RW BURNER!  

Check out last month's winning tips and this month's prize, or submit
a tip of your own today! 

Just go to
http://searchwin2000.techtarget.com/tipsHallOfFame/0,289489,sid1_prz555787_cts555785,00.html.

========================================================
If you would like to sponsor this or any TechTarget.com newsletter,
please contact Gabrielle DeRussy at [EMAIL PROTECTED]
========================================================


If you no longer wish to receive this newsletter simply reply to 
this message with "REMOVE" in the subject line.  Or, visit 
http://searchWin2000.techtarget.com/register 
and adjust your subscriptions accordingly. 

If you choose to unsubscribe using our automated processing, you 
must send the "REMOVE" request from the email account to which 
this newsletter was delivered.  Please allow 24 hours for your 
"REMOVE" request to be processed.

Reply via email to