In-Depth
Tickets, Please! Limit User Access with Windows 2000
Use Windows 2000's default security to make sure no one gets in without your permission. First step: Understand what ships in the product.
- By Roberta Bragg
- 03/01/2000
In the dream world of systems folks, operating systems
would install automatically as unpenetrable fortresses.
Windows 2000 moves closer toward that Nirvana; but rest
assured you’re still guaranteed employment in setting
it up correctly and securely. Having said that, there’s
no need to make your job any harder than it already is.
Follow my explanations here to understand how to make
a clean Win2K installation as secure as possible from
Day 1. Doing so will also make any extra security you
decide to install later easier to learn about and add.
So, what security features come with Win2K? Which install
automatically, and which will need some tweaking? For
starters, here’s a list of some of the major security
enhancements you’ll find in the product:
- Kerberos
- More granular file access permissions
- Tighter default Registry settings
- Security Configuration Tool Set and Secedit
- Group Policy Editor
- IP Security (IPSec)
- Built-in smart card integration services
- Windows File Protection
- Built-in public key infrastructure (PKI)
- Encrypting File System (EFS)
The list also includes a host of smaller-but-still-handy
security features like a way to eliminate NetBIOS, which
was a source for many system attacks; tighter file and
program access; “super” hidden files that are difficult
to view; and a write-protected kernel mode.
Although the product ships with all these features, is
it secure on installation? Well, if you buy a house with
an alarm system but don’t understand the key codes and
therefore don’t set it, is it secure? As with any product
you want to secure, you’ll need to delve into the features
and how to use them. Let’s begin by taking a look at each
security service in Windows 2000 and what you must do
to make each work for you.
Kerberos
Like the classical guardian of the gates to Hades, Kerberos
denies access to your OS—or any other resource in your
enterprise—until you prove your identity. The Kerberos
protocol has been an industry standard for many years
and is well-proven to be secure.
On one level, Kerberos works by matching your logon identity
and the password entered against its own Key Distribution
Center; it then provides you with a ticket-granting ticket.
Win2K caches this ticket for later use.
For example, if you want to visit the corporate email
server to read your mail, use this ticket to hop on board
the Kerberos security train. Next stop is the ticket-granting
server. This server makes no judgment about your rights
to access a particular mailbox; it merely verifies the
authenticity of your ticket and issues you another ticket
for the mail server. This second ticket authenticates
you—it tells the mail server that “the bearer of this
document is who he says he is.” The mail server then checks
to see if you have permission to read the mail. And so
it goes.
Whew! It sounds complicated. But to users, all this extra
security is transparent. It’s also transparent to administrators,
because Win2K uses Kerberos by default for network authentication.
The widespread use of this protocol to secure other distributed
systems offers the potential of integration with other
implementations of Kerberos Version 5. Here at last is
the opportunity for an integrated, truly cross-operating-system,
enterprise-wide authentication security system. Of course,
implementing that integration and understanding the causes
of authentication problems, error messages, and so on,
requires an in-depth understanding of this new protocol.
(For starters, see Microsoft’s white paper on Kerberos
integration at www.microsoft.com/security.)
And Kerberos is no different than any other security based
on passwords—you must implement a tight password policy
in your environment.
Kerberos provides Windows 2000 with a more secure, industry-recognized
replacement for logon than the much-maligned NTLM algorithm
(also known as “challenge/response”) used in Windows NT
(LM is used in Windows 9x). It also adds the capability
for single sign-on through SSPI, Microsoft’s implementation
of the General Security Service Application Program Interface
(GSS-API) standard. GSS-API is an IETF-proposed standard
API (RFC 1964) that can be used with Kerberos for this
purpose. Single sign-on means interoperability between
non-Windows 2000 clients that support the standard, and
Windows 2000 clients and non-Windows 2000 Kerberos realms
(MIT Kerberos domains).
One caveat: If you choose to integrate previous clients
(NT or Windows 9x), you still need support for LM and
NTLM logon. By default, support for these protocols is
enabled; so to secure a 100-percent Win2K organization,
you must remove this support. To limit use of LM and NTLM,
implement Registry support for NTLMv2. (For more information
on this, see my article, “Top 10 NT Security Fixes” online
in this issue.)
