• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 349
  • Last Modified:

NTFS Permissions

Hi

After hearing teh danger of teh admin shares on windows XP and 2000 prof i chnaged my local drives NTFS permmisons from teh defualt to

Admininstrtors (full acsess)
System (full acsess)
authenticated users (readand exccute)

NB i disabled teh guest account too !!

And allows these to filter through to the child ( sub folders) on my machine

My system runs ok so first off are these the safest permmisons to use ?????

Then I went into "Local Security Policy" and imported the "setup security.inf" policy is this the best one again ?????

Thanks
SILKI
0
silki
Asked:
silki
  • 3
  • 3
1 Solution
 
nihlcatCommented:
Those permissions seem safe.  You might also want to consider renaming your Administrator account, as it is always a target for intruders.
0
 
silkiAuthor Commented:
Hi,

Thanks for teh feedback so my "Local Security Policy" bein set (imported) back to "setup security.inf" policy is  just like reseting back to default ie teh safest ???

authenticated users have actually got modify perrmisons as im ruuing IIS so i need Inest user to have these permmions but a person woudl need to have an accoutn in hack one of my accounst to get in as authenticated users ???

So you say rename administrators to somehting else ?? woudlnt they need a password though to do any damage ?!?!?

THANKS
SILKI
0
 
nihlcatCommented:
Of course they would need the password, but they (the bad people) already know the username.  The account 'administrator' is known to all.  Our company's security baseline requires it to be renamed.
0
Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

 
silkiAuthor Commented:
Thanks nihlcat,

Can you just confirm thsi part for me ...

"so my "Local Security Policy" bein set (imported) back to "setup security.inf" policy is just like reseting back to default" ??? Secure ???
0
 
nihlcatCommented:
Sorry I totally misread part of your question.  Yes that's the default (setup security.inf).  But no, not very secure at all.  Policies become incrementally more secure.  You may wish to try hisecdc.inf, but it really depends on your network.  You need to be sure to not make it too restrictive.  I think pre-production testing is probably best.

 
More information on predefined security policies:

http://www.microsoft.com/windows2000/en/advanced/help/default.asp?url=/windows2000/en/advanced/help/sag_SCEdefaultpols.htm
0
 
silkiAuthor Commented:
Thanks ....
0

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

  • 3
  • 3
Tackle projects and never again get stuck behind a technical roadblock.
Join Now