Sorry! The requested paper could not be found.
Windows 2000 Issues
Featuring 45 Papers as of October 31, 2003
Limiting Concurrent Logins in Windows NT/2000
Gene Burton - October 31, 2003
This document intends to research, evaluate and recommend solutions for overcoming the inability of Windows NT/2000 Server environments to limit concurrent user logins.
Using and Evaluating Windows Software Update Service
John Ives - October 31, 2003
This paper describes the installation and use of Microsoft's Software Update Service (SUS) for the deployment of Operating System patches.
Using Security Templates and Group Policy to Secure Windows Servers
Chet Duncan - October 31, 2003
This document describes how you can secure a Windows 2000 server using group policies.
Secure Remote Server Administration of the Windows Server Family Using Windows Terminal Services
Bill Evrigenis - October 31, 2003
In this paper, I propose a method for installing and configuring Windows Terminal Services in a secure environment, methods for developing an analyst's work environment, and an essential set of tools.
Management of Security Updates in the Windows 2000 Environment
Jim Cebula - October 31, 2003
This paper addresses: mitigating some risks by initially deploying a secure base configuration; newly discovered vulnerabilities; getting security updates; testing security updates in a non-production environment; scanning production systems for patch installation status; deploying security updates and management policy.
Using Terminal Services to Remotely Administer Windows2000 Servers Securely
David Myhre - October 31, 2003
This paper will focus primarily on the security issues of using Terminal Services to remotely administer Windows 2000 Servers.
Implementing Password Controls and Account Policies Using Windows 2000 Group Policy
Carlo Scannella - October 31, 2003
This paper will provide the reader with a high-level understanding of Group Policy, discuss some issues to consider when implementing Group Policy, and describe how strong password controls and secure account policies, as documented in the SANS Windows NT Security Step by Step, can be implemented in Windows 2000.
Securing IIS on Windows 2000
Carl Denowh - October 31, 2003
This paper describes the methods used to secure Internet Information Server (IIS) on systems running Windows 2000.
Securing Windows 2000
Scott Hoppe - October 31, 2003
This document will explain how to manage hotfixes on a Windows 2000 server running IIS 5 on the Internet. There will be five sections to this document: Importance, Assumptions, Hotfix practices, Tools, Installing Hotfixes, and Resources.
Case Study:Use Caution When Deploying Microsoft's Software Update
James McVicar - October 31, 2003
The purpose of this case study is to document the process used to evaluate the security risks associated with SUS before implementing it on a real world network.
Basic Steps to Hardening a Standalone Windows 2000 Installation
Todd Anderson - October 31, 2003
An overview of the tools and steps helpful in securing computers under Windows 2000.
A Step-by-Step Guide to Securing Windows 2000 for Use as an Internet Server
David Courington - October 31, 2003
This paper will describe how to configure and implement Windows 2000 Server and IIS 5.0 with a reasonable amount of security.
Overview of the Windows 2000 Security Tools
Jeff Christman - October 31, 2003
This paper will describe the location and use of the tools that are built into Windows 2000 operating system. With these tools, the administrators have a greater degree of control and can provide a secure internet- aware enterprise without purchasing third party tools.
PKI: Protection of Stand Alone Certificates
William Pachucki - October 31, 2003
An overview of the Windows 2000 Stand-alone Offline Root Certificate Authority Protection Guide
Auditing the Windows 2000 Authentication Process
Julio Silveira - October 31, 2003
This paper will describe the Windows 2000 authentication process, and how to collect and use the security events created in the authentication process in order to audit your system.
Windows 2000 Known Vulnerabilities and Their Fixes
Tay Lai - October 31, 2003
This paper provides the latest update (as of March 2000) on the vulnerabilities associated with Windows 2000 and the solutions available
Planning a Secure Migration Project: Best Practices for Migrating from Windows NT to Windows 2000
Ben Eason - October 31, 2003
This paper discusses the steps involved in migrating from Windows NT to Windows 2000.
Windows 2000 Security Standards
Hilel January - October 31, 2003
This document attempts to touch on a few of standards that can assist in ensuring that Availability, Integrity, Access control, Confidentiality, and Compliance (Auditability) objectives are met when using a Windows 2000 operating system.
Securing Windows 2000 Server
Cory Bys - October 31, 2003
This document intends to outline the steps required to harden a default Windows 2000 Server installation.
Secure Windows Initiative Trial by Fire: IIS 5.0 Printer ISAPI Buffer Overflow
Corey Pincock - October 31, 2003
This paper discusses how Microsoft's Secure Windows Initiative protects a Windows 2000 server.
Basic Security Issues of Active Directory
Johnny Waddell - October 31, 2003
This paper examines Active Directory, a flexible and scalable management platform for distributive network resources and applications.
Windows 2000 and Network Security
Travis Abrams - October 31, 2003
This paper will focus on basic network security procedures and the new features of Windows 2000.
Encrypting File System Primer: Basics and Best Practices
Kayron Valentine - October 31, 2003
This paper takes a look at EFS, what it is, how it works, and more importantly, what you need to know to make it work effectively for you.
Role-Based Administration for Windows 2000
Jane Murley - October 31, 2003
This paper looks at simplifying the management of security for Windows 2000 by discussing role-based administration in Windows 2000 and a product that provides role-based administration capabilities for Windows 2000.
Kerberos Authentication in Windows 2000
Vishwas Gadgil - October 31, 2003
This paper attempts to explain the Kerberos based authentication in Windows 2000 and also tries to explain the new and sometimes confusing terminology in a layman's words.
