![]() ![]() ![]() ![]() |
| Topics this page: ![]()
|
|
|
Subject | Windows 2003/2000 | NT4 |
---|---|---|
Maximum cluster size of compressed NTFS5 partitions | 4 KB | N/A |
Maximum size (GB) of FAT32 partition with 4KB clusters | 8 GB | |
Maximum size (GB) of FAT32 hard drive partition | 32 GB | |
Maximum size (GB) of FAT16 hard drive partition | 4 GB | |
Maximum size (GB) of NTFS hard drive partition | 75 | 64 |
Maximum # of Characters in User Account name | 20 | 15 |
Maximum # of Characters in User Password | 127 | 8 |
Maximum # of Characters in domain controller FQDN | 155 | |
Maximum # of Characters in Active Directory DNS domain name | 64 | |
Maximum # of Disks in a Spanned Volume | 32 | |
Maximum # of drives in a RAID-5 array | 32 | |
Highest Application Thread Priority level | 31 | |
Highest Document Priority assigned to a print job | 99 | |
Lowest Document Priority assigned to a print job | 1 | |
Maximum # of Dfs links assigned to a Dfs root | 1,000 | |
The maximum # of concurrent connections allowed to a computer | 10 |
Download Windows 2003 SP2 (32-bit x86) and keep it handy if you don't have the DVD media.
what is windows 2003?
Here's also a
Windows comparision chart as well as a
Windows starter plan and more information on
Microsoft exchange server hosting.
Microsoft's Distributed Systems Guide has dozens of richly illustrated pages on Active Directory and Distributed Security.
Microsoft's Server Resource Kit Supplements
SupportLive Chat: Microsoft Windows 2000 Server and Windows 2000 Professional: February 20, 2001
|
Task | Windows 2000 | Windows NT | Windows 98 |
---|---|---|---|
Windows Explorer | Programs | Accessories | Programs | -- |
Command Prompt | Programs | Accessories | Programs | -- |
Administrative Tools | Settings | Control Panel | Programs | -- |
Mark Minasi publishes a free newsletter and presents seminars based on his highly rated and best-selling book: Mastering Windows 2000 Server, 3rd Edition
SecurPass Reset is a self help utility that enables end-users who forgot their password, or accidentally got locked out of their own accounts, to reset their own passwords and re-enable their own accounts via a web application, without Help Desk intervention.
|
Area | /area | Count |
---|---|---|
![]() | USER_MGMT | 14 |
![]() | SECURITYPOLICY | 14 |
![]() | USER_MGMT | 9 |
![]() | USER_RIGHTS | 34 |
![]() | DSOBJECTS | 39 |
![]() | USER_MGMT | |
![]() | GROUP_MGMT | |
![]() | SERVICES | |
![]() | REGKEYS | |
![]() | FILESTORE |
Rights grant the ability to perform (do) an action such as login.
Permissions grant access to a resource such as a folder, file, or printer.
In the Group Policy hierarchy, Security settings are under Computer Configuration, Windows Settings.
The Security Options node is contained in the Local Policies node.
Local machine policies can only contain security settings for Account Policies and Local Policies.
Domain Policies
Details on each security policy is shown here. In each list:
Policies created on Windows 9x will not work with Windows 2000.
| ![]() ![]() ![]() |
|
Action | Group to use |
---|---|
Assign permissions and rights to local domain resources | Local |
Give rights to users from another domain | Local |
Combine groups | Local |
Allow users access to Windows NT Workstations or NT servers in a domain | Global |
Export user to another domain | Global |
|
Group Scope | User Login from | Can use resources in | In Global Catalog? | BUILTIN Groups |
---|---|---|---|---|
Local | local machine | local machine only | No | |
Domain Local | Local domain | Local domain | List of groups but NOT Memberships |
|
Global | Any domain |
| ||
Universal | Any domain | List of groups and Memberships |
| |
- | - | SQL, MTS | - | |
|
![]() ![]() You have admin privileges if you see “Open All Users”. For more information on commands:
| ![]() ![]() ![]() |
| ![]() ![]() | ![]() ![]() ![]() |
| ![]()
| ![]() ![]() ![]() |
function block100() { var oWsh = new ActiveXObject("WScript.Shell"); var strCommand = "IPSecPol \\\\localhost" + " -w REG -p \"Test\" -o"; var iRet = oWsh.Run(strCommand, 0, true); WScript.echo("DEBUG: called " + strCommand + " -> " + iRet); strCommand = "IPSecPol" + " -x -w REG -p \"Test\" -r \"Block1-100\" -n BLOCK -f "; for (var i = 1; i <= 100; i++) { strCommand += "*::+0:" + i + ":TCP "; } iRet = oWsh.Run(strCommand, 0, true); WScript.echo("DEBUG: called " + strCommand + " -> " + iRet); }
|
The Read permission for a folder means that the following permission entries are allowed:
|
To remove Everyone and User perms, re-ACL executable content
by using Eric's x
template for IIS5 servers so that only admins can
use the box locally. His
script for NT4 re-ACLs a system and replaces Everyone with AuthUsers.
