=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= SEARCHWIN2000.COM | Security Administration Tip Dec. 31, 2002
Essential tools and advice for the security-focused administrator. More tips: http://searchwin2000.techtarget.com/tips/ =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= FROM OUR SPONSORS: - Gadgets and gizmos put to the TechTarget test http://searchwin2000.techtarget.com/oddsAndEnds/intro/0,294167,sid1,00.html - Tips from our experts -- free newsletter http://searchwin2000.techtarget.com/register =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= IN THIS ISSUE | Table of Contents 1. SECURITY TIPS - File sharing with Windows XP - Find account lockout events in your security logs - Adding to antivirus software - Tighten your security with three basic practices 2. IMPORTANT ANNOUNCEMENTS AND LINKS - Ask Roberta Bragg: Can I quickly determine who modified files? - Exclusive Article: IT pros offer Windows-Linux tips - Admin Know-IT-All Quiz #16: Bucking the system - Tip Contest: Down to the wire -- Rate December's top tips! ____________________________________________________________________ GADGETS AND GIZMOS PUT TO THE TECHTARGET TEST Need to know where on earth you are? How about a watch with atomic accuracy or a digital pitbull to pounce on pop-ups? TechTarget editors take a look at these gadgets and others to tell you if you can live without them. http://searchwin2000.techtarget.com/oddsAndEnds/intro/0,294167,sid1,00.html ____________________________________________________________________ FILE SHARING WITH WINDOWS XP | by Adesh Rampat The Windows XP operating system has many enhanced security features over its predecessor. One example of this is the built-in personal firewall. But one of the new features can turn out to be security issue, especially if you are on a network and sharing files with others, making them available to everyone in the workgroup. >> CLICK for the full tip... http://www.searchWin2000.com/tip/1,289483,sid1_gci870908,00.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= FIND ACCOUNT LOCKOUT EVENTS IN YOUR SECURITY LOGS | by Pankaj Patel Having trouble keeping tabs on your PC kingdom? This is a good tip to employ if you need to find out which machine's account is being locked out of your network. >> CLICK for the full tip... http://www.searchWin2000.com/tip/1,289483,sid1_gci870971,00.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= ADDING TO ANTIVIRUS SOFTWARE | by James Michael Stewart In the view of many security professionals, antivirus software is not an effective solution to protecting an environment from infections. Primarily, their argument is that most serious virus threats are new viruses that are not included in the signature dictionaries of antivirus software. Fortunately, there are many other preventative, detective and corrective controls to help protect your organization's critical data from damage, destruction and loss. >> CLICK for the full tip... http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci869721,00.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= TIGHTEN YOUR SECURITY WITH THREE BASIC PRACTICES | by Terry Candia E-mail is the dominant means of transmitting information, yet very little is done to keep it safe when traveling over insecure networks. Organizations in the U.S. learned a great deal in the past two years; one of the biggest take-aways is that a focused approach to securing data in motion is essential. Conventional wisdom thus far indicates that organizations should, at the very least, adopt three basic security practices: Declare e-mail a strategic asset and a key business process and protect it as such; define and enforce content management policies; and educate your users. >> CLICK for the full tip... http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci864701,00.html?FromTaxonomy=/pr/283640 ___________________________________________________________________ Tips from our experts | Newsletter This free newsletter is a biweekly roundup that spotlights the best answers to your toughest technical questions from SearchWin2000.com's panel of leading industry experts. Topics from our popular Ask the Experts section include Active Directory, Exchange, security, programming, certification and more. Sign up today! http://searchwin2000.techtarget.com/register ___________________________________________________________________ IMPORTANT MESSAGES AND LINKS: =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= CAN I QUICKLY DETERMINE WHO MODIFIED FILES? | Ask Roberta Bragg Dear Roberta: With the exception of turning on detailed auditing, which can impact system performance, how can I determine who created or modified a file on a Win2k server? It appears that if an administrator or the system creates a file/directory, the system just states it was created by the "Administrators" group. Therefore, I am unable to determine if it was a specific admin, a batch job or a service running as system. What happened to the owner being identified? >> CLICK here for Bragg's expert answer... http://searchwin2000.techtarget.com/ateQuestionNResponse/0,289625,sid1_cid495235_tax285120,00.