-------------------------------------------------------------------
SearchWin2000.com's Security Tip
--------------------------------------------------------------------

TODAY'S SECURITY TIP: The group Everyone

====================================================================
SPONSORED BY: Rainbow Technologies
====================================================================
Do you know who your users are sharing their password information
with? Eliminate password sharing and strengthen VPN access with the
iKey USB authentication token. Cost effective, portable and easy to
deploy with Check Point(tm), VPN-1 SecuRemote(tm) and
SecureClient(tm). To register for a FREE demo and learn how Rainbow
Technologies iKey can eliminate password sharing, visit us at
http://www.rainbow.com/cpss.
====================================================================
"The group Everyone"
By Adesh Rampat

It's probably not a good idea for you to leave things the way they
are by default when you initiate sharing of a file or folder, Adesh
reminds us. 
--------------------------------------------------------------------
When sharing a file or folder the default group to which permissions
is applied to is the group 'everyone'. 

Everyone includes all users who can access the system. Be careful
about assigning resources to the group 'everyone,' primarily because
this could accidentally allow unauthenticated users to access the
system. 

Never assign the group 'everyone' to have access to a file share on
your network. Use 'authenticated users' instead. This group's
membership is controlled by the operating system or domain.
'Authenticated users' includes all users who are authenticated into
the network by using a valid user account. Using the 'authenticated
user' group in place of the 'group everyone' can prevent anonymous
access to resources. The 'authenticated user' group does not contain
anonymous users or guests. 

Of course, disabling the guest account prevents this account from
being part of the 'everyone group,' which in turn prevents
permissions from being granted to a guest logon. 
-------------------------------------------------------------------
Adesh Rampat has 10 years experience with network and IT
administration. He is a member of the Association of Internet
Professionals, the Institute for Network Professionals and the
International Webmasters Association. He has also lectured
extensively on a variety of topics.
====================================================================
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
DID YOU LIKE THIS TIP?
====================================================================
We need your feedback! Whether you loved this tip or hated it, why
not let us know? Rate it at
http://www.searchWin2000.com/tip/1,289483,sid1_gci760288,00.html.
Have additional comments? E-mail us at mailto:[EMAIL PROTECTED]
to sound off. 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
====================================================================
Have you visited our new security forum yet? Share your opinions on
the latest viruses and worms and find out what hot security issues
your peers are discussing today at
http://searchwindowsmanageability.discussions.techtarget.com/WebX?[EMAIL PROTECTED]^[email protected].
====================================================================
FEATURED BOOK
====================================================================
"Configuring Windows 2000 Server Security"
Author: Syngress Media 
Publisher: Syngress, Media 
Published: Nov. 1999 
 
Microsoft has incorporated dramatic new security changes in Windows
2000 Server, including Kerberos Authentication, Public Key
Infrastructure (PKI), IP Security (IPSec), Encrypting File System
(EFS) and Active Directory permissions. This book is an indispensable
guide for anyone bearing the responsibility for the overall security
of a Windows 2000 Server network.

http://www.digitalguru.com/dgstore/product.asp?isbn=1928994024&ac_id=73
====================================================================
BONUS TIPS
====================================================================
For more ways to secure your systems, check out these user-submitted
security tips.  Be sure to rate them, too! We count on your feedback
to help us pick our monthly winners!  Submit a tip of your own while
you're there to become eligible for a set of Klipsch ProMedia 2.1 THX
Certified Multimedia Speakers!

"Hiding the last user logon in Windows 2000"
By Mike Marney
http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci760113,00.html

"Use caution when disabling the Windows Server service on your
workstation"
By George Perkins
http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci760120,00.html
====================================================================
If you would like to sponsor this or any techtarget newsletter,
please contact Mike Kelly at [EMAIL PROTECTED]
====================================================================


If you no longer wish to receive this newsletter simply reply to 
this message with "REMOVE" in the subject line.  Or, visit 
http://searchWin2000.techtarget.com/register 
and adjust your subscriptions accordingly. 

If you choose to unsubscribe using our automated processing, you 
must send the "REMOVE" request from the email account to which 
this newsletter was delivered.  Please allow 24 hours for your 
"REMOVE" request to be processed.

Reply via email to