Solved

Windows 2000 drive/folder security

Posted on 2004-09-15
7
124 Views
Last Modified: 2010-04-14
I rebooted our Windows 2000 Advanced Server machine and got a bsod with the inaccessable_boot_device message.  I was able to get into the recovery console and  run chkdsk /r and after that it booted up just fine.  This pc has a webserver and terminal server running on it.  We use it to do some data entry on our in house software and the webserver uses odbc to connect to the backend and run some queries and display reports.  The hard drive is partitioned.  The webserver and system files sit on the c drive and our software sits on the d drive.  Anyway, after I ran chkdsk on the c drive it screwed up some security settings.  The d drive hasn't been affected.  Now when someone tries to log into the server via TS (they're in the users group) they get an access denied error.  If I log in as the administrator I have no problem.  If I add the user to the administrator group they can get in just fine.  When someone tries to load a webpage from the server they get a login screen that pops up.  You have to login as the administrator before you can view the webpage.  I noticed that the security on the c drive and several folders in that drive only has the administrator in it.  Several of the folders in the c drive I could probably configure the security on but the majority I wouldn't know what to set for some of the folders.  Especially the windows folder.  Is there a way I can set it back to default (prior to bsod) or am I stuck using trial and error to get the correct settings back.
0
Comment
Question by:tnkrtrn
  • 3
  • 2
  • 2
7 Comments
 
LVL 8

Accepted Solution

by:
f_umar earned 125 total points
ID: 12071999
give read & execute permissions to local user group domain users group should be a member of your local  user group.

full control for local administrator group domain administrators should be a member of local administrator group.

give these permissions in security tab of your c drive then reset these permissions to  all child objects in advanced.

cheers!!
0
 

Author Comment

by:tnkrtrn
ID: 12072279
What about SYSTEM?
0
 
LVL 8

Expert Comment

by:f_umar
ID: 12072291
give full control to system.
0
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

 

Author Comment

by:tnkrtrn
ID: 12081418
Well I set it up and still am getting errors with the webserver.  The actual pages sit in c:\web and there's only a couple of pages.  Although it does use a ms acces db to check the user/pass.  That file sits in c:\web\data.  Should I assign this folder special security settings.
0
 
LVL 8

Expert Comment

by:f_umar
ID: 12081715
set the permissions in iiis for the web site contents along with ntfs permisssions.


0
 
LVL 2

Expert Comment

by:andyswarbs
ID: 12084880
run sysinternals.com ntfilmon nd regmon and watch the process of a user logging on.  If there is an access denied then the error should show up in one of these logs.

You know it makes sense!
0
 
LVL 2

Expert Comment

by:andyswarbs
ID: 12084888
also add a tricky user to admin group - and check they are ok.  It could be something else!
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
In this article, I will show you HOW TO: Perform a Physical to Virtual (P2V) Conversion the easy way from a computer backup (image).
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now