Athena,
Euripides, and a Dog Named Kerberos |
“Athena and Euripides are
working at neighboring terminals...” Thus
begins a delightful, fictitious account
written a dozen years ago about the design
of Kerberos. In this account, Athena is
tired of sharing a mainframe with others
and wants to develop a system in which
users can access resources across a network
from their PCs. Euripides sees the inherent
insecurity of such an arrangement. Together
they hash out the design of a secure authentication
protocol, which Athena names Kerberos
after her Uncle Hades’ three-headed watchdog.
This story, written by Bill Bryant and
added to by Theodore Ts’o, is a good,
easily understandable introduction to
the Kerberos protocol. To read it, go
to “Designing an Authentication System:
a Dialogue in Four Scenes” at http://web.mit.edu/kerberos/www/dialogue.html.
You’ll also find additional information
on Kerberos at this MIT site. |
|
|
More Granular File Access Permissions
With NT, you can explicitly deny file or folder access
to any user or group. With Win2K, you can explicitly deny
any permission to a file or folder to any user or group.
That’s right—you can deny full control, or deny read,
or deny write permission. This gives you much more granular
control.
Let’s say Sharon Rollins is a member of both the Accountants
Group and the Managers Group. The Managers Group is given
read and write permissions to a folder; the Accountants
group is given read permission. Without any other entries,
Sharon has read and write access. In NT, giving Sharon
read-only access to a certain file while maintaining read
and write permission for the Managers Group meant you
either had to make a new group, or remove Sharon from
the Managers Group. You could deny her access, but that
wasn’t what you really wanted. With Win2K, you simply
deny Sharon write access to this particular file. She
still maintains any other access granted by each group
to other files and folders, and read access provided by
the Accountants Group.
You also have the choice of stopping inheritance. To
do this, uncheck the “allow inheritable permission from
parent to propagate” box on the “security” tab of the
file or folder properties dialog box when setting permissions.
You can do this for any file or folder. If inheritance
is blocked on subfolders, you can’t destroy their settings
by bulk propagation from higher-level folders. (That closes
a security hole in NT in which the OS could be destroyed
by removing the group Everyone from the root and selecting
“replace permission on subdirectories.”
Tighter Default Registry Settings
Fire up good old regedt32.exe and peek at the security
settings for sensitive keys. You’ll find that many formerly
wide-open areas are more tightly controlled. For example,
the System group is already entered everywhere for you,
with access rights of Full Control. The new thing here
is that it’s actually listed. Remember trying to implement
tighter security in NT? If you forgot to enter the System
and give it Full Control, you were in danger of locking
the OS out of its own files. Win2K prevents that administrative
blunder by entering System controls for you.
Check out a few keys, and you’ll run into a new group
called “Restricted.” This is an implicit group whose membership
is determined by membership in one of the built-in sensitive
groups, such as Administrators, Server Operators, Print
Operators, and Account Operators (you can add your own
groups to the Restricted group as well). Having this identity
can serve to automatically provide security membership,
and thus give or maintain special access to resources.
The Restricted identity can also be leveraged to control
membership in these sensitive groups.
In many cases, Administrators are given full control,
Authenticated Users given read permission, and Server
Operators given special permission. (Server Operators
are not initially given permission to change permissions,
make links, or change ownership.) Creator Owner is given
Full Control, but only at the sub-key level. One of the
keys thus treated is HKLM/SOFTWARE/Microsoft. Other keys
are tightened, giving Server Operators read access only.
Those keys are HKLM/SYSTEM/CurrentControlSet, and both
HKLM/SOFTWARE/Microsoft/Windows/Current Version/Run and
/Run Once.
An insidious hole is closed by assigning Creator Owner’s
“Full Control” access to sub-keys only. In Win2K, applications
may create Registry keys and can rightfully control those
keys. Users running these applications can be given rights
to access and modify keys, but this right doesn’t translate
into the ability to create or modify other keys in that
branch. This permission definition can also help control,
at a granular level, exactly what can be done if key ownership
is compromised.
But what about applications that had problems running
in NT because they didn’t have access to needed areas
of the Registry? Applications written to Win2K logo standards
will ensure that users can run the applications they have
the right to run, without compromising security. In truth,
though, legacy applications and applications not written
to standard will continue to have problems; you’ll need
to audit their activities to find out which keys and what
types of access they need. This is the bane of tighter
security—additional work for administrators. Many applications
will require twiddling with Registry and file security
settings to maintain your sanity and security, while still
allowing users access to their applications. To curtail
this, be sure to shop for the Win2K application logo on
new purchases. Developers, check out the specifications
at www.msdn.microsoft.com/winlogo/win2000.asp and write
your applications to conform to them. [See News in this
issue to read about the slow growth of the Windows 2000
product certification program.—Ed.]
