Security checklist for installing Windows 2000

Security checklist for installing Windows 2000
By Mark Edmead

One of the biggest requests I receive is if I can provide a basic security checklist of things to look for when installing Windows 2000. Although every Windows 2000 network is different, there are some basic precautions everyone can implement. By implementing these, you will be well on your way to securing your system.

1. Implement strong password security. This concept may be obvious, but often it is overlooked in many companies. You should force complex passwords (one requiring uppercase, lowercase and special characters), have passwords expire every 60 to 90 days, not allow them to reuse the same password often, force the user to change the password when they first log on to the system.

2. Limit the number of unnecessary accounts. In many cases, people have extra accounts used for testing, general department accounts and so on.

3. Use NTFS on all partitions. Using NTFS you can set file and folder level permissions.

4. Use the Security Configuration Toolkit to configure security policies.

5. Shut down unnecessary services and ports.

6. Enable auditing. This is the most basic thing an administrator can do to implement a basic intrusion detection system.

7. Make sure the Guest account is disabled.

8. Make sure you backup your data and store the tapes in a safe (preferably off-site) location.


    Requires Free Membership to View

About the author:
Mark Edmead is an expert on searchSystemsManagement. He is also the author of Windows NT: Performance Monitoring and Tuning and is currently working on a new book focused on Windows 2000 security.

Related book

Windows Nt Performance: Monitoring, Benchmarking and Tuning
Authors : Mark T. Edmead and Paul Hinsberg
Publisher : New Riders
ISBN/CODE : 1562059424
Cover Type : Soft Cover
Pages : 288
Published : Dec. 1998
Windows NT Performance: Monitoring, Benchmarking and Tuning provides a one-stop source for sound technical information on doing everything necessary to fine tune your network. From monitoring to benchmarking, from analyzing performance numbers to isolating and solving resource bottlenecks, the authors provide a reliable blueprint for ensuring optimal Windows NT performance.

This was first published in March 2001

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.