Abstract

Windows 2000 presents some challenges to the security professional when it is used in the enterprise environment. Although very user friendly, Windows 2000 is subject to attack from many directions if administrators are not aware of the potential places for breach. This chapter explores the default features of Windows 2000 and takes a look at how they operate out of the box as far as availability and security are concerned. It also reveals some potential problems that exist in that out of the box configuration, such as permitting null passwords for authentication when using anonymous accounts for access. Tools are included and available with the operating system to better secure the default configurations according to the user's needs. These included Windows 2000 Support tools and use of management consoles customized to perform necessary configuration tasks and apply security templates. The chapter illustrates an instruction that provides a framework to create a custom management console to view, analyze, and implement the features of security templates, which are used to create a custom and more secure configuration for Windows 2000 machines. The chapter concludes with a discussion on methods to defend against the types of attack.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.