For more information on our services:

Receive EMAIL
in the category of your choice

  
  Networking
  Web Promotions
  Custom Servers
  Connectivity
  Technology
  Security
  Software
  Hosting

         Email Address
   

Receive the IBT Newsletter

Email address


Dell Small Business

 

 

 

Introduction

This document provides a comprehensive overview of Windows NT security considerations. As the number of companies and organizations using Windows NT continues to grow, more issues concerning security considerations have developed. The personnel at Innovative Business Technology (IBT) have nearly a century of combined computer security experience. These are some of the issues we consider when assessing the security requirements of a client's network.

Intended Usage

One of the first issues to be considered in setting up a Windows NT security system is to define the general purpose of the network. A good way to accomplish this is by answering the universal questions of who, what, where, when and how. First, decide who is going to have access to the network. A point to consider here is whether the network will be available only to internal personnel or whether it will have external users as well.

The next issue to consider should encompass what services the network users will be able to access. For example, will they be able to access the file servers, the print servers, the FAX servers, the RAS (remote access servers), the mail servers, the news servers, the Web servers, and/or have FTP (file transfer protocol) access?

Guidelines should then be established concerning where the users will be able to gain access to the network. For instance, can they utilize the network services only from their offices, or can they also access them from their homes or from the road when they are traveling?

Next, decide when the services will be available. For example, will they be available 24 hours per day or only during normal business hours? Finally, decide how these services will be provided to the users. Are you going to have your own mail, web, and news servers, or will your ISP (Internet service provider) provide these services for you?

Physical Security

At this point, the physical security of the network hardware and the servers should be the next consideration. This involves the location of the network hardware, especially the placement of the servers. The physical security of a network should involve not only a safe environment to keep the hardware at a minimal risk, but it should also involve choosing an area or location that provides limited access to the network servers. (A public foyer or lobby would not be a wise choice.) The ideal environment should have an adequate power source with an Uninterruptible Power System. It should also include a adequate cooling system, along with phone and network lines for connectivity.

Operating System Software

After establishing a satisfactory physical environment for the network hardware, decisions concerning the security procedures for the network's operating system should be made. First of all, the operating system should be installed correctly and updated frequently as Service Paks and Hotfixes become available. A system administrator needs to be assigned. At least one alternate administrator also needs to be designated. An anti-virus program needs to be installed and updated frequently.

Applications

When plans for the operating system have been finalized, the workstation applications need to be installed. These applications should reflect the needs of the users. One of the first priorities should be to ascertain that the installed applications do not adversely affect Windows NT security. The administrator needs to make sure that all the installed applications function properly with the other applications installed on the machines. The workstation configurations should be standardized to make administration as trouble free as possible. Again, an anti-virus program needs to be installed and updated frequently.

Data

After plans for the applications and configurations for the workstations have been completed the next step should be to define how and where the users should store their data. Storage on the server usually provides better security since only those who have access privileges to the server can access the stored data. Sensitive data stored on local machines should never be shared because it can allow unauthorized access.

Backup and Recovery

The next step should be the establishment of backup and recovery procedures. Backups need to be performed on a regular basis. They need to include the operating system, all programs and data files, and the system registry information. They should be verified each time they are completed. Backups should be stored offsite. Backup Operator(s) utilizing multiple media sets should be responsible for performing the backups. They need to be responsible for transporting the backup media to an offsite storage location and for testing the backup and recovery procedures.

Auditing

The final step concerns auditing practices. Windows NT can record access to the system by users, access to files, and changes made to the software and to the registry. By reviewing the security logs provided by the system, the administrator can see how the various resources are being assessed. Only information that is required and useful to the site should be logged. Logging all possible information can substantially impact the system's performance.

Summary

We have provided a comprehensive overview concerning Windows NT security. A detailed security plan needs to be incorporated at each site based on the above information. A thorough plan for establishing a secure network can help solve and prevent potential problems. The personnel at IBT can assist you with a customized plan to meet your security needs.

Innovative Business Technology (IBT) offers a broad range of expertise encompassing the full spectrum of integrated computer and network services including; Alpha, LINUX, Open VMS, UNIX, Windows, and Y2K solutions. With nearly a century of combined experienced and expertise among us, we believe that each customer is unique and therefore deserves a solution that addresses their specific requirements. We have built our reputation on listening to our customers to develop a thorough understanding of their needs and offering the best in customized design solutions when a "shrink wrap" package is not appropriate. We would like to earn your business by solving or preventing your problems whether they involve Windows NT security or some other aspect of your computer and networking needs. Let the specialists at IBT become your technology partners and help you develop innovative solutions and preventions for your business problems.