------------------------------------------------------------------- SearchWin2000.com's Security Tip -------------------------------------------------------------------- TODAY'S SECURITY TIP: The group Everyone ==================================================================== SPONSORED BY: Rainbow Technologies ==================================================================== Do you know who your users are sharing their password information with? Eliminate password sharing and strengthen VPN access with the iKey USB authentication token. Cost effective, portable and easy to deploy with Check Point(tm), VPN-1 SecuRemote(tm) and SecureClient(tm). To register for a FREE demo and learn how Rainbow Technologies iKey can eliminate password sharing, visit us at http://www.rainbow.com/cpss. ==================================================================== "The group Everyone" By Adesh Rampat It's probably not a good idea for you to leave things the way they are by default when you initiate sharing of a file or folder, Adesh reminds us. -------------------------------------------------------------------- When sharing a file or folder the default group to which permissions is applied to is the group 'everyone'. Everyone includes all users who can access the system. Be careful about assigning resources to the group 'everyone,' primarily because this could accidentally allow unauthenticated users to access the system. Never assign the group 'everyone' to have access to a file share on your network. Use 'authenticated users' instead. This group's membership is controlled by the operating system or domain. 'Authenticated users' includes all users who are authenticated into the network by using a valid user account. Using the 'authenticated user' group in place of the 'group everyone' can prevent anonymous access to resources. The 'authenticated user' group does not contain anonymous users or guests. Of course, disabling the guest account prevents this account from being part of the 'everyone group,' which in turn prevents permissions from being granted to a guest logon. ------------------------------------------------------------------- Adesh Rampat has 10 years experience with network and IT administration. He is a member of the Association of Internet Professionals, the Institute for Network Professionals and the International Webmasters Association. He has also lectured extensively on a variety of topics. ==================================================================== ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ DID YOU LIKE THIS TIP? ==================================================================== We need your feedback! Whether you loved this tip or hated it, why not let us know? Rate it at http://www.searchWin2000.com/tip/1,289483,sid1_gci760288,00.html. Have additional comments? E-mail us at mailto:[EMAIL PROTECTED] to sound off. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ==================================================================== Have you visited our new security forum yet? Share your opinions on the latest viruses and worms and find out what hot security issues your peers are discussing today at http://searchwindowsmanageability.discussions.techtarget.com/WebX?[EMAIL PROTECTED]^[email protected]. ==================================================================== FEATURED BOOK ==================================================================== "Configuring Windows 2000 Server Security" Author: Syngress Media Publisher: Syngress, Media Published: Nov. 1999 Microsoft has incorporated dramatic new security changes in Windows 2000 Server, including Kerberos Authentication, Public Key Infrastructure (PKI), IP Security (IPSec), Encrypting File System (EFS) and Active Directory permissions. This book is an indispensable guide for anyone bearing the responsibility for the overall security of a Windows 2000 Server network. http://www.digitalguru.com/dgstore/product.asp?isbn=1928994024&ac_id=73 ==================================================================== BONUS TIPS ==================================================================== For more ways to secure your systems, check out these user-submitted security tips. Be sure to rate them, too! We count on your feedback to help us pick our monthly winners! Submit a tip of your own while you're there to become eligible for a set of Klipsch ProMedia 2.1 THX Certified Multimedia Speakers! "Hiding the last user logon in Windows 2000" By Mike Marney http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci760113,00.html "Use caution when disabling the Windows Server service on your workstation" By George Perkins http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci760120,00.html ==================================================================== If you would like to sponsor this or any techtarget newsletter, please contact Mike Kelly at [EMAIL PROTECTED] ==================================================================== If you no longer wish to receive this newsletter simply reply to this message with "REMOVE" in the subject line. Or, visit http://searchWin2000.techtarget.com/register and adjust your subscriptions accordingly. If you choose to unsubscribe using our automated processing, you must send the "REMOVE" request from the email account to which this newsletter was delivered. Please allow 24 hours for your "REMOVE" request to be processed.
