-----------------------------------------------------------
SearchWin2000.com's Security Tip
-----------------------------------------------------------

TODAY'S SECURITY TIP: Secure your peer-to-peer networks

============================================================
Sponsored by VeriSign - The Internet Trust Company 
============================================================
Secure your servers with 128-bit SSL encryption! Grab your copy of
VeriSign's FREE Guide, "Securing Your Web site for Business," and
you'll learn everything you need to know about using 128-bit SSL to
encrypt your e-commerce transactions, secure your corporate intranets
and authenticate your Web sites. 128-bit SSL is serious security for
your online business. Get it now!
http://www.verisign.com/cgi-bin/go.cgi?a=n094440330003000
============================================================
Tips Summary 

"Secure your peer-to-peer networks"

By Adesh Rampat

Because peer-to-peer networks might crop up in small remote offices,
it's possible to find them in large enterprises. So this tip, about
security considerations for Win 2000 peer-to-peer networks, is
particularly apt. We're looking for a wide range of tips, so why not
submit one from your own experience. Follow this link
http://searchwin2000.techtarget.com/tipsSubmit/1,289485,sid1,00.html.
____________________________________________________________________

Implementing a peer-to-peer network using Windows 2000 requires a few
more security considerations than is the case when you are using
Domain Controllers. 

Whether you're using peer-to-peer or domain controllers, the major
security concept of sharing resources remain the same: Each user must
have the proper permissions when accessing a shared resource on the
network. 

Here are guidelines for sharing resources in a Windows 2000 peer- to-
peer network:

-If a resource that is being shared contains confidential information
then use the $ symbol (e.g. C$). This hides the shared resource from
network neighborhood. Also, implement a password to access the shared
resource. 

-In most instances, each PC will be used to share a resource. This
will result in the PC's being powered on most of the time, even if
the user is unavailable. So users should lock their PCs when they're
away by pressing CTRL-ALT-DEL and selecting Lock. Alternatively, you
can install a Lock Session shortcut, as we detailed in a previous tip
at
http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci747552,00.html. 
This prevents other users from logging onto the PC, and it stops
passers-by from getting into your network.

Using Groups to Assign Permissions

With peer-to-peer networking, it is best to create one account for
users who will be sharing the same resource and who will obviously
have the same rights and permissions to these resources. Creating a
user/group account can be performing by the following:

-In the computer management console, (right-click on My Computer and
select manage) expand the local users and group console.

Here you can create either a new user or group.

Assigning User Rights

Do not grant individual rights to users who wish to access a shared
resource. Instead, create groups and assign permissions and rights to
these groups who will be accessing a shared resource.

To assign rights:

-In the administrative tools folder (which is accessible form Control
Panel) go to local security. 

-Expand local policies then click on user rights assignment. Then
assign the necessary permissions on the objects. 
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Adesh Rampat has 10 years experience with network and IT
administration. He is a member of the Association of Internet
Professionals, the Institute for Network Professionals and the
International Webmasters Association. He has also lectured
extensively on a variety of topics.
========================================================
Did you like this tip? If so (or if not), why not let us know? Send
an email to us at mailto:[EMAIL PROTECTED] and sound off.

========================================================
Featured Book
========================================================
"Peer-to-Peer: Harnessing the Power of Disruptive Technologies"
Author: Andy Oram
Publisher: O'Reilly & Associates
Published: Mar 2001
 
The term "peer-to-peer" has come to be applied to networks that
expect end users to contribute their own files, computing time, or
other resources to some shared project. Even more interesting than
the systems' technical underpinnings are their socially disruptive
potential: in various ways they return content, choice, and control
to ordinary users. This book presents the goals that drive the
developers of the best-known peer-to-peer systems, the problems
they've faced and the technical solutions they've found.

http://www.digitalguru.com/dgstore/product.asp?isbn=059600110X&ac_id=73

====================================================================
MIGRATION EXPERT IN FORUM
--------------------------------------------------------------------
Paul Hinsberg, searchWin2000 Migration Expert, is working the Win2k
Migration Discussion Forum this week. He will be answering questions
all week but you can catch him live on Tuesday and Thursday from 11
a.m. to 12 p.m. EDT at
http://searchwin2000.discussions.techtarget.com/WebX?50@@.ee83d6a.

========================================================
If you would like to sponsor this or any TechTarget.com newsletter,
please contact Mike Kelly at mailto:[EMAIL PROTECTED].
========================================================


If you no longer wish to receive this newsletter simply reply to 
this message with "REMOVE" in the subject line.  Or, visit 
http://searchWin2000.techtarget.com/register 
and adjust your subscriptions accordingly. 

If you choose to unsubscribe using our automated processing, you 
must send the "REMOVE" request from the email account to which 
this newsletter was delivered.  Please allow 24 hours for your 
"REMOVE" request to be processed.

Reply via email to