[2 days left] What’s wrong with your cloud strategy? Learn why multicloud solutions matter with Nimble Storage.Register Now

x
?
Solved

What does W2K Everyone account do and can I remove it?

Posted on 2006-11-17
1
Medium Priority
?
592 Views
Last Modified: 2012-06-21
Hi, I'm putting up a web server and will host a web site for experience and fun. I use Windows 2000 Advance Server, IIS 5 and Access database on my C drive. Now I have 2 questions about security:
1. it is said that you should store your database on a different drive for security. Is it really helpful? (My D drive has no OS installed).
2: I went to the properties of both my c and d drive. On the security tab. There's only one user: Everyone. And he is given full control. If I remove this user, does it mean IUSR_computerName can't access my web page even if I add him on the security tab and assign him read & Execute permission. And will administrator be able to do his job if I add him and give him full control.

In fact, what exactly is this Everyone thing?

Thank you
0
Comment
Question by:causewaybay
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 16

Accepted Solution

by:
Brian Pringle earned 500 total points
ID: 17970078
Database:

A separate drive is recommended, but at a minimum, put it in a folder that is not under "C:\Inetpub".  Put is somewhere else, like "C:\WebDatabase".  


Permissions:

Do *NOT* use the "Everyone" group for any of your folders.  At the root of the C: drive, change the permissions as follows.  Propagate the settings down to subfolders.

Remove -- Everyone
Add --
    Administrators          Full Control
    SYSTEM                   Read Only
    Users                       Read Only

Then, change the permissions of the C:\Inetpub folder as follows.

Add --
    Administrators          Full Control
    SYSTEM                   Read Only
    Users                       Read Only
    IUSR_compname       Read and execute
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Will you be ready when the clock on GDPR compliance runs out? Is GDPR even something you need to worry about? Find out more about the upcoming regulation changes and download our comprehensive GDPR checklist today !
An overview of cyber security, cyber crime, and personal protection against hackers. Includes a brief summary of the Equifax breach and why everyone should be aware of it. Other subjects include: how cyber security has failed to advance with technol…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

656 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question