|
T9
Windows NT Security for UNIX Administrators New Rik Farrow, Consultant Who should attend: System and network administrators and programmers, who must work with NT systems and need to understand its security principles. People accustomed to working with UNIX systems will benefit from the comparisons between UNIX and NT. Windows NT is the result of an unusual marriage between two disparate operating systems: a completely reworked replacement for Digital Equipment's VMS and Microsoft's Windows 3.1. On the one hand, there are security features to satisfy the most avid control freak: centralized control over user accounts, file sharing, desktop appearance, fine grained object access, encryption, a security monitor, and auditing sensitive enough to capture most security related events. On the other hand, NT supports an API that has been the main target of virus writers, and for application programmers who have never even considered the notion of security. Windows NT possesses the features which, correctly configured, can make it reasonably secure. But the complex security model is likely to be the cause of security problems as only experts are likely to be able to apply it correctly. This tutorial explains the security mechanisms in Windows NT, and how they can best be used to improve the security of networked NT systems. It is not just a review of NT's security related GUI's, although they are included. We will go behind the scenes and discover the file and directory hierarchy of the trusted computing block, Web server (IIS), registery and event logs, and system files and libraries. Wherever possible we will explore the command line interfaces and tools for controlling and auditing security of NT systems. Topics will include:
Rik Farrow provides UNIX and Internet security consulting and training. He has been working with UNIX system security since 1984, and with TCP/IP networks since 1988. Rik has taught at the IRS, Department of Justice, NSA, US West, Canadian RCMP, Swedish Navy, and for many US and European user groups. He is the author of UNIX System Security and System Administrator's Guide to System V. Farrow writes two columns for ;login:, and a network security column for Network magazine. |
| ||
|
Conference Index Events Calendar USENIX home |