This article describes how to apply the registry "Access Control Lists" (ACLs) and file system ACLs on computers that are upgraded from Windows NT 4.0 to Windows Server 2003.
When upgrading a Windows NT 4.0-based computer to Windows Server 2003, the "Windows Installer" does not change the registry and file system ACLs. Windows Server 2003 allows for a higher level of security, and it handles registry and file system permissions differently than Windows NT 4.0. Microsoft recommends that you apply Windows 2003 ACLs to computers that are upgraded from Windows NT 4.0.
To apply the registry and file system ACLs, you can use the "Security Configuration and Analysis" snap-in. Please note that you must be a member of the “Administrators” group to perform this procedure.
How to apply the default system security settings on a computer that is upgraded from Windows NT 4.0 to Windows Server 2003 as a member of the "Administrator" or "Administrators" group.
Click Start, click Run, type mmc in the Open box, and then click OK.
On the File menu, click “Add/Remove Snap-in.
Click Add, <;Security Configuration & Analysis", Add, click Close, then click OK.
In the console tree, right-click “Security Configuration and Analysis" and click Open Database.
Specify the name of the database (for example, upgdbase) and location, then click Open.
In the Import Templates dialog that appears on the screen, click Set Security.inf, and then click Open.
Right-click on “Security Configuration and Analysis" and click Analyze Computer Now.
In the Execution Analysis dialog box that appears on the screen, accept the default log file path shown in the "Error log file path" box, or specify the desired location and click OK.
Compare this template security settings to your existing computer settings.
Note: At this point, no changes will be made to the computer. The results of this process indicate how the security settings in the template differ from the actual system settings.
When you complete the analysis, expand the various components in the console tree, such as account policies, local policies, event logs, restricted groups, and system services.
For each component you expanded in step 10, view its security properties in the right pane of the policy column, and note the following:
with green The item marked with a check indicates that the current computer settings are the same as the security settings in the database.
Items with red <x” indicate that the current computer settings are different from the security settings in the database.
If the green checkmark or red <x” is not displayed, this security attribute is not defined in the template and is not analyzed.
If you want to add or modify database settings, right-click the security attribute you want to add or modify, and then click Properties. Click the "Define this policy in the database" checkbox, select it (if it is not already selected), make the required changes to the policy settings, and click OK.
Note: The Database Settings column shows the security settings contained in the template, and the Computer Settings column shows the current settings for your computer.
To configure your computer to use the security settings in your database, right-click “Security Configuration and Analysis", and then click Configure Computer Now.
In the Configure System dialog box that appears on the screen, accept the default path and log file name, or type the path and file name you want and click OK.
The secure database configuration is applied to the computer.
Note: If there is a conflict between the database project and an existing security configuration on the computer, the existing project will be overwritten unless you eliminate the difference between the two before configuring the computer.
Windows2000 is a new generation operating system of Microsoft Corporation. It is developed on the ba
Windows Server 2003 introduces a new feature that allows domain controllers to be renamed, allowing
In the process of viewing the picture, if you put the mouse over the picture, you can generate a lar
In the previous article we introduced the file comparison tool command, followed by the last introdu
Windows 2000 backup and recovery Active Directory
Network Security for Configuring SNMP Services in Win 2003
How to connect to and hide the console using Windows Server 2003 Terminal Services
Easily deploy Windows 2003 DHCP service
Windows2000 software conflicts one example
How to configure and share print under Win 2003
Configuring DNS for Internet Access in Win 2003
Windows Server 2008 Virtualization Feature Resolution
Cross-Windows Server 2008 Remote Management Barrier
Step by step teach you to install IIS components under Win2003
US media advise users not to install Win10
The latest notebook dedicated xp system user account display blank how to do
Win8.1 screen brightness automatically adjust how to close
Win10 system Edge browser and Thunder associated method
How to install input method in Win10?
Windows users get rid of hacker attacks (1)
What are the differences between win10 consumer preview and technology preview?
Super partition table reconstruction tool
How to delete the Internet browsing history and cookie
How to get the error report of the Win7 system after the blue screen of the computer DMP file