-----------------------------------------------------------
SearchWin2000.com's Security Tip
-----------------------------------------------------------

TODAY'S SECURITY TIP: The NTFS volume and permissions

============================================================
Sponsored by VeriSign - NetIQ
============================================================
NETWORK SECURITY: FREE TRIAL from NetIQ 
Secure your network! Security Analyzer identifies the latest-known
security vulnerabilities and provides extensive reports and guidance
on how to address them. This award winning software supports more
than 2,300 vulnerability tests and comprehensive security
configuration reporting for Windows 9x, Windows NT, Windows 2000,
UNIX and Linux. Download now:
http://www.webtrends.com/redirect/NSSASWT070901.htm

============================================================
Tips Summary 

"The NTFS volume and permissions"

By Adesh Rampat

Whether implementing Windows 2000 peer to peer networking or applying
additional security permissions to files/folders on a Standalone PC
the NTFS volume is always the best approach to use for the
implementation of additional security permissions. In most cases, the
NTFS volume is already created on personal computers with Windows
2000 pre-installed.

However, when upgrading from Windows 98 to Windows 2000 many users
can easily bypass the option of converting FAT32 volumes to NTFS.
Doing so may prevent you from applying security permissions to files
and folders.

The good news is that a FAT32 volume can be easily converted to a
NTFS volume without reinstalling Windows 2000.

The following procedure shows how this is done:

At the command line type 

convert "drive_letter": /fs:ntfs      For example convert c: /fs:ntfs

When this is done the administrator can grant additional security
permissions to a user. Apart from security permissions, the user can
get additional benefits such as disk quotas for home folders stored
on the drive. 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Adesh Rampat has 10 years experience with network and IT
administration. He is a member of the Association of Internet
Professionals, the Institute for Network Professionals and the
International Webmasters Association. He has also lectured
extensively on a variety of topics.
========================================================
Did you like this tip? If so (or if not), why not let us know? Send
an email to us at mailto:[EMAIL PROTECTED] and sound off.

========================================================
Featured Book
========================================================
"Windows 2000 Security Handbook" 
Author: Tom Sheldon and Phil Cox 
Publisher: McGraw-Hill 
Published: Dec 2000
 
Deploy and administer bullet-proof Windows 2000 security policies.
This book explains how to safeguard intranet, Internet, and
e-commerce transactions with IPSec, defend against hacking, spoofing,
sniffing, and DDS attacks, and secure your network with firewalls,
proxy servers, and VPNs.

http://www.digitalguru.com/dgstore/product.asp?isbn=0072124334&ac_id=73 

====================================================================
PROGRAMMING EXPERT IN FORUM
--------------------------------------------------------------------
If you have a programming or application question, don't miss John
Robbins, searchWin2000 Programming and Application Development
Expert, in the Administrator Discussion Forum this week at 
http://searchwin2000.discussions.techtarget.com/WebX?[EMAIL PROTECTED]^[email protected]. 

========================================================
If you would like to sponsor this or any TechTarget.com newsletter,
please contact Mike Kelly at mailto:[EMAIL PROTECTED].
========================================================


If you no longer wish to receive this newsletter simply reply to 
this message with "REMOVE" in the subject line.  Or, visit 
http://searchWin2000.techtarget.com/register 
and adjust your subscriptions accordingly. 

If you choose to unsubscribe using our automated processing, you 
must send the "REMOVE" request from the email account to which 
this newsletter was delivered.  Please allow 24 hours for your 
"REMOVE" request to be processed.

Reply via email to