hong_li: Date: Thu, 3 Jul 2003 08:23:07 -0700 (PDT) hong_li: From: hong li <[EMAIL PROTECTED]> hong_li: To: Meidinger Chris <[EMAIL PROTECTED]>, hong_li: [EMAIL PROTECTED] hong_li: Subject: Re: AW: Security issue in Windows 2000? hong_li: hong_li: Thanks for the answer. hong_li: hong_li: If you move hong_li: > your domain to native hong_li: > mode and implement Kerberos authentication (list - hong_li: > correct me if i am wrong) hong_li: > you should get rid of this problem. hong_li: hong_li: No. We are in native mode and it's still same hong_li: problem. hong_li: hong_li: If the user can guess the domain administrator hong_li: password, the user can do any damage to the domain hong_li: controller even without logging into domain? I think hong_li: it's very dangerous. hong_li: hong_li: Except setting very difficult password for domain hong_li: controller and all servers's administrator account, hong_li: what else can we do to prevent users accesing the hong_li: domain controller or servers even without logging into hong_li: domain? hong_li: hong_li: Thanks, hong_li: hong_li: Hong hong_li: hong_li: hong_li: hong_li: hong_li: hong_li: --- Meidinger Chris <[EMAIL PROTECTED]> hong_li: wrote: hong_li: > Hello Hong, hong_li: > hong_li: > this DOES happen on Windows NT. This is a 'feature' hong_li: > of NTLM Authentication. hong_li: > You can, in fact, set your local administrator hong_li: > password to the same thing as hong_li: > the domain administrator and have domain admin hong_li: > priveliges everywhere. hong_li: > hong_li: > Anyway, it's not a bug, but a feature. If you move hong_li: > your domain to native hong_li: > mode and implement Kerberos authentication (list - hong_li: > correct me if i am wrong) hong_li: > you should get rid of this problem. hong_li: > hong_li: > badenIT GmbH hong_li: > System Support hong_li: > hong_li: > Chris Meidinger hong_li: > Tullastrasse 70 hong_li: > 79108 Freiburg hong_li: > hong_li: > hong_li: > -----Urspr�ngliche Nachricht----- hong_li: > Von: hong li [mailto:[EMAIL PROTECTED] hong_li: > Gesendet: Wednesday, July 02, 2003 4:35 PM hong_li: > An: [EMAIL PROTECTED] hong_li: > Betreff: Security issue in Windows 2000? hong_li: > hong_li: > hong_li: > If you use the same password for the local hong_li: > administrator on workstations hong_li: > as all other servers's local administrator, (even hong_li: > domain administrator),the local administrator can hong_li: > gain hong_li: > full access to any servers without asking hong_li: > domain info if you logon locally using local hong_li: > administrator account. You even can map to hong_li: > \\servername\c$ whihout asking any domain users hong_li: > info. hong_li: > hong_li: > I recalled this never happenes in NT environment and hong_li: > it always pops you doamin userinfo when you access hong_li: > any hong_li: > server in the doamin if you log on locally. hong_li: > hong_li: > Is this the security hole in Windows 2000 hong_li: > environment hong_li: > or something else? hong_li: > hong_li: > Thanks in advance, hong_li: > hong_li: > Hong
Take a look at this file I maintain (as time permits) http://concept.temple.edu/sysadmin/installers/NT-2000-XP/Bastion/Manditory.ini (It's a smaller version of what I use to secure Windows servers). It can disable network shares and other resources that arent needed. Thanks Scott Birl http://concept.temple.edu/sysadmin/ Senior Systems Administrator Computer Services Temple University ====*====*====*====*====*====*====*====+====*====*====*====*====*====*====*====* --------------------------------------------------------------------------- Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts! The Gartner Group just put Neoteris in the top of its Magic Quadrant, while InStat has confirmed Neoteris as the leader in marketshare. Find out why, and see how you can get plug-n-play secure remote access in about an hour, with no client, server changes, or ongoing maintenance. Visit us at: http://www.neoteris.com/promos/sf-6-9.htm ----------------------------------------------------------------------------
