=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
SEARCHWIN2000.COM | Security Administration Tip
Dec. 31, 2002

Essential tools and advice for the security-focused administrator.  
More tips: http://searchwin2000.techtarget.com/tips/

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FROM OUR SPONSORS:

- Gadgets and gizmos put to the TechTarget test
http://searchwin2000.techtarget.com/oddsAndEnds/intro/0,294167,sid1,00.html

- Tips from our experts -- free newsletter
http://searchwin2000.techtarget.com/register

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

IN THIS ISSUE | Table of Contents

1. SECURITY TIPS 
   - File sharing with Windows XP
   - Find account lockout events in your security logs
   - Adding to antivirus software
   - Tighten your security with three basic practices 

2. IMPORTANT ANNOUNCEMENTS AND LINKS
   - Ask Roberta Bragg: Can I quickly determine who modified files? 
   - Exclusive Article: IT pros offer Windows-Linux tips
   - Admin Know-IT-All Quiz #16: Bucking the system
   - Tip Contest: Down to the wire -- Rate December's top tips!

____________________________________________________________________
GADGETS AND GIZMOS PUT TO THE TECHTARGET TEST

Need to know where on earth you are? How about a watch with atomic
accuracy or a digital pitbull to pounce on pop-ups? TechTarget
editors take a look at these gadgets and others to tell you if you
can live without them.
http://searchwin2000.techtarget.com/oddsAndEnds/intro/0,294167,sid1,00.html

____________________________________________________________________

FILE SHARING WITH WINDOWS XP | by Adesh Rampat

The Windows XP operating system has many enhanced security features
over its predecessor. One example of this is the built-in personal
firewall. But one of the new features can turn out to be security
issue, especially if you are on a network and sharing files with
others, making them available to everyone in the workgroup.

>> CLICK for the full tip...
http://www.searchWin2000.com/tip/1,289483,sid1_gci870908,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FIND ACCOUNT LOCKOUT EVENTS IN YOUR SECURITY LOGS | by Pankaj Patel

Having trouble keeping tabs on your PC kingdom? This is a good tip to
employ if you need to find out which machine's account is being
locked out of your network.

>> CLICK for the full tip...
http://www.searchWin2000.com/tip/1,289483,sid1_gci870971,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
ADDING TO ANTIVIRUS SOFTWARE | by James Michael Stewart

In the view of many security professionals, antivirus software is not
an effective solution to protecting an environment from infections.
Primarily, their argument is that most serious virus threats are new
viruses that are not included in the signature dictionaries of
antivirus software. Fortunately, there are many other preventative,
detective and corrective controls to help protect your organization's
critical data from damage, destruction and loss.

>> CLICK for the full tip...
http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci869721,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
TIGHTEN YOUR SECURITY WITH THREE BASIC PRACTICES | by Terry Candia

E-mail is the dominant means of transmitting information, yet very
little is done to keep it safe when traveling over insecure networks.
Organizations in the U.S. learned a great deal in the past two years;
one of the biggest take-aways is that a focused approach to securing
data in motion is essential. Conventional wisdom thus far indicates
that organizations should, at the very least, adopt three basic
security practices: Declare e-mail a strategic asset and a key
business process and protect it as such; define and enforce content
management policies; and educate your users.

>> CLICK for the full tip...
http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci864701,00.html?FromTaxonomy=/pr/283640

___________________________________________________________________
Tips from our experts | Newsletter

This free newsletter is a biweekly roundup that spotlights the best
answers to your toughest technical questions from SearchWin2000.com's
panel of leading industry experts. Topics from our popular Ask the
Experts section include Active Directory, Exchange, security,
programming, certification and more.  Sign up today!
http://searchwin2000.techtarget.com/register

___________________________________________________________________
IMPORTANT MESSAGES AND LINKS:

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
CAN I QUICKLY DETERMINE WHO MODIFIED FILES? | Ask Roberta Bragg

Dear Roberta:
With the exception of turning on detailed auditing, which can impact
system performance, how can I determine who created or modified a
file on a Win2k server? It appears that if an administrator or the
system creates a file/directory, the system just states it was
created by the "Administrators" group. Therefore, I am unable to
determine if it was a specific admin, a batch job or a service
running as system. What happened to the owner being identified?

