Standard Security Practices for Windows NT

ID: Q166992


The information in this article applies to:
  • Microsoft Windows NT operating system version 3.1
  • Microsoft Windows NT Advanced Server
  • Microsoft Windows NT Workstation versions 3.5, 3.51, 4.0
  • Microsoft Windows NT Server versions 3.5, 3.51, 4.0
  • Microsoft Windows 2000 Professional
  • Microsoft Windows 2000 Server
  • Microsoft Windows 2000 Advanced Server


SUMMARY

Any security breach that requires access to administrative privileges needs to be dealt with using the appropriate security policy. This applies to all commercial operating systems, including Windows NT and UNIX.


MORE INFORMATION

Security is achieved through a combination of technology and policy. In order to maintain a highly secure environment, standard security practices should be followed, including:

  • Only trusted individuals should be granted Administrator privileges on the system.


  • The Administrator account should not be intended for casual use.


  • The Administrator account should only be used to administer the network or domain.


  • The Domain controllers should be physically secured.


  • Maintain a strong password policy. See http://www.microsoft.com/security/default.asp.


  • Rename the Administrator account.


  • Never run untrusted programs while logged in as Administrator.


For more information on other security topics, see the Microsoft Security Advisor site at: http://www.microsoft.com/security/.

Additional query words: hack ee times response

Keywords : ntdomain ntsecurity NTSrvWkst
Version : :; WINDOWS:2000; winnt:3.5,3.51,4.0
Platform : WINDOWS winnt
Issue type : kbinfo


Last Reviewed: January 25, 2000
© 2000 Microsoft Corporation. All rights reserved. Terms of Use.