-----------------------------------------------------------
SearchWin2000.com's Security Tip
-----------------------------------------------------------

TODAY'S SECURITY TIP: Be careful with NTFS permissions

============================================================
Sponsored by NetIQ
============================================================
FREE SECURITY GUIDE: Don't expose your company's deepest secrets.
Get all the in-depth knowledge you need to secure your enterprise
with NetIQ's FREE step-by-step security guide - "Selecting The Right
Security Solution" - at: http://www.netiq.com/sponsor/default.asp?135
Read it now before it's too late. NetIQ's security solutions not only
identify intruders, but ensure that threats don't ever become
incidents.

============================================================

"Be careful with NTFS permissions"

By Michael Murdock

Fiddling with NTFS permission can have unexpected results, as this
tip from reader Michael Murdock illustrates. Do you have a security
tip? Why not send it in at
http://searchwin2000.techtarget.com/tipsSubmit/1,289485,sid1,00.html?
We'll enter you in our tips contest for some neat prizes, and we'll
post your tip on our site. 
__________________________________________________________________
If you remove standard NTFS permissions in the wrong order, some
undesirable special NTFS permissions can be left behind.

Here's an example. Choose a file with all of the NTFS permissions
selected for a particular user or group, then clear the Write
permission and click Apply. The OS automatically removes Full Control
and Modify (leading you to believe that only Read and Execute
remains).

Now, go have a look in the Advance Properties for the special NTFS
permissions and you will see that the Delete permission remains. And
guess what? That user/group is able to delete that file. 

Always adjust standard NTFS permission by removing the most powerful
first (least restrictive), i.e. remove Full Control, then Modify,
then Write, etc. 

Just because you clear the Read permission and the OS automatically
clears the others, do not assume it is always correct. Always check
special NTFS permissions.


========================================================
Did you like this tip? If so, vote for this tip at
http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci757218,00.html?dgExplicitTieredReg=&dgImplicitTieredReg=%3EttTaxonomy%3EsearchWin2000%3EEmail%3ETips&dgOptInTieredReg=true&dgTieredRegLocation=Tips&FromTaxonomy=%2Fpr%2F283640.
 
If not, let us know? Send an email to us at
mailto:[EMAIL PROTECTED] and sound off.

========================================================
Featured Book
========================================================
"Windows 2000 Security Handbook" 
Author: Tom Sheldon and Phil Cox 
Publisher: McGraw-Hill 
Published: Dec 2000 
 
Deploy and administer bullet-proof Windows 2000 security policies.
This book explains how to safeguard intranet, Internet, and
e-commerce transactions with IPSec, defend against hacking, spoofing,
sniffing, and DDS attacks, and secure your network with firewalls,
proxy servers, and VPNs. 

http://www.digitalguru.com/dgstore/product.asp?isbn=0072124334&ac_id=73

====================================================================
HACKER SECURITY
--------------------------------------------------------------------
Find out what Scott Blake, director of security strategy for BindView
Corp, has to say about hacker security in a recent
searchWindowsManageability interview at
http://searchwindowsmanageability.stage.techtarget.com/originalContent/0,289142,sid33_gci751822,00.html.

====================================================================
ADMINISTRATION AND PERFORMANCE EXPERT IN FORUM
--------------------------------------------------------------------
William Boswell, searchWin2000 administration and performance expert,
is live in the Administrator Discussion Forum this week. Let him help
solve your problems Tuesday, Wednesday and Friday from 12-1 EDT at
http://searchwin2000.discussions.techtarget.com/WebX?50@@.ee83d68.

========================================================
If you would like to sponsor this or any TechTarget.com newsletter,
please contact Mike Kelly at mailto:[EMAIL PROTECTED].
========================================================


If you no longer wish to receive this newsletter simply reply to 
this message with "REMOVE" in the subject line.  Or, visit 
http://searchWin2000.techtarget.com/register 
and adjust your subscriptions accordingly. 

If you choose to unsubscribe using our automated processing, you 
must send the "REMOVE" request from the email account to which 
this newsletter was delivered.  Please allow 24 hours for your 
"REMOVE" request to be processed.

Reply via email to