Solved

What does this change to SOFTWARE registry key do?

Posted on 2001-06-20
9
149 Views
Last Modified: 2016-03-23
I have a Windows 2000 Advanced Server in my kitchen connected to the internet.

It hosts a web site, an e-mail server, etc.

It also does DNS, DHCP, and NAT for the internal network (3 additional PCs, runnign WIndows 98).

HOWEVER, this is the computer we all use regularly to check e-mail and browse the internet, since it is conveniently located and always on.

To do this, I have enabled some users to "log-in-locally" to the server. They use Outlook Express and Internet Explorere primarily.

I am trying to add a "Content filter" application called Cyber Snoop that I hope will prove less restrictive than tradditional filters. I don't want to restrict access to an un-rated page just because it's unrated, and this tool allows you to filter based on both page rating and content analysis.

The instructions for installation on Windows 2000 say that after installing (as Administrator), you should:

a) Run REGEDT32
b) Select HKEY_LOCAL_MACHINE
c) Select SOFTWARE registry key
d) Select Permissions under the SECURITY menu item.
e) In Registry Key Permissions, select "USERS" (i.e.
   the users group)
f) Select "Full Control"
g) Under "Advanced.." button select "Reset permissions   on all child objects and enable propagation of inheritable permissions"

Now, if they told me to do this on an entry for the specific product, I might understand, but why the whole SOFTWARE key?

What does this change allow a user account to do that was not allowed before?

Is this safe? Unwise? Stupid?

I get the feeling this instructions may have been ment for a Windows 2000 Pro client, not for a server.

Dave
0
Comment
Question by:dcgames
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
  • 2
  • +2
9 Comments
 
LVL 63

Accepted Solution

by:
SysExpert earned 100 total points
ID: 6211199
Good question.
Essentially it gives the User control over any software that he is using while looged in as that user. This means that he can customize it beyond any restrictions that the original program may have put in place.
For normal users it should not make much difference. If your kids are all hackers, then it could be a cause for concern.
I would try this just on the software keys for this particular program and see if that is sufficient.

I hope this helps !
0
 
LVL 17

Expert Comment

by:mikecr
ID: 6211372
No matter whether it is NT or 2K, you have to have certain rights to read/manipulate the registry. I think what they are trying to do is set the permissions used to access these keys in the registry by the program and you limit the programs abilities. Was this program specifically designed for Workstation or Server?
0
 
LVL 32

Expert Comment

by:jhance
ID: 6211383
Any users who have full (or write) access to the HKEY_LOCAL_MACHINE\Software registry hive CAN take control of the machine.

Doing what this software is suggesting will make any hope of having a secure Win2000 system disappear into the ether....
0
Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

 
LVL 7

Expert Comment

by:franka
ID: 6212314
- the whole Software hive because it's much easier for them to support problems with rights that doesn't appear in Win9x.

- It might allow a user to delete the whole hive and make the server unusable

- it is unsafe, unwise and is contrary to the NT philosophy

- even on a Win2k Pro it's very unprofessional.

0
 
LVL 5

Author Comment

by:dcgames
ID: 6214935
Hello, Your comments all match pretty much what I thought.

Sysexpert: I did try to apply this only to the keys of the specific software, but it didn't work.

Perhaps they only need that kind of access initially (to configure the software). If so, I might try:

a) Do what they ask for the Software key.
b) Run the software, make sure everythign is working.
c) "undo" the permission setting.

But I'm thinking it may not be un-doable in the sense that "adding Full Control to all SOFTWARE key entries" is not undone by "remove Full Control from all SOFTWARE key entries". Some keys may HAVE full control already, and the undo would break them.

Any suggestions?

I could add the user to the "Administration" group temporarily, go through the configuration / setup, make sure it's working, then remove the user from the Admin group and see if that works.

Does that sound reasonable?

One last question. I've seen some installation with "POWER USER" setup. I think that it gets created when you have UPGRADED from a Win 9x environment. I don't have a POWER USER group defined (I did a clean install).

I'm not concerned about the users "abusing" or "hacking" the system, but I don't want to open the doorway for a virus or external hack to do more damage.

I could add the permission explicitly to the users that need it instead of the generic USERS group. Would that make it safer?

Dave
0
 
LVL 63

Expert Comment

by:SysExpert
ID: 6215254
POWER USER is normal only on win2k Pro installs, not server, to the best of my knowledge.

Your Idea about admin, sounds good.

0
 
LVL 7

Expert Comment

by:franka
ID: 6215700
if you are a bit experienced, but can try the great tool Regmon of Sysinternals (http://www.sysinternals.com/ntw2k/source/regmon.shtml)
and filter for "denied" entries.
So you will find where the program has problems with rights on registry hives.

0
 
LVL 32

Expert Comment

by:jhance
ID: 6215972
Frankly,  I'd STAY AWAY from such a program on W2K.  Any such application should be designed to install as administrator and run using the SERVICE account, LOCAL SYSTEM.  This will give it the required privileges over the settings and applications on the machine but will not force you to open up the registry protections for people to mess with.

I'll just reiterate.  Any users who can modify registry entries under HKEY_LOCAL_MACHINE can gain full access to the machine.  In other words, it makes security a farce!
0
 
LVL 5

Author Comment

by:dcgames
ID: 6216022
Thank you guys. Sound Advice.

0

Featured Post

Free eBook: Backup on AWS

Everything you need to know about backup and disaster recovery with AWS, for FREE!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

One of the biggest threats in the cyber realm pertains to advanced persistent threats (APTs). This paper is a compare and contrast of Russian and Chinese APT's.
Smart phones, smart watches, Bluetooth-connected devices—the IoT is all around us. In this article, we take a look at the security implications of our highly connected world.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question