Windows http://www.aliyun.com/zixun/aggregation/19058.html ">2003 is more and more favored by users for its stable performance, but in the face of the emerging virus, You still need to tighten Windows 2003 security.
1. User Password Settings
set a key password to a large extent to avoid password attacks. Password set character length should be more than 8, preferably letters, numbers, special characters of the combination, such as "psp53, @pq", "skdfksadf10@" and so on, can effectively prevent violent cracking. It's best not to use your own birthday, cell phone number, phone number, etc. to make a password.
2. Delete Default Share
Click start → run, enter "Gpedit.msc", and then return to open the Group Policy Editor. Expand User Configuration →windows settings → scripts (logon/Logoff), double-click the login entry, and then add "Delshare.bat" (parameters do not need to be added) to remove the Windows 2003 default share.
Next Disable the IPC connection: Open Registry Editor, expand in sequence [Hkey_
Local_machine\system\currentcontrolset\control\lsa] Branch, locate the "RestrictAnonymous" subkey in the right window and change its value to "1".
3. Turn off AutoPlay
The
autoplay function not only works on the optical drive, but also on other drives, so it is easy for hackers to use to execute hacker programs.
Open the Group Policy Editor, expand Computer configuration → admin template → system in turn, in the right window, locate the Turn off AutoPlay option and double-click, select Enabled in the Open dialog box, and select all drives in the Drop-down menu after turn off AutoPlay, and press OK to take effect.
4. Empty the remote accessible registry path
sets the remote accessible registry path to NULL, which effectively prevents hackers from using the scanner to read computer system information and other information through the remote registry.
Open the Group Policy Editor, expand Computer Configuration →windows settings → security settings → security options, and in the right window, locate the network access: Remotely accessible registry path, and then delete the remotely accessible registry path and subpath contents in the open window as shown. Four strokes to enhance Windows 2003 security