Reviewing and Setting Rights

[Previous] [Next]

Another item in the Administrative Tools folder, Local Security Policy, lets you specify password and lockout policies for all users on a computer and assign rights to users and groups. You must be logged on as a member of the Administrators group to use Local Security Policy.

To get to Local Security Policy, open the Start menu and choose Settings, Control Panel, Administrative Tools, Local Security Policy. This opens a Microsoft Management Console window with Security Settings at its root, as shown in Figure 27-5.

click to view at full size.

Figure 27-5. Choosing Local Security Policy opens the Security Settings tool in Microsoft Management Console.

Setting Password and Lockout Policies

Under Account Policies, you can set a variety of parameters that control password and lockout behavior for all local accounts. As shown in Figure 27-6, the right pane lists each of the policies for the item selected in the left pane. The second column in the right pane shows the local setting for each policy, which you can set by double-clicking a policy name. The third column, titled Effective Setting, shows the actual policy setting in force. This might be different from the local setting because a domain-level policy (set by an administrator on the domain controller) takes precedence over a local policy setting.

click to view at full size.

Figure 27-6. Double-clicking a policy opens a Local Security Policy Setting dialog box that explains the policy and lets you set the local policy.

Password policies place restrictions on the types of passwords users can provide, and how often they can (or must) change them. Account lockout policies govern the behavior of Windows 2000 in the event that a user types the wrong password. Table 27-1 explains the most commonly used settings under Account Policies.

Table 27-1. Commonly Used Account Policies

Policy Description
Password Policy
Enforce password history When a password expires, many users avoid the hassle of remembering a new password by submitting a previous password. Alternating between two passwords, thereby reusing the same passwords, compromises security. Specifying a number greater than 0 causes Windows 2000 to remember that number of previous passwords and forces users to pick a different password than any of the remembered ones.
Maximum password age Specifying a number greater than 0 (the maximum is 999) dictates how long a password remains valid before it expires. (To override this setting for certain user accounts, open the account's properties dialog box in Local Users And Groups and select the Password Never Expires check box.) Selecting 0 means passwords never expire.
Minimum password age Specifying a number greater than 0 (the maximum is 999) lets a system administrator set the amount of time a password must be used before the user is allowed to change it. Selecting 0 means users can change passwords as often as they like.
Minimum password length Specifying a number greater than 0 (the maximum is 14) forces passwords to be longer than a certain number of characters. (Requiring longer passwords enhances security, because longer passwords are harder to guess.) Specifying 0 permits users to have no password at all. Note: Changes to the minimum password length setting do not apply to current passwords.
Account Lockout Policy
Account lockout duration Specifying a number greater than 0 (the maximum is 99,999 minutes) specifies how long the user is to be locked out. If you specify 0, the user is locked out forever—or until an administrator unlocks the user, whichever comes first.
Account lockout threshold Specifying a number greater than 0 (the maximum is 999) prevents a user from logging on after he or she enters a specified number of incorrect passwords within a specified time interval.
Reset account lockout counter after This is where you set the time interval during which a specified number of incorrect password entries locks out the user. After this period elapses (from the time of the first incorrect password), the counter resets to 0 and starts counting again.

TIP
If you use password history, you should also set a minimum password age. Otherwise, users can defeat the password history feature by simply creating a sequence of passwords at random.

If you are an administrator, you can unlock a locked-out user by double-clicking the user's name in Local Users And Groups and clearing the Account Is Locked Out check box.

Assigning Rights to Users and Groups

To assign or change the rights for a user or group:

  1. In Local Security Policy, expand Local Policies and select User Rights Assignment.
  2. click to view at full size.

  3. Double-click the policy you want to view or modify.
  4. The Effective Policy Setting check boxes show the actual policy setting in use. If your computer is part of a domain, domain-level settings override local settings. Unless you are a domain administrator, you can't change the domain-level settings, so the Effective Policy Setting boxes are unavailable.

  5. To add a user or group to the list, click Add.
  6. The Select Users Or Groups dialog box appears. This dialog box functions like the one shown in Figure 27-3 except that it shows users as well as groups.

Table 27-2 lists the default rights assigned to the built-in user groups.

Table 27-2. Default Rights of Built-In User Groups

Group Default Rights
Administrators
  • Access this computer from the network
  • Back up files and directories
  • Bypass traverse checking
  • Change the system time
  • Create a pagefile
  • Debug programs
  • Force shutdown from a remote system
  • Increase quotas
  • Increase scheduling priority
  • Load and unload device drivers
  • Log on locally
  • Manage auditing and security log
  • Modify firmware environment values
  • Profile single process
  • Profile system performance
  • Remove computer from docking station
  • Restore files and directories
  • Shut down the system
  • Take ownership of files and other objects
  • Backup Operators
  • Access this computer from the network
  • Back up files and directories
  • Bypass traverse checking
  • Log on locally
  • Restore files and directories
  • Shut down the system
  • Everyone
  • Access this computer from the network
  • Bypass traverse checking
  • Guest (account)
  • Log on locally
  • Power Users
  • Access this computer from the network
  • Bypass traverse checking
  • Change the system time
  • Log on locally
  • Profile single process
  • Remove computer from docking station
  • Shut down the system
  • Users
  • Access this computer from the network
  • Bypass traverse checking
  • Log on locally
  • Remove computer from docking station
  • Shut down the system
  • (no one)
  • Act as part of the operating system
  • Add workstations to domain
  • Create a token object
  • Create permanent shared objects
  • Deny access to this computer from the network
  • Deny logon as a batch job
  • Deny logon as a service
  • Deny logon locally
  • Enable computer and user accounts to be trusted for delegation
  • Generate security audits
  • Lock pages in memory
  • Log on as a batch job
  • Log on as a service
  • Replace a process-level token
  • Synchronize directory service data


  • Running Microsoft Windows 2000 Professional
    Running Microsoft Windows 2000 Professional
    ISBN: 1572318384
    EAN: 2147483647
    Year: 2000
    Pages: 317

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net