Security Configuration Tool Set and Secedit
The Security Configuration Tool Set is implemented in
the Security Configuration and Analysis Snap-In in Win2K.
It’s a collection of tools that lets you analyze, configure,
and maintain anything from the security policy of a local
computer to that of an entire Win2K enterprise. This tool
became available the same time as NT 4.0 Service Pack
4, but was known as the Security Configuration Editor
and could manage only a local computer.
In Win2K, this tool can be used to reduce administrative
costs and ease the burden of maintaining security. Think
about it. Security means constant vigilance. Most of the
time, you’re too busy responding to new requests and fighting
inaccurate or inadequate configuration to give maintenance
the place it deserves. Besides which, don’t you like to
think that once something’s put into place, it shouldn’t
arbitrarily change? Get real. Things don’t arbitrarily
change, but people change them. Maybe there was a temporary
need to give a group special permission or access until
a better solution could be found. Then life intervened,
and no one remembered to reset it. Maybe corporate politics
have placed you in the position of having to deal with
immature or vindictive administrators. And what happens
when there are 10 new servers to put into production without
adequate time to apply a thorough security lockdown?
In Win2K, you can address these problems with the Security
Configuration Tool Set, which has several pre-configured
templates that can be modified to your specifications.
You use Group Policy to apply security settings across
an organizational unit (OU) or a domain. Want to make
sure settings are maintained? Settings applied at this
level override settings made at a lower level. Need to
configure several new computers? No problem, since settings
can be configured to propagate. Are auditors knocking
at your door looking for a way to analyze your compliance
with corporate security policy? No problem. You can easily
ask for an analysis of current settings against any policy
database.
Now the real kicker: Secedit is a command-line tool that
you can use to run these programs in batch mode, or as
a task while you sleep. Take two seconds to make sure
the task is active, then view the results in the morning.
You’ll still have to do an analysis to determine what
the settings should be for your systems and then put them
into place. When first installed, the Windows 2000 default
security settings (known as the local computer policy)
are disappointingly weak. The default length of the password
is zero characters, account lockout policy isn’t set,
and no auditing is turned on. On the upside, some new
user rights and security options give us more granularity
in the interface to lock down the system. Study the available
settings in the local policy, and make your own policy
part of any installation in your site.
Checklist
for Stiffening Default Win2K Settings |
- _ Assign access control rights on
a group basis.
- _ Rely on inheritance from group
assignments.
- _ Apply rights to propagate through
the container tree.
- _ Delegate container administration
to administrators of the computers
where the containers reside—that is,
decentralize administrative operations
and issues.
- _ Set Auditing On, and use the following:
- _ Failure audit for logon/logoff.
- _ Success audit for user and
group management, security change
policy, restart, shutdown, and
system events.
- _ Success and failure audit
for file access and object access
for suspect users and sensitive
files.
- _ Failure audit for printers
that print sensitive documents
like checks.
- _ Success and failure audit
for write access for program files
(.EXE and .DLL).
- _ Train users in the proper use
of EFS. Have them encrypt their My
Documents and temp folders. Encrypt
folders rather than files.
- _ Use the Secedit command line tool
for batch analysis when a large number
of computers needs to be configured
and analyzed.
- _ Use the Security Configuration
Tool Set with Group Policy to implement
security settings at the domain or
site level, not at the local computer
level.
- _ Create personal databases into
which you import security templates
for analysis.
- _ Test predefined templates before
applying them to production systems.
- _ Make the size of the security
event log large, and don’t allow event
log wrapping. Archive frequently so
as not to miss events.
- _ Track system services used on
a computer, and set unnecessary or
unused services to manual start.
- _ Enforce password history, remembering
the last 12 passwords.
- _ Use a maximum password age of
42 days.
- _ Set minimum password age to 30
days.
- _ Set minimum password length to
eight characters.
- _ Set “Passwords must meet complexity
requirements.”
- _ Set “Store passwords using reversible
encryption for all users in the domain.”
- _ Set Account lockout policy.
- _ After trust development, set additional
restrictions for anonymous connections
to a minimum of “Do not allow enumeration
of SAM accounts and shares” and maximum
of “No access without explicit anonymous
permissions.”
- _ Enable “Automatically log off
users when logon time expires.”