>> CLICK here for Bragg's expert answer...
http://searchwin2000.techtarget.com/ateQuestionNResponse/0,289625,sid1_cid495235_tax285120,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
IT PROS OFFER WINDOWS-LINUX TIPS | Exclusive Article

At times, the Windows-Linux integration process can seem like a
many-headed monster, and IT pros must contain it to avoid getting
eaten alive. Jeffrey Small couldn't make Linux and Windows play well
together. What could he have done differently? Our readers weigh in.
 
>> CLICK for the full article...
http://searchwindowsmanageability.techtarget.com/originalContent/0,289142,sid33_gci870721,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
BUCKING THE SYSTEM | Admin Know-IT-All Quiz #16

Test your knowledge with this week's quiz, then visit the list of
related information you'll find on the answer page.

Windows 2000 contains a system component, the Windows Installer,
which is billed as an "application installation and management
service." Under certain combinations of circumstances, however, it is
possible to damage the installer. The easiest way to repair it is to:

a. Convert the program databases from the 1.1 to the 2.0 format 
b. Update the binaries for the installer
c. Get Windows Installer 2.0 as a separate download from Microsoft
d. Install Service Pack 2 -- it addresses the issue
e. Combine the Richard Simmons, Dr. Atkins and Jenny Craig systems

>> CLICK for the correct answer...
http://www.searchWin2000.com/originalContent/0,289142,sid1_gci869851,00.html

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
DOWN TO THE WIRE -- RATE DECEMBER'S TOP TIPS! | Tip Contest

The holidays are rapidly drawing to a snowy finish, and so is
December's user-submitted tip contest! We've got some serious
contenders this month, so drop your shovels, stop in and rate your
favorites if you haven't already. A TDK Mojo MP3 Player lies in the
balance. Have a look at our leading competitors and then pick your
favorites!

>> Improve Outlook 2002 performance in Windows XP:
http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci870444,00.html

>> Free automatic PC inventory:
http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci868401,00.html

>> Speed up your Internet connection time:
http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci869743,00.html

>> Reset admin passwords in a migration emergency:
http://searchwin2000.techtarget.com/tip/1,289483,sid1_gci869559,00.html


___________________________________________________________________
********************* SEARCHWIN2000 CONTACTS **********************
 
 TIP MAILBOX, (mailto:[EMAIL PROTECTED])
   >> Send feedback on tips and ideas for new tip content.
____________________________________________________________________
 
 MARILYN COHODAS, Site Editor (mailto:[EMAIL PROTECTED])
   >> Send me your original articles and best practices.
____________________________________________________________________
 
 CHRISTINE POLEWARCZYK, Associate Editor
 (mailto:[EMAIL PROTECTED])
   >> Send me your ideas for online event and discussion day topics.
____________________________________________________________________
 
 DAVID PYE, Assistant Editor (mailto:[EMAIL PROTECTED])
   >> Send me your tips, white papers and favorite Web sites.
____________________________________________________________________

 DANA MCCURLEY, Assistant Editor (mailto:[EMAIL PROTECTED])
   >> Send me your favorite Web sites and white papers.
____________________________________________________________________

 MARGIE SEMILOF, Senior News Writer (mailto:[EMAIL PROTECTED])
   >> Send me your news and story ideas.
____________________________________________________________________
 
 DAVID GABEL, Executive Tech Editor (mailto:[EMAIL PROTECTED])
   >> Send me your technical tips and tip ideas.
____________________________________________________________________

 MIKE KELLY (mailto:[EMAIL PROTECTED])
   >> Sponsor this or any other TechTarget newsletter.

___________________________________________________________________
::::::::::::::::::::  ABOUT THIS NEWSLETTER   :::::::::::::::::::::

Published by TechTarget (http://www.techtarget.com)
 TechTarget - The Most Targeted IT Media
 Copyright 2002, All Rights Reserved.

Unsubscribe from 'Windows Security Tips'
 - Simply Reply to this Email with REMOVE within the Body or Subject
>  or
 - Go to: http://searchWin2000.techtarget.com/register
 - Log in to edit your profile.
 - Click on the link to Edit email subscriptions.
 - Uncheck the box next to the newsletter you wish 
   to unsubscribe from.
 - When finished, click "Save Changes to My Profile."


Reply via email to