Primary Security
1. Physical Security
The server should be placed in an isolated room with a monitor installed, and the monitor should be kept for more than 15 days. Camera recording. In addition, the chassis, keyboard, and computer desk drawers should be locked to ensure that no one can use the computer even if they enter the room, and the keys should be placed in another safe place.
2. Stop the Guest account
Disable the guest account in the computer management user, and do not allow the guest account to log in to the system at any time. To be on the safe side, it's a good idea to add a complex password to the guest. You can open Notepad, enter a string of long strings containing special characters, numbers, and letters, and copy it as the password for the guest account.
3. Limit the number of unnecessary users
Remove all duplicate user accounts, test accounts, shared accounts, general department accounts, and more. User Group Policy sets the appropriate permissions, and often checks the system's account to delete accounts that are no longer in use. These accounts are often the breakthrough point for hackers to invade the system. The more accounts there are, the more likely it is that hackers will gain access to legitimate users. Domestic nt/2000 hosts, if there are more than 10 system accounts, generally can find one or two weak password accounts. I have found that 180 of the 197 accounts of a host are weak password accounts.
4. Create 2 administrator accounts
Although this seems to be somewhat contradictory to the above, it is in fact subject to the above rules. Create a general privilege account to receive and handle some everyday things, and another account with Administrators privileges is only used when needed. Administrators can use the “ RunAS” command to perform some work that requires privileges to facilitate management.
5. Rename the system administrator account
Everyone knows that the Windows 2000 administrator account cannot be deactivated, which means that others can try the password of this account again and again. Renaming the Administrator account can effectively prevent this. Of course, please don't use the name of Admin, it is equal to no change, try to disguise it as a normal user, for example, change to: guestone.
6. Create a trap account
What is a trap account? Look!>Create a local account called ” Administrator", set its permissions to the lowest, and do nothing, and add A super complex password of more than 10 digits. This will keep those Scripts s busy for a while, and you can use them to discover their intrusion attempts. Or do something on top of its login scripts. Oh, it's enough!
7. Change the permissions of shared files from ”everyone” group to "authorized users"
“everyone” In win2000 means that any user who has access to your network can access these shared materials. Do not set the user who shares the file to the ”everyone” group at any time. Including print sharing, the default attribute is ”everyone” group, don't forget to change it.
8. Using a secure password
A good password is very important for a network, but it is the easiest to ignore. What I said earlier may already explain this. Some company administrators often use the company name, computer name, or something else to guess the user name when creating the account, and then set the password of these accounts to N, such as “welcome” “ Iloveyou” “letmein” or the same as the username. Such an account should require the user to change to a complex password when logging in first, and also to change the password frequently. When IRC and people discussed this issue a few days ago, we gave a definition of a good password: a password that cannot be cracked during the security period is a good password. That is, if someone gets your password document, you must spend It takes 43 days or more to crack it, and your password policy is 42 days to change the password.
9. Setting a Screen Saver Password
It's also very simple and necessary. Setting a screen saver password is also a barrier against internal damage to the server. Be careful not to use OpenGL and some complicated screen savers, waste system resources and let him black screen. Another point is that it is best to add a screen saver password to the machines used by all system users.
10. Use NTFS format partition
Change all partitions of the server to NTFS format. The NTFS file system is much more secure than the FAT, FAT32 file system. Needless to say this, I think everyone has to be NTFS.
11. Running anti-virus software
The Win2000/Nt server I have seen has never seen anti-virus software installed. In fact, this is very important. Some good anti-virus software can not only kill some famous viruses, but also kill a lot of Trojans and backdoors. In this case, the famous Trojans used by hackers are useless. Don't forget to upgrade the virus database frequently
12. Secure backup disk
Once the system data is corrupted, the backup disk will be your only way to recover data. After backing up the data, keep the backup disk in a safe place. Don't back up your data on the same server. In that case, don't back up.
Intermediate Security:
1. Use win2000's security configuration tool to configure policies
Microsoft provides a set of MMC (Management Console) security configuration and analysis tools, you can easily configure your server to meet your requirements. . Please refer to the Microsoft homepage for details:
2. Turning off unnecessary services
Windows 2000's Terminal Services, IIS, and RAS can all pose security holes in your system. In order to be able to manage the server remotely, many of the terminal services of the machine are open. If you open it, make sure that you have configured the terminal service correctly. Some malicious programs can also run quietly as a service. Pay attention to all the services that are open on the server and check them in the medium term (every day). The following is the default service for C2 level installation:
Computer Browser service TCP/IP NetBIOS Helper
Microsoft DNS server Spooler
NTLM SSP Server
RPC Locator WINS
RPC service Workstation
Netlogon Event log
3. Turning off unnecessary ports
Turning off ports means reducing functionality, and you need to make a few decisions about security and functionality. If the server is installed behind a firewall, there will be less risk, but never think that you can sit back and relax. Use a port scanner to scan the ports open to the system and determine which services are open as the first step in hacking your system. The \\system32\\drivers\\etc\\services file contains a list of well-known ports and services for reference. The specific method is:
Network Neighborhood> Attributes> Local Connections> Attributes>Internet Protocol (tcp/ip)> Attributes>Advanced>Options>tcp/ip Filter> Attribute Open Tcp /ip screening, add the required tcp, udp, the agreement can be.
Previous12 Next Read more
Windows 2000 stores its configuration information in a database called the registry that contains co
computer has been used for a long time, the disk saves a large number of files, these files are not
This article introduces the whole process of the win2000 operating system installation, the content
Microsoft Windows 2000 Server system download address:Please copy the download address with Thunder
Windows 2000 NTFS disk permissions application
FSO solution in Win2000 server
Let Win 2000 operating system automatically install
Reinstall TCP/IP protocol under WinXP/2000/2003
Getting the best performance for Win2000
The normal use of TenPay certificate and control graphic tutorial in winxp/2000 system environment
Win2000 improves anti-DDOS attack ability by modifying the registry
WIN2000/XP System Service Optimization
Windows 2000/XP/2003 IIS+PHP+MySQL+Zend Optimize Installation Instructions
Win2000 DLL file error or missing solution
Windows 2000 how to install? Win2000 operating system installation full diagram
How to create, delete or format hard disk partition
Download: System Garbage Cleaner CCleaner 3.17
Win7 system C disk is full how to clean up?
How to optimize memory in win7
Exynos 4412 startup process analysis
How to win the system after the win7 system adds an icon in the taskbar
Windows10 system can not be installed office2010 how to solve
How to enable "Classic Event Viewer" in Win10?
Win7 establishes WiFi to achieve Internet sharing
The old machine running win7 does not force the use of U disk for Win7 speed method