Easily implement Windows 2000 security policies

Source: Internet
Author: User
Tags account security

We will introduce some common setting methods to set security policies for Windows 2000 to ensure security.

I. Security Policy

Windows 2000 has many security vulnerabilities, which are well known. Most vulnerabilities can be reduced through patching, but some small vulnerabilities cannot be eliminated. These small vulnerabilities are also an important way to cause attacks or intrusion. The Local Security Policy inherent in Windows 2000 is a good system security management tool. This tool can be said to be a system defense tool. It can be prevented by some necessary settings. The following describes some common setting methods to set security policies for the system to ensure security.

II. Specific operations

Figure 1
Click Start> Control Panel> Administrative Tools> Local Security Policy to go to the main interface of Local Security Policy. You can set various security policies by using commands on the menu bar, and select the view mode, export the list, and import policies.

1. security log settings: because security logs are an important means to record a system, you can view the running status of the system through Logs. The default installation of Windows 2000 does not enable any security review, therefore, you need to open the corresponding audit in the Local Security Policy → audit policy. Click Start> Control Panel> Administrative Tools> Local Security Policy> local policy on the left> Audit Policy. The "Audit Policy Change" appears on the right "...... For nine projects, double-click each project and select the project in the "success or failure" dialog box.

2. account Security Settings: The default installation in Windows 2000 allows any user to obtain all the accounts and share lists of the system through empty users, resulting in password leakage and computer attacks, therefore, you must use the following security settings. Click Start> Control Panel> Administrative Tools> Local Security Policy> Local Policy> account policy. Two projects, password policy and account lock policy, are displayed on the right bar.

Set in password policy: Enable "Password Must Meet Complexity Requirements", "Minimum Password Length" is 6 characters, "force password history" is 5 times, the maximum password retention period is 30 days.

In the account lock policy, set "Reset Account lock counter" to 30 minutes later, "account lock time" to 30 minutes, and "account lock value" to 30 minutes.

3. Set security options: Click Start> Control Panel> Administrative Tools> Local Security Policy> Local Policy> security options, and find "additional restrictions on anonymous connections" in the right column ". Double-click the valid policy and select "do not allow enumeration of SAM accounts and sharing "(). This value only allows non-null users to access Sam account information and shared information.

Figure 2
After this setup, your system is much more secure, especially the Account Security and password security, effectively preventing some illegal intrusion. You can view logs to monitor important information about the system's operation. You have a clear understanding of account logon.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.