This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Configure password and account policiesConfigure password and account policies
Configure auditing, user rights, and security optionsConfigure auditing, user rights, and security options
Configure encrypted data recovery agents, domain roots, trusted certificate authorities, etc.Configure encrypted data recovery agents, domain roots, trusted certificate authorities, etc.
Configure IP security on a networkConfigure IP security on a network
Configures settings for application logs, system logs, and security logsConfigures settings for application logs, system logs, and security logs
Restricted Restricted GroupsGroups
Restricted Restricted GroupsGroups Configures group memberships for security sensitive groupsConfigures group memberships for security sensitive groups
System System ServicesServicesSystem System ServicesServices
Configure security and startup settings for services runningon a computerConfigure security and startup settings for services runningon a computer
RegistryRegistryRegistryRegistry Configures security on registry keys Configures security on registry keys
File systemFile systemFile systemFile system Configures security on specific file pathsConfigures security on specific file paths
Using Predefined Security TemplatesUsing Predefined Security Templates
Define the default security level for Windows 2000.
Define the default security level for Windows 2000.
Provide an additional level of security than Compatible, but do not ensure that all of the features of standard business applications will run.
Provide an additional level of security than Compatible, but do not ensure that all of the features of standard business applications will run.
Provide a a higher level of security than Basic but still ensures that all the features of standard business applications will run.
Provide a a higher level of security than Basic but still ensures that all the features of standard business applications will run.
Enforce the maximum security for Windows 2000 without consideration for application functionality.
Enforce the maximum security for Windows 2000 without consideration for application functionality.
Task is completed successfully.See log C:\WINNT\security\logs\MySecure.Log for detail info.
Auditing Access to System ResourcesAuditing Access to System Resources
Introduction to AuditingIntroduction to Auditing
Selecting Events to AuditSelecting Events to Audit
Planning an Audit PolicyPlanning an Audit Policy
Setting Up an Audit PolicySetting Up an Audit Policy
Auditing Access to ResourcesAuditing Access to Resources
Introduction to AuditingIntroduction to Auditing
Auditing Tracks User and Operating System Activities Auditing Tracks User and Operating System Activities
Audit Entries Contain Actions Performed, Users Who Performed the Audit Entries Contain Actions Performed, Users Who Performed the Actions, and Success or Failure of the Events Actions, and Success or Failure of the Events
Audit Policy Defines the Types of Security Events That Windows 2000 Audit Policy Defines the Types of Security Events That Windows 2000 Records Records
You Set Up an Audit Policy to Track Success or Failure of Events, You Set Up an Audit Policy to Track Success or Failure of Events, Identify Unauthorized Use of Resources, and Maintain a Record Activity Identify Unauthorized Use of Resources, and Maintain a Record Activity
You View Security Logs in Event ViewerYou View Security Logs in Event Viewer
Event ViewerEvent ViewerEvent ViewerEvent Viewer
User1 logon failed
Access denied
Printing successful
Use of Use of ResourcesResources
Use of Use of ResourcesResources
Success or Success or Failure Failure LoggedLogged
Success or Success or Failure Failure LoggedLogged
Selecting Events to AuditSelecting Events to AuditEventEventEventEvent ExampleExampleExampleExample
Account logonAccount logon Domain controller receives a request to validate a user accountDomain controller receives a request to validate a user account
Account management
Account management Administrator creates, changes, or deletes a user account or groupAdministrator creates, changes, or deletes a user account or group
Directory service access
Directory service access User gains access to an Active Directory objectUser gains access to an Active Directory object
LogonLogon User logs on or off a local computerUser logs on or off a local computer
Object accessObject access User gains access to a file, folder, or printerUser gains access to a file, folder, or printer
Policy changePolicy change Change is made to the user security options, user rights, or Audit policiesChange is made to the user security options, user rights, or Audit policies
Privilege usePrivilege use User exercises a right, such taking ownership of a file User exercises a right, such taking ownership of a file
Process trackingProcess tracking Application performs an actionApplication performs an action
SystemSystem User restarts or shuts down the computerUser restarts or shuts down the computer
Planning an Audit PolicyPlanning an Audit Policy
Determine the Computers on Which to Set Up AuditingDetermine the Computers on Which to Set Up Auditing
No auditingNo auditingNo auditingNo auditingNo auditingNo auditingNo auditingNo auditingNo auditing
• Assign Security Settings to a Single Computer by Configuring Assign Security Settings to a Single Computer by Configuring the Settings in Local Policies in Group Policy the Settings in Local Policies in Group Policy
• Assign Security Settings to Multiple Computers by Creating a Assign Security Settings to Multiple Computers by Creating a Group Policy Object and Assigning ItGroup Policy Object and Assigning It
Auditing Access to ResourcesAuditing Access to Resources
File SystemFile System Set the Audit Policy to Audit Object Access Enable Auditing for Specific NTFS Files and Folders Record Success or Failure of an Event
Set the Audit Policy to Audit Object Access Enable Auditing for Specific NTFS Files and Folders Record Success or Failure of an Event
NTFSNTFS
PrintersPrinters Set the Audit Policy to Audit Object Access Enable Auditing for Specific Printers Record Success or Failure of an Event
Set the Audit Policy to Audit Object Access Enable Auditing for Specific Printers Record Success or Failure of an Event