What does this change to SOFTWARE registry key do?

Posted on 2001-06-20
Medium Priority
Last Modified: 2016-03-23
I have a Windows 2000 Advanced Server in my kitchen connected to the internet.

It hosts a web site, an e-mail server, etc.

It also does DNS, DHCP, and NAT for the internal network (3 additional PCs, runnign WIndows 98).

HOWEVER, this is the computer we all use regularly to check e-mail and browse the internet, since it is conveniently located and always on.

To do this, I have enabled some users to "log-in-locally" to the server. They use Outlook Express and Internet Explorere primarily.

I am trying to add a "Content filter" application called Cyber Snoop that I hope will prove less restrictive than tradditional filters. I don't want to restrict access to an un-rated page just because it's unrated, and this tool allows you to filter based on both page rating and content analysis.

The instructions for installation on Windows 2000 say that after installing (as Administrator), you should:

a) Run REGEDT32
c) Select SOFTWARE registry key
d) Select Permissions under the SECURITY menu item.
e) In Registry Key Permissions, select "USERS" (i.e.
   the users group)
f) Select "Full Control"
g) Under "Advanced.." button select "Reset permissions   on all child objects and enable propagation of inheritable permissions"

Now, if they told me to do this on an entry for the specific product, I might understand, but why the whole SOFTWARE key?

What does this change allow a user account to do that was not allowed before?

Is this safe? Unwise? Stupid?

I get the feeling this instructions may have been ment for a Windows 2000 Pro client, not for a server.

Question by:dcgames
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
  • 2
  • +2
LVL 63

Accepted Solution

SysExpert earned 400 total points
ID: 6211199
Good question.
Essentially it gives the User control over any software that he is using while looged in as that user. This means that he can customize it beyond any restrictions that the original program may have put in place.
For normal users it should not make much difference. If your kids are all hackers, then it could be a cause for concern.
I would try this just on the software keys for this particular program and see if that is sufficient.

I hope this helps !
LVL 17

Expert Comment

ID: 6211372
No matter whether it is NT or 2K, you have to have certain rights to read/manipulate the registry. I think what they are trying to do is set the permissions used to access these keys in the registry by the program and you limit the programs abilities. Was this program specifically designed for Workstation or Server?
LVL 32

Expert Comment

ID: 6211383
Any users who have full (or write) access to the HKEY_LOCAL_MACHINE\Software registry hive CAN take control of the machine.

Doing what this software is suggesting will make any hope of having a secure Win2000 system disappear into the ether....
Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.


Expert Comment

ID: 6212314
- the whole Software hive because it's much easier for them to support problems with rights that doesn't appear in Win9x.

- It might allow a user to delete the whole hive and make the server unusable

- it is unsafe, unwise and is contrary to the NT philosophy

- even on a Win2k Pro it's very unprofessional.


Author Comment

ID: 6214935
Hello, Your comments all match pretty much what I thought.

Sysexpert: I did try to apply this only to the keys of the specific software, but it didn't work.

Perhaps they only need that kind of access initially (to configure the software). If so, I might try:

a) Do what they ask for the Software key.
b) Run the software, make sure everythign is working.
c) "undo" the permission setting.

But I'm thinking it may not be un-doable in the sense that "adding Full Control to all SOFTWARE key entries" is not undone by "remove Full Control from all SOFTWARE key entries". Some keys may HAVE full control already, and the undo would break them.

Any suggestions?

I could add the user to the "Administration" group temporarily, go through the configuration / setup, make sure it's working, then remove the user from the Admin group and see if that works.

Does that sound reasonable?

One last question. I've seen some installation with "POWER USER" setup. I think that it gets created when you have UPGRADED from a Win 9x environment. I don't have a POWER USER group defined (I did a clean install).

I'm not concerned about the users "abusing" or "hacking" the system, but I don't want to open the doorway for a virus or external hack to do more damage.

I could add the permission explicitly to the users that need it instead of the generic USERS group. Would that make it safer?

LVL 63

Expert Comment

ID: 6215254
POWER USER is normal only on win2k Pro installs, not server, to the best of my knowledge.

Your Idea about admin, sounds good.


Expert Comment

ID: 6215700
if you are a bit experienced, but can try the great tool Regmon of Sysinternals (http://www.sysinternals.com/ntw2k/source/regmon.shtml)
and filter for "denied" entries.
So you will find where the program has problems with rights on registry hives.

LVL 32

Expert Comment

ID: 6215972
Frankly,  I'd STAY AWAY from such a program on W2K.  Any such application should be designed to install as administrator and run using the SERVICE account, LOCAL SYSTEM.  This will give it the required privileges over the settings and applications on the machine but will not force you to open up the registry protections for people to mess with.

I'll just reiterate.  Any users who can modify registry entries under HKEY_LOCAL_MACHINE can gain full access to the machine.  In other words, it makes security a farce!

Author Comment

ID: 6216022
Thank you guys. Sound Advice.


Featured Post

NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A phishing scam that claims a recipient’s credit card details have been “suspended” is the latest trend in spoof emails.
Smart phones, smart watches, Bluetooth-connected devices—the IoT is all around us. In this article, we take a look at the security implications of our highly connected world.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Suggested Courses
Course of the Month12 days, 2 hours left to enroll

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question