Servers Understanding Local Security and the System Account

Understanding Local Security and the System Account




Christopher Rice

          In the
world of Windows administration, you will stumble on security quite frequently. 

During my first job, it was funny to see how secret the local
administrator password was to the group.  Nothing was held quite so
sacred.  

In the world of Windows administration, you will stumble on security quite frequently. During my first job, it was funny to see how secret the local administrator password was to the group. Nothing was held quite so sacred.

Nothing has changed with Windows 2000, nor will it with the inception of XP — you will still need to manage the security in your environment, and it will still be a pain in the butt.

And now with the idea of user vs. machine and the introduction of Windows Installer and enterprise management, things have gotten even more confusing. So, let’s get back to the basics.

To access the security for your local machine, go to the Control Panel and then to Local Security Policy. You will be presented with the following:

          Nothing
has changed with Windows 2000, nor will it with the inception of XP — you
will still need to manage the security in your environment, and it will still be
a pain in the butt.  

          And now with
the idea of user vs. machine and the introduction of Windows Installer and
enterprise management, things have gotten even more confusing.  So, let’s get
back to the basics.  

          To access
the security for your local machine, go to the Control Panel and then to Local
Security Policy.  You will be presented with the following:

          From
here, you can drill down into any of the folders to work with the security
policy on the machine that you are on.  For example, here is how you would
restrict Password Policy:

          Whatever you want
to do with the security policy, this is where you will do it.  You will want to allow
the local administrator all rights and, naturally, the system as well.  

          These
accounts are your most important…and the ones that you do not want anyone
messing with.  Microsoft has a great article entitled “How the System
Account is Used”.  You can get to it from the following link:

http://support.