That can also work well using a different approach to the same strategy,
particularly on non system folders. I don't like fiddling with permissions
in the \winnt folder without a lot of testing and generally do not recommend
it. However I have not had problems with adding "authenticated users" to
system folder and then removing users and everyone [which NSA security guide
also recommends]. The IIS lockdown tool is interesting in that it will
create a new group and give that group deny permissions to many binaries in
the system folder and other folders on the computer. You can then add a user
to that folder to make sure they do not have access to those binaries [ping,
arp, attrib, etc]. The biggest problems usually arise with deny permissions
in that unintended users, such as administrators, also end up being
affected. Many also seem to forget that not having permissions is an
implicit deny. It is a good idea to take an image of a computer before doing
major changes to permissions. It takes me about 5 minutes to restore a 5 gig
partition from a Ghost image so that I can start over. If you want a good
book on configuring Windows security the Microsoft Windows Security Resource
Kit is a good read and you can buy one from one of the used book vendors on
Amazon for less than ten dollars. I buy a lot of books that way. Many are
books with a bent corner or such that can not be sold as new. For a non
Microsoft perspective the Hacking Exposed Windows 2003 is worth a read. ---
Steve
Les Desser said:
Steven L Umbach said:
If you wish to restrict a user add that user to a group and then use
ntfs/registry permissions, user rights, and Group Policy
..[Snipped for later reading]
I have taken a different route - maybe causing some damage on the way.
(This is a holiday flat PC so I am not too concerned - more interested in
learning about security issues)
I have removed Users from all security permissions for all drives/folders
and have created my own group to allow a fine level of control.
Securing Program Files and WINNT[1] took a bit of fiddling to allow users
to run applications.
My Visitor can now play mp3 files in a subfolder of drive to which they
are otherwise barred, and they are barred to all other drives but can
still browse the web and open applications. Other users seem to have
normal access.
[1] WINNT had separate security for each sub-folder - no inheritance. I
have changed that to inherit the settings from WINNT - we will see what
happens in the longer term.