MONDAY
M5
Windows NT Security
Who should attend: System and network administrators and programmers who work with NT systems and need to understand its security principles. Those accustomed to working with UNIX systems will benefit from the comparisons between UNIX and NT. Windows NT is the result of an unusual marriage between disparate operating systems: a completely reworked replacement for DECs VMS and Windows 3.1. On the one hand, there are security features to satisfy the most avid control freak: centralized control over user accounts, file sharing, desktop appearance, fine grained object access, encryption, a security monitor, and auditing sensitive enough to capture most security related events. On the other hand, most programmers writing for NT have no concept of writing secure software for multiuser systems. After taking this tutorial participants will understand the complex security model of Windows NT which, when correctly configured, can make it reasonably secure. This tutorial explains the security mechanisms in Windows NT, and how it can best be used to improve the security of networked NT systems. We will not only review NT's security related GUI's, we will go behind the scenes and discover the file and directory hierarchy of the trusted computing block, Web server (IIS), registery and event logs, and system files and libraries. Wherever possible we will explore the command line interfaces and tools for controlling and auditing security of NT systems. In this course you will learn about:
Rik Farrow (M5, T5) provides UNIX and Internet security consulting and training. He has been working with UNIX system security since 1984, and with TCP/IP networks since 1988. He has taught at the IRS, Department of Justice, NSA, US West, Canadian RCMP, Swedish Navy, and for many US and European user groups. He is the author of UNIX System Securityand System Administrator's Guide to System V. Farrow writes columns for ;login: and Network Magazine. |
| ||
|
Conference Index Events Calendar USENIX home |