August 2000
Intermediate to advanced
800 pages
21h 5m
English
In the computer security world, there are basically two sides to security and both are equally important. They are setting up resource access permissions and then setting up mechanisms to log the use or misuse of the resources you are trying to protect. Although you think it is enough to apply very restrictive access permissions on important files, directories, printers, or other objects that Windows 2000 allows, without proper auditing techniques you will never be sure that your configuration is working as you expect.
As a matter of fact, one of the first things you should do after you have designed and implemented access controls on important objects is to test them by turning on auditing ...