----------------------------------------------------------- SearchWin2000.com's Security Tip ----------------------------------------------------------- TODAY'S SECURITY TIP: Special access permissions ========================================================== SPONSORED BY: SurfControl ========================================================== SECURITY ALERT: This threat comes from inside your company. Confidentiality leaks and "inappropriate" jokes can cost your company millions. It doesn't stop there -- your unmanaged email system is left vulnerable to spam and spoof attacks -- even worse, virus attacks! Improve your email system efficiency, increase security and limit legal liability the easy way. Install SuperScout Email Filter -- Try it FREE for 30-days. DOWNLOAD now at: http://www.surfcontrol.com/offer/TTST0612 =========================================================== "Special access permissions" By Adesh Rampat When assigning a user access rights to files or folders, you can provide more detail than just the standard permissions available, e.g. Full Control, Read, Write etc. You can also assign special access permission that allows for advanced security restriction to files and folders. This may be required especially if the user is not trusted. If that is the case, the following procedure can be applied: � Right-Click on the file/folder to be shared � Click on the Security Tab then select the Advanced button � Click on the Add button in order to add a user Apply the necessary permissions for that user. Select the drop down button in the "Apply onto" field to select where the permissions should be applied. If you want to change the permissions for a user who is already granted access to the folder, right click on the folder and select Advanced as above. Then highlight the user in the dialog box, and click the View/Edit button. You have a list now that you can use to fine-tune the permissions for that user. Finally, you can also select the Auditing TAB to audit user activity for the permissions set. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Adesh Rampat is a member of the Association of Internet Professionals, the Institute for Network Professionals and the International Webmasters Association. He has also lectured extensively on a variety of topics. ======================================================== Did you like this tip? If so, (or if not) why not let us know? Send an email to us at mailto:[EMAIL PROTECTED] and sound off. ========================================================== SPONSORED BY: ConfigureSoft ========================================================== Secure Your Enterprise - With Enterprise Configuration Manager Configuration problems cause the majority of security breaches. ECM is the only tool that allows you to explore and manage security configurations in sufficient detail to eliminate these errors before breaches occur. ECM 3.5 collects thousands of configuration settings from every machine in your network, provides group and enterprise views of security-related data, and compares actual settings to established standards. It also enables you to fix most problems from the central console. Find out what ECM collects and how you can secure your enterprise using ECM: http://ad.doubleclick.net/clk;2970280;5058249;m?http://www.configuresoft.com/getuserinfo.asp?code=swk0612s ======================================================== Featured Book ======================================================== "Windows 2000 Administration in a Nutshell" Author: Mitch Tulloch Publisher: O'Reilly & Associates Published: Feb 2001 Anyone who installs Windows 2000, creates a user, or adds a printer is a 2000 system administrator. This book covers all the important day-to-day administrative tasks, and the tools for performing each task are included in a handy easy-to-look-up alphabetical reference. What's the same and what's different between the Windows 2000 and Windows NT platform? Has the GUI or the networking architecture changed, and if so, how? Windows 2000 Administration in a Nutshell addresses the problems associated with bridging the gap between the Windows NT and Windows 2000 platforms. http://www.digitalguru.com/dgstore/product.asp?isbn=1565927133&ac_id=73 ==================================================================== WIN! WIN! WIN! -------------------------------------------------------------------- Our June Tip of the Month contest just got started. DON'T MISS YOUR CHANCE TO WIN THIS MONTH'S PRIZE - A TOSHIBA DVD-ROM/CD-RW BURNER! Check out last month's winning tips and this month's prize, or submit a tip of your own today! Just go to http://searchwin2000.techtarget.com/tipsHallOfFame/0,289489,sid1_prz555787_cts555785,00.html. ======================================================== If you would like to sponsor this or any TechTarget.com newsletter, please contact Gabrielle DeRussy at [EMAIL PROTECTED] ======================================================== If you no longer wish to receive this newsletter simply reply to this message with "REMOVE" in the subject line. Or, visit http://searchWin2000.techtarget.com/register and adjust your subscriptions accordingly. If you choose to unsubscribe using our automated processing, you must send the "REMOVE" request from the email account to which this newsletter was delivered. Please allow 24 hours for your "REMOVE" request to be processed.