Web sharing depends on the Server service.
By default, Windows 2000 assigns Full Control permissions to the Everyone group
That's ONLY for child objects checked Allow inheritable permissions from parent to propagate to this object.
acldiag.exe writes to a tab-delimited file the permissions of objects the user has a right to view.
Systemtools.com's DumpSec utility (a.k.a. DumpAcl) dumps a remote computer's user, group, and permissions information.
Operation | Into the Same Volume | Into a Different Volume |
---|---|---|
Copy | Inherits from the destination folder | Inherits from the destination folder |
Move (Cut and Paste) | Retains from the folder moved from. |
When a shared folder is moved, Windows 2000 automatically stops sharing the folder.
To preserve permissions when copying and moving files, use this Resource Kit CLI utility:
The $299 Security Copy utility integrates with the Windows NT 4.0 Desktop
to copy files and directories on NTFS partitions while keeping the security intact, creating shares, and migrating local groups.
It also does Differential Copying of only files that have changed in the source server.
Multiple opartions can be scheduled to run after hours.
| ![]() Windows.NET will include a Group Policy Management Console (GPMC) that will export and import group policies.
| ![]() ![]() ![]() |
|
Type of Template | Class of Computer | Notes | ||
---|---|---|---|---|
Workstation | Server | Domain Controller | ||
Default Security Settings | basicwk [1] | basicsv [1] | basicdc |
[1] User Rights\Restricted Groups not included.
[2] Assumes clean-install NTFS file\reg ACLs. [3] Secures remaining areas. [4] Includes SecureDC settings with Windows 2000-only enhancements. [5] Increases SecureWS Settings. Restricts Power User and Terminal Server ACLs. [6] Empties Power Users group. |
High Security | hisecws [5] | - | hisecdc [2,4,6] | |
Secure | securewk [2,3,6] | - | securedc [2,3] | |
Optional Component File Security | ocfilesw | ocfiless | - |
|
Tree | Policy | Default | Recommended |
---|---|---|---|
Password |
Enforce password history | 0 passwords remembered | 11 previous |
Maximum password age | 0 | ||
Minimum password age | 0 days | ||
Minimum password length | 4 characters | ||
Passwords must meet complexity requirements | Disabled | - | |
Store password using reversible encryption for all users in the domain | Disabled | - | |
Account |
Account Lockout duration | ||
Account Lockout threshold | 0 attempts | ||
Reset Account Lockout counter after a defined set of time | |||
Kerberos |
Enforce user logon restrictions | ||
Maximum lifetime for service ticket | 600 minutes | ||
Maximum lifetime for user ticket | 10 hours | ||
Maximum lifetime for user ticket renewal | 7 days | ||
Maximum tolerance for computer clock synchronization | 5 minutes |
|
Policy name in GUI | .inf [Event Audit] | auditpol CLI | Recommended NSA value | Default |
---|---|---|---|---|
Audit account logon events | AuditAccountLogon | 9. Account | 3=Success, Failure | |
Audit account management | AuditAccountManage | 7. Sam | 3=Success, Failure | ? |
Audit directory service access | AuditDSAccess | 8. Directory | 0 | ? |
Audit logon events | AuditLogonEvents | 2. Logon | 3=Success, Failure | ? |
Audit object access | AuditObjectAccess | 3. Object | 2=Failure | ? |
Audit policy change | AuditPolicyChange | 6. Policy | 3=Success, Failure | ? |
Audit privilege use | AuditPrivilegeUse | 4. Privilege | 2=Failure | ? |
Audit process tracking | AuditProcessTracking | 5. Process | 0=No auditing | ? |
Audit system events | AuditSystemEvents | 1. System | 3=No auditing | ? |
Shut down the computer when the security audit log is full | CrashOnAuditFull | 1=Yes |
Use this graphic to remember the 9 Windows 2000 audit policies.
