----------------------------------------------------------- SearchWin2000.com's Security Tip ----------------------------------------------------------- TODAY'S SECURITY TIP: Be careful with NTFS permissions ============================================================ Sponsored by NetIQ ============================================================ FREE SECURITY GUIDE: Don't expose your company's deepest secrets. Get all the in-depth knowledge you need to secure your enterprise with NetIQ's FREE step-by-step security guide - "Selecting The Right Security Solution" - at: http://www.netiq.com/sponsor/default.asp?135 Read it now before it's too late. NetIQ's security solutions not only identify intruders, but ensure that threats don't ever become incidents. ============================================================ "Be careful with NTFS permissions" By Michael Murdock Fiddling with NTFS permission can have unexpected results, as this tip from reader Michael Murdock illustrates. Do you have a security tip? Why not send it in at http://searchwin2000.techtarget.com/tipsSubmit/1,289485,sid1,00.html? We'll enter you in our tips contest for some neat prizes, and we'll post your tip on our site. __________________________________________________________________ If you remove standard NTFS permissions in the wrong order, some undesirable special NTFS permissions can be left behind. Here's an example. Choose a file with all of the NTFS permissions selected for a particular user or group, then clear the Write permission and click Apply. The OS automatically removes Full Control and Modify (leading you to believe that only Read and Execute remains). Now, go have a look in the Advance Properties for the special NTFS permissions and you will see that the Delete permission remains. And guess what? That user/group is able to delete that file. Always adjust standard NTFS permission by removing the most powerful first (least restrictive), i.e. remove Full Control, then Modify, then Write, etc. Just because you clear the Read permission and the OS automatically clears the others, do not assume it is always correct. Always check special NTFS permissions. ======================================================== Did you like this tip? If so, vote for this tip at http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci757218,00.html?dgExplicitTieredReg=&dgImplicitTieredReg=%3EttTaxonomy%3EsearchWin2000%3EEmail%3ETips&dgOptInTieredReg=true&dgTieredRegLocation=Tips&FromTaxonomy=%2Fpr%2F283640. If not, let us know? Send an email to us at mailto:[EMAIL PROTECTED] and sound off. ======================================================== Featured Book ======================================================== "Windows 2000 Security Handbook" Author: Tom Sheldon and Phil Cox Publisher: McGraw-Hill Published: Dec 2000 Deploy and administer bullet-proof Windows 2000 security policies. This book explains how to safeguard intranet, Internet, and e-commerce transactions with IPSec, defend against hacking, spoofing, sniffing, and DDS attacks, and secure your network with firewalls, proxy servers, and VPNs. http://www.digitalguru.com/dgstore/product.asp?isbn=0072124334&ac_id=73 ==================================================================== HACKER SECURITY -------------------------------------------------------------------- Find out what Scott Blake, director of security strategy for BindView Corp, has to say about hacker security in a recent searchWindowsManageability interview at http://searchwindowsmanageability.stage.techtarget.com/originalContent/0,289142,sid33_gci751822,00.html. ==================================================================== ADMINISTRATION AND PERFORMANCE EXPERT IN FORUM -------------------------------------------------------------------- William Boswell, searchWin2000 administration and performance expert, is live in the Administrator Discussion Forum this week. Let him help solve your problems Tuesday, Wednesday and Friday from 12-1 EDT at http://searchwin2000.discussions.techtarget.com/WebX?50@@.ee83d68. ======================================================== If you would like to sponsor this or any TechTarget.com newsletter, please contact Mike Kelly at mailto:[EMAIL PROTECTED]. ======================================================== If you no longer wish to receive this newsletter simply reply to this message with "REMOVE" in the subject line. Or, visit http://searchWin2000.techtarget.com/register and adjust your subscriptions accordingly. If you choose to unsubscribe using our automated processing, you must send the "REMOVE" request from the email account to which this newsletter was delivered. Please allow 24 hours for your "REMOVE" request to be processed.
