Managing Auditing and Creating Resource Access Permissions

In the computer security world, there are basically two sides to security and both are equally important. They are setting up resource access permissions and then setting up mechanisms to log the use or misuse of the resources you are trying to protect. Although you think it is enough to apply very restrictive access permissions on important files, directories, printers, or other objects that Windows 2000 allows, without proper auditing techniques you will never be sure that your configuration is working as you expect.

As a matter of fact, one of the first things you should do after you have designed and implemented access controls on important objects is to test them by turning on auditing ...

Get Microsoft® Windows® 2000 Security Handbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.