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= IT PROS OFFER WINDOWS-LINUX TIPS | Exclusive Article At times, the Windows-Linux integration process can seem like a many-headed monster, and IT pros must contain it to avoid getting eaten alive. Jeffrey Small couldn't make Linux and Windows play well together. What could he have done differently? Our readers weigh in. >> CLICK for the full article... http://searchwindowsmanageability.techtarget.com/originalContent/0,289142,sid33_gci870721,00.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= BUCKING THE SYSTEM | Admin Know-IT-All Quiz #16 Test your knowledge with this week's quiz, then visit the list of related information you'll find on the answer page. Windows 2000 contains a system component, the Windows Installer, which is billed as an "application installation and management service." Under certain combinations of circumstances, however, it is possible to damage the installer. The easiest way to repair it is to: a. Convert the program databases from the 1.1 to the 2.0 format b. Update the binaries for the installer c. Get Windows Installer 2.0 as a separate download from Microsoft d. Install Service Pack 2 -- it addresses the issue e. Combine the Richard Simmons, Dr. Atkins and Jenny Craig systems >> CLICK for the correct answer... http://www.searchWin2000.com/originalContent/0,289142,sid1_gci869851,00.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= DOWN TO THE WIRE -- RATE DECEMBER'S TOP TIPS! | Tip Contest The holidays are rapidly drawing to a snowy finish, and so is December's user-submitted tip contest! We've got some serious contenders this month, so drop your shovels, stop in and rate your favorites if you haven't already. A TDK Mojo MP3 Player lies in the balance. Have a look at our leading competitors and then pick your favorites! >> Improve Outlook 2002 performance in Windows XP: http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci870444,00.html >> Free automatic PC inventory: http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci868401,00.html >> Speed up your Internet connection time: http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci869743,00.html >> Reset admin passwords in a migration emergency: http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci869559,00.html ___________________________________________________________________ ********************* SEARCHWIN2000 CONTACTS ********************** TIP MAILBOX, (mailto:[EMAIL PROTECTED]) >> Send feedback on tips and ideas for new tip content. ____________________________________________________________________ MARILYN COHODAS, Site Editor (mailto:[EMAIL PROTECTED]) >> Send me your original articles and best practices. ____________________________________________________________________ CHRISTINE POLEWARCZYK, Associate Editor (mailto:[EMAIL PROTECTED]) >> Send me your ideas for online event and discussion day topics. ____________________________________________________________________ DAVID PYE, Assistant Editor (mailto:[EMAIL PROTECTED]) >> Send me your tips, white papers and favorite Web sites. ____________________________________________________________________ DANA MCCURLEY, Assistant Editor (mailto:[EMAIL PROTECTED]) >> Send me your favorite Web sites and white papers. ____________________________________________________________________ MARGIE SEMILOF, Senior News Writer (mailto:[EMAIL PROTECTED]) >> Send me your news and story ideas. ____________________________________________________________________ DAVID GABEL, Executive Tech Editor (mailto:[EMAIL PROTECTED]) >> Send me your technical tips and tip ideas. ____________________________________________________________________ MIKE KELLY (mailto:[EMAIL PROTECTED]) >> Sponsor this or any other TechTarget newsletter. ___________________________________________________________________ :::::::::::::::::::: ABOUT THIS NEWSLETTER ::::::::::::::::::::: Published by TechTarget (http://www.techtarget.com) TechTarget - The Most Targeted IT Media Copyright 2002, All Rights Reserved. Unsubscribe from 'Windows Security Tips' - Simply Reply to this Email with REMOVE within the Body or Subject > or - Go to: http://searchWin2000.techtarget.com/register - Log in to edit your profile. - Click on the link to Edit email subscriptions. - Uncheck the box next to the newsletter you wish to unsubscribe from. - When finished, click "Save Changes to My Profile."