- _ Enable “Clear virtual memory pagefile
when system shuts down.”
- _ Enable “Do not display last user
name in logon screen.”
- _ Create a logon banner.
- _ Configure LAN manager authentication
level: minimum =”Send LM &NTLM,
use NTLMv2 session security if negotiated.”
|
|
|
Group Policy Editor
You use Group Policies in Win2K to define a user’s desktop,
and the Group Policy Editor to create Group Policies.
It’s similar to using the Systems Policy Editor in NT.
However, Group Policies aren’t primarily applied to groups
of users. Instead, they’re applied to affect Active Directory
objects such as the Site, Domain, or Organization. That
lets you use Group Policies to control such things as
programs available to users; programs that appear on a
desktop; application settings; Start menu options; restrictions
to files, folders, and Registry keys; rights granted to
users and groups; when and what scripts run; and account
policy settings. Group Policy, then, provides a single
place for configuring, analyzing, and maintaining security
for a Win2K enterprise. Group Policy Settings override
settings made at the local computer level.
When you install a Win2K system, it’s configured with
default security settings. You can view them by accessing
“Local Security Policy” from the Administrative Tools
menu. This opens the “secpol” Microsoft Management Console
(MMC) snap-in, which displays security settings for this
machine. You can view settings on Account Policies, Local
Policies (Audit policy, User Rights Assignments, and Security
Options), Public Key Policies, and IP Security Policies.
You can gain additional information by examining file
and folder settings, and security on Registry keys. If
you join the system to a domain that has a policy configured
for it, the local security policy will propagate to this
computer.
It’s important to note that “override” does not mean
all settings at the lower level are overwritten. Settings
not explicitly set in the Active Directory will take on
the settings from the local computer policy. I’ll address
this in more detail in an upcoming article.
IP Security
IPSec is an enterprise standard for secure communication
over IP. It can be used to create a virtual private network
(VPN) with branch offices or trusted business partners
by tunneling across the Internet. It can also be used
to secure network communications between two users, or
between a user and an application interface. After it’s
configured, IPSec acts like an upside-down firewall. Whereas
a firewall filters external access to your internal network
or individual computer, IPSec filters packets leaving
your network or individual computer. You can establish
conversations between computers or security gateways (routers,
firewalls) with a high degree of granularity. A policy
database records the settings, and every packet is reviewed
before it leaves the system. If a filter is found, it’s
applied. If there’s no filter, the packet is dropped.
Here’s how IPSec works:
- Fred Smith wants secure communication over the network
with Peter Jones.
- Fred uses an IPSec-enabled application to send a
message to Peter. (Note that most inter-process communication
mechanisms will work with IPsec transparently to the
application itself, so no special application is needed
for this.)
- The driver on Fred’s computer checks the IP filter
list (policy database) for an address or traffic-type
match, and finds one.
- The driver starts security negotiations with Peter’s
computer.
- The computers do a secret key exchange, create a
secure connection, and create a session key. More security
negotiations ensue to determine the correct level of
security.
- Packets leaving Fred’s computer are signed by the
IPSec driver (to maintain integrity), and may be encrypted
for confidentiality if desired.
- When they arrive at Peter’s computer, they’re checked
for integrity and decrypted if necessary.
Fred and Peter are unaware of, and do not participate
in, any of this. The policy establishing this activity
has been pre-configured for them. Any routers between
their computers don’t have to be configured for IPSec.
(However, if any of these routers are acting as a firewall,
they need to be configured to allow IPSec traffic to pass
through.)
IPSec comes with Windows 2000, but you’ll need to plan
and configure an IPSec policy before it can be used. (This
is typically done after installation, unless you create
installation scripts to do it for you.) You don’t have
to install the protocol since it’s part of the new TCP/IP
stack, but it isn’t used unless you configure it—no simple
trick.
Built-in Smart Card Integration Services
Smart cards are credit card-sized hardware devices that
add an additional layer of security to Win2K systems.
They provide additional support for software implementations
used for logon, authentication, and secure email. Used
as a part of a public key infrastructure (PKI), they can
provide tamper-resistant storage for private keys and
other pieces of personal information. Security-critical
computations are isolated from other parts of the system.
Credentials can be made portable. Win2K supports the Personal
Computer/Smart Card specifications developed for the PC/SC
Workgroup (www.pcscworkgroup.com). Based on ISO 7816 standards,
these standards are compatible with the Europay, MasterCard,
and VISA (EMV) specifications, and with the European telecommunications
Global System for Mobile Communications (GSM) spec.