Download the Visio flowchart file for this graphic
|
Policy | Right | Administrator | Power Users | Backup Operators | Users | Guest | Everyone | |
---|---|---|---|---|---|---|---|---|
U,G | Access this computer from the network | Y | Y | Y | Y | Deny | Y | |
U | Act as part of the operating system | |||||||
U | Add workstations to domain | |||||||
G | Adjust memory quotas for a process | Y | ||||||
G | Allow logon through Terminal Services | Y | ||||||
U,G | Back up files and directories | Y | - | Y | ||||
U,G | Bypass traverse checking | Y | Y | Y | Y | - | Y | |
U,G | Change the system time | Y | Y | |||||
U,G | Crate a pagefile | Y | ||||||
U | Create a token object | |||||||
U | Create permanent shared objects | |||||||
U | Debug programs | |||||||
G | Delete programs | Y | ||||||
U | Deny access to this computer from the network | |||||||
U | Deny logon as a batch job | |||||||
U | Deny logon as a service | |||||||
U | Deny logon locally | |||||||
U | Enable computer and user accounts to be trusted for delegation | |||||||
U,G | Force shutdown from a remote system | Y | ||||||
U | Generate security audits | |||||||
U,G | Increase quotas | Y | ||||||
U,G | Increase scheduling priority | Y | ||||||
U,G | Load and unload device drivers | Y | ||||||
U | Lock pages in memory | |||||||
U | Log on as a batch job | |||||||
U | Log on as a service | |||||||
U,G | Log on locally | Y | Y | Y | Y | Deny | Y | |
U,G | Manage auditing and security log | Y | ||||||
U,G | Modify firmware environment values | Y | ||||||
G | Perform volume maintenance tasks | Y | ||||||
U,G | Profile single process | Y | Y | |||||
U,G | Profile system performance | Y | ||||||
U,G | Remove computer from docking station | Y | Y | - | Y | |||
U,G | Restore files and directories | Y | - | Y | ||||
U | Synchronize directory service data | |||||||
U,G | Shut down the system | Y | Y | Y | - | Y | ||
U,G | Take ownership of files or other objects | Y |
|
Policy | Default | Recommended |
---|---|---|
Additional restrictions for anonymous connnections | ||
Allow server operators to schedule taks (domain controllers only) | ||
Allow system to be shut down without having to log on | ||
Allowed to eject removeable NTFS media | ||
Amount of idle time required before disconnecting session | ||
Audit the access of global system objects | ||
Audit use of Backup and Restore privilege | ||
Automatically log off users when logon time expires (local) [7] | ||
Clear virtual memory pagefile when system shuts down | ||
Digitally sign client communication (always) | ||
Digitally sign client communication (when possible) | ||
Digitally sign server communication (always) | ||
Digitally sign server communication (when possible) | ||
Disable Ctrl+Alt+Del requirement for logon | ||
Do not display last user name in logon screen | ||
LAN Manager Authentication Level | ||
Message text for users attempting to log on | ||
Message title for users attempting to log on | ||
Number of previous logons to cache (in case domain controller is not available) | ||
Prevent system maintenance of computer account password | ||
Prevent users from installing printer drivers | ||
Prompt user to change password before expiration | 14 days | |
Recovery console: Allow automatic administrative logon | ||
Recovery console: Allow floppy copy and access to all drives and all folders | Disable | |
Recovery console: | ||
Rename administrator account [7] | ||
Rename guest account [7] | ||
Restrict CD-ROM access to locally logged-on user only | Disabled | |
Restrict floppy access to locally logged-on user only | Disabled | |
Secure channel: Digitally encrypt or sign secure channel data (always) | Disabled | |
Secure channel: Digitally encrypt secure channel data (when possible) | Enabled | |
Secure channel: Digitally sign secure channel data (when possible) | Enabled | |
Secure channel: Require strong (Windows 2000 or later) session key | Disabled | |
Send unencrypted password to connect to third-party SMB servers | Disabled | |
Shut down immediately if unable to log security audits | Disabled | |
Smart card removeable behavior | No Action | |
Strengthen default permissions of global system objects | Disabled | |
Unsigned driver installation behavior | Not defined | |
Unsigned non-driver installation behavior | Not defined |
|
Policy | Default | Recommended |
---|---|---|
Encrypted Data Recovery Agents | Domain Administrator | |
Root certificates (trusted) | -- | |
Certificate Trust Lists (scope) | -- |
IPSec (Internet Procotol Security) Policies
|
| ![]() ![]() ![]() |
| ![]() Utility from the Server CD to view dependencies, starting from NTOSKRNL.
client jobs are spooled (via a TCP/IP conversation —not merely copied) to the print server's x.sp_ file in \System32\Spool and an accompanying x.shd,/b> shadow file in \system32\spool\printers.
These files, once created on the server, can be copied and pasted to another location.
\system32\spool\drivers has
Share
| ![]() ![]() ![]() |
| ![]()
To detail threads running within each process,
use the Process Viewer from the Windows 2000 Support Tools CD:
For a hierarchical arrangement of parent and child processes,
use the Task List from the Windows 2000 Support Tools CD:
.ACM CodecsTo display information about your threads using WMI/WBEM, run this from the Resource Kit:![]() | ![]() ![]() ![]() |
|
Mode | Priority |
---|---|
Realtime | 24 |
Above Normal | ??? |
High | 13 |
Normal | 8 |
Below Normal | ??? |
Low | 4 |
Use the Task Manager to change an application's priority. Under the Processes tab, right-click on the task Image Name and select Set Priority. Setting the mode of an application automatically sets the priority as well. Priorities range from 0 to 31, with 31 being the highest priority.
taskmgr.exe defaults to High. Other apps default to Normal. Only Windows XP features Above and Below Normal priority modes.
How does a C or Java programmer change priorities from within an application program?
Related Topics:
| ![]() ![]() ![]() |
![]()
| Your first name: Your family name: Your location (city, country): Your Email address: |
Top of Page ![]() Thank you! |