A Discussion of Best Practices for Microsoft's Encrypted File System
Chuck Fasching - October 31, 2003
This paper discusses using Microsoft's Encrypted File System to mitigate the risk associated with mobile and network computing. Specifically, it addresses file system security in relation to encryption and EFS and discusses many of the best practices, as recommended by Microsoft and other sources
Windows 2000 Kerberos Interoperability
Christopher Nebergall - October 31, 2003
While other papers discuss Kerberos in general or the Windows 2000 implementation, this work explores compatibility issues between traditional Unix implementations and Microsoft's implementation.
Kerberos: Secure Authentication
Jose Marquez - October 31, 2003
This paper examines the processes, functions, and interoperability issues of Kerberos secure authentication.
A Breakdown of the Top Five Windows 2000 IIS Threats in 2001
Simon Plant - October 31, 2003
The author presents a detailed examination of the top five Windows IIS threats (2001): Remote Command Execution Via Internet Printing Service, Microsoft IIS CGI Filename Decode Error Vulnerability, Remote command execution via Buffer Overflow in Indexing Service, Unauthorised SMTP relaying, Buffer Overflow in FrontPage server extension.
Security Considerations for Dynamic DNS Implementation in a Windows2000 Environment
Deborah Wade - October 31, 2003
This paper describes how, when DNS is fully integrated into Active Directory, you can then utilize three important security benefits in a Windows2000 network: Secure dynamic updates, Secure zone transfers, and Access Control Lists for zones and resource records.
Security Holes in ISAPI Extensions
Chew HwaiGeeng - October 31, 2003
In this paper the author will mainly discuss the ISAPI extensions and the security holes that are associated with them.
Installing Microsoft's Internet Security and Acceleration Server (ISAS): Getting Started and
Jack Green - October 31, 2003
This paper presented a procedure for establishing a test environment in which to prove ISA firewall rules. For a minimal investment, a student/professional can develop policies in vitro before deploying to the production environment. The sample rules are not presented as exhaustive.
The Encrypting File System: How Secure is It?
Howard Wright - October 31, 2003
This paper examines Microsoft's Encrypting File System (EFS) which does provide an additional layer of security, and discusses just how difficult it is to attack.
Hisecweb.inf - An Analysis
Colleen Abbe - October 31, 2003
This paper examines the hisecweb.inf security policy as part of the overall security hardening of Windows 2000 and IIS 5.0.
How To Defend Against L0phtcrack v3 With Windows 2000 Group Policy Objects
Stephen Pullum - October 31, 2003
This paper is a how-to guide for defending against a exploit and vulnerability based on an environment in which a Windows 2000 domain running in native mode. The vulnerability is weak passwords and its exploiter is none other than L0phtcrack v3 by @Stake.
Enforcing the "Least Privilege" Principle through Active Directory, OUs, GPOs, and Group Policy Filtering
Ricardo Rodriguez - October 31, 2003
This document presents an approach to further enforce the "Least Privilege" principle by combining Active Directory, GPOs, and Group Policy filtering techniques
PWL Files: The Achilles' Heel of Windows 9X Client Networks
Scott Winters - October 31, 2003
This paper discusses a major security concern on Windows 9X stations: the PWL file.
Implementing a Windows 2000 Host Based Intrusion Detection System
Richard Springs - October 31, 2003
This practical is a "how to" document that provides a brief overview of Intrusion Detection Systems (IDS), explains design considerations, and describes installation steps for the Windows 2000 Host Based Intrusion Detection System.
Addressing Network Security through Windows 2000 Active Directory: Designing a Single Domain Structure
Les McCarter - October 31, 2003
This paper provides security design considerations for locating users, computers and groups in the Windows 2000 network environment.
What Does It Take to Harden an IIS Web Server?
Boris Napernikov - October 31, 2003
The purpose of this document is to shed some light on how to make it harder for an intruder to compromise the system. We'll be going through securing a Windows 2000 server running IIS 5.0 and some of the tools that we can use to scan system(s) before putting it into production.
Building a Secure Windows 2000 Professional Network Installation
Bruce Fyfe - October 31, 2003
This paper puts forth a best practices approach to securing a Windows(R) 2000 networked workstation.
Too Many Operating Systems, Not Enough Laptops
Martin Reymer - October 31, 2003
This paper will provide an administrative person with the steps and wherewithal to survey their resources, research processes and procedures mainly from the Internet, and acquire the necessary hardware and software to fully configure a dual-boot laptop for use with the Windows 2000 and the Linux operating systems.
Remote Scanning Utilities for Microsoft Hot Fixes and Service Packs
Larry Nicholl - October 31, 2003
The purpose of this paper is to show how security administration can benefit by the use of six utilities for remote scanning for Microsoft hot fixes and service packs on multiple Windows systems (NT, 2000, XP, IIS 4 and 5, SQL Server 7.0 and 2000, Exchange 5.5 and 2000, Windows Terminal Server, and Windows XP Home Edition).
Securing an IIS 5.0 Web Server on Windows 2000 using Security Tools and Templates
Graeme McLintock - October 31, 2003
This paper attempts to give an overview of the security guides, tools and templates available from Microsoft, and to describe the basic steps involved in applying the tools and templates. The commonalities and differences between the security templates available are highlighted, and how several of these tools and templates can be used together to benefit from the settings made by each one is described.
Security Measures for Windows 2000 Terminal Server in an Unrestricted
Douglas McCrea - October 31, 2003
This case study demonstrates the security practices and procedures followed as well as resources used to install Windows 2000 Terminal Server (Application Mode) and corresponding thin clients in a mostly unrestricted university environment.
Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact email@example.com.
All papers are copyrighted. No re-posting or distribution of papers is permitted.