To use smart cards with Win2K, you must install a smart
card reader device and use a vendor-supplied installation
program.
Windows File Protection
Ever been to DLL hell? Sure you have—that’s where an
application installs a newer version of a DLL when an
existing app needs that older DLL to work. It’s an unintentional
denial of service (DoS) attack. If it’s this easy to replace
DLLs, what about the system DLLs? Yep, I can see you’ve
been there, too. Win2K, however, has two new features
that will help prevent DLL hell.
First, DLLs for applications designed for Win2K will
all use side-by-side DLLs. This means vendors should be
writing applications to allow the use of different copies
of DLLs for their new versions of products instead of
writing new versions of Windows DLLs. (For more information,
refer to Microsoft’s list of Win2K application logo standards.
Second, Microsoft has implemented Windows File Protection
(WFP) in Windows 2000. This means that all .SYS, .DLL,
.EXE, and .OCX files, along with some fonts that are part
of the system itself, can’t be replaced except through
a special file replacement mechanism controlled by Microsoft.
That means that vendor applications (or viruses, or Trojans,
or malicious mavericks) won’t be able to replace system
files. Ever. When the system detects an application trying
to change a system file, Win2K will change it right back.
The only (supported) way to replace system files will
be using Microsoft service packs and hot fixes. This makes
for a more stable OS, and one that is less vulnerable
to this type of attack.
Virus protection programs need to be aware of this function,
as well as any backup or restore applications.
Built-in Public Key Infrastructure
Win2K provides the pieces to establish a Public Key Infrastructure,
but you’ll have to configure them yourself. Why would
you want to?
Perhaps it’s overkill to obsess about the dangers posed
by internal users of your networked systems, but what
about that Internet access you give them? Do you have
trading partners that you work with? What will prevent
unauthorized access to monitoring or altering email, electronic
commerce transactions, and file transfers? Do you supply
your users with multiple passwords because they must access
multiple systems? Perhaps you can’t implement single sign-on
in your networks just yet. But in the multiple-password
world, be aware that users typically choose less secure
passwords because they’re easier to remember.
As a systems administrator, network administrator, manager,
auditor, or concerned user, how can you be sure of the
identity of anyone accessing your systems? Can you be
sure you’re controlling what information they have access
to? How can identification credentials (user ID, password,
etc.) be securely distributed across an organization and
with trading partners? Kerberos will solve some of these
issues, such as authentication, but you might also need
a public key infrastructure. This so-called PKI feature
is a major security enhancement in Win2K.
A public key infrastructure (PKI) includes digital certificates,
certificate authorities (CAs), and other components that
authenticate and verify legitimate access using public
key cryptography. (See my column on cryptography, “Keeping
Your Secrets Secret,” in the October 1999 issue for more
information.)
In a public key infrastructure, you issue certificates
rather than passwords. Certificates bind a public key
to the identity of a person who holds the corresponding
private key. With Win2K, you can take advantage of Certificate
Services integration with the Active Directory and Group
policy.
Data and files can be securely exchanged over public
networks such as the Internet. Secure email can be implemented
with Secure Multipurpose Internet Mail Extensions (S/MIME),
and secure Web connections can be made using Transport
Layer Security (TLS). Non-repudiation can be established
whereby the author of digitally-signed data can’t deny
being the author, whether it’s the person placing the
e-commerce order or the merchant receiving the information
for that online order.
Win2K uses a standard X.509v3 digital certificate. Certificate
Services are used to create and manage Certificate Authorities,
which are responsible for establishing and verifying the
identity of certificate holders. The CA also revokes certificates
and publishes a certification revocation list (CRL). Win2K
also sets up Web enrollment pages when a CA is created.
These Web pages allow certificate requestors to submit
certificate requests via a Web browser. Certificates can
be used for authentication and authorization and are used
with smart cards and to identify recovery agents in the
encrypting file system (see “Understanding the Encrypting
File System”).
You can find additional information on Certificate Services
at www.microsoft.com/security and www.microsoft.com/windows2000/
library/technologies/security/default.asp.
Miscellaneous Security Features
Along with the biggies like Kerberos, PKI, and Group
Policy Editor are a host of smaller security features,
many of which are installed right out of the box. Here’s
a sampling of what you’ll get.
Unprivileged User Account Privileges
Reduced
Applications that install or require user accounts to
run a service will no longer have the same rights as the
regular user accounts you and I log on with. These service
accounts, called unprivileged user accounts, will have
fewer privileges on the system than user accounts. Thus,
while they can be used by the service, it will be harder
to use them to attack the system. For example, this type
of account can’t write to any part of the systems directory.
If service accounts are given additional rights, or are
members of groups other than Users, these rights aren’t
affected.
No More NetBIOS!
Well, almost. The default configuration for Win2K will
include NetBIOS, but unlike NT, it will be possible to
set up your system so that NetBIOS isn’t loaded or present.
Hurrah! You’ve just eliminated the source for many attacks
and scans on your system information. Applications that
try to use NetBIOS on a system where it’s no longer present
will return errors.
Write-Protected Kernel Mode
Many existing device drivers are written improperly for
NT. They override the protections on write-protected regions
of memory and can cause NT to crash. To respect these
areas of memory, drivers written specifically for Win2K
will be required. Device drivers that are correctly written
can be certified; their code will be signed by Microsoft
and provided through Microsoft channels. You can configure
Windows 2000 to accept only signed device drivers, to
warn you that an unsigned driver is trying to load, or
to accept any device driver. Any OEM device driver provided
by Microsoft will be an approved driver, for example.
Configure your policy to accept only signed drivers, and
you can help protect your system from corruption.
Understanding
the Encrypting File System |
The ease with which you
can use EFS during installation belies
its usefulness. Simply right-click on
the file or folder that you want to encrypt
and click Properties. From the General
tab, click Advanced, then select the “Encrypt
contents to secure data” check box. Presto!
Now your data’s secure! This new feature
of NTFS v5 allows encryption of files
and folders. Encrypt at the folder level
to encrypt all folders in the file and
to ensure all new files added to the folder
are encrypted. Encrypt the Temp folder
if using programs that add temporary files.
No files are encrypted by default, but
the feature is. By the way, it isn’t necessary
for users to apply passwords separately
to files. And use of the system is transparent
to the user.
Proper use of the encrypting file system
can keep files safe, but there are some
rules to learn:
- Files can become unencrypted if
copied or moved to FAT volumes.
- Files created in encrypted folders
will be encrypted automatically.
- Use Edit/Copy and Edit/Paste to
retain encryption when moving encrypted
files into encrypted folders. Don’t
use drag-and-drop, as files aren’t
automatically encrypted that way.
- Compressed files can’t be encrypted.
- Users can’t share encrypted files.
- Encryption doesn’t protect against
deletion. If users have the right
to delete files in a folder, they
can delete files encrypted by other
users.
- Temporary files created by applications
will be encrypted only if they’re
created in an encrypted folder. To
maintain encryption, encrypt the Temp
file folder.
- Users can encrypt or decrypt folders
and files on a remote computer if
it has been configured for remote
encryption.
- Data transferred over the network
isn’t encrypted during the transfer—you
must use an encryption protocol, such
as SSL/PCT or IPSec.
|
|
|
Tighter Default File and Program Access
A clean installation of the new OS onto an NTFS partition
creates file system permissions designed to prevent users
from compromising the integrity of the operating system
and installed applications. Users can’t modify settings
on operating system files or program files, and can only
install applications that can be run by themselves (if
they’re provided access to the file system) and not by
other users. Win2K Professional “Power Users” may install
applications for use by others (this eliminates the need
for an administrator to do so, or for us to give users
administrative privileges on a machine just for this purpose.)
A Power User’s default settings are backward-compatible
with NT 4.0 user settings. Power Users can install any
application that doesn’t install system services.
Super-Hidden Files
Some files will be marked with System and Hidden attributes
and won’t be visible in Windows Explorer even if the option
“Show Hidden Files” is checked. These files can, of course,
be used, and an attribute on the folder can be checked
to make them visible—but it must be checked on every folder
that might have hidden files in it. This feature should
be useful in keeping users away from certain system files.
And Now, for Our Next Act...
Win2K ships with a variety of security services. Although
I’ve outlined some suggestions, you’ll still need to make
choices about which ones to implement in your enterprise.
I’m afraid you’ll still have to work hard to establish
security in your Win2K enterprise. Remember, if you don’t
know what you need to secure, or how tightly, all these
new gee-gaws don’t mean much. Yes, Virginia, you still
need to design a security structure, then put Win2K security
services to work for you. The beauty is this: It’s now
the design that’s difficult, not the implementation, maintenance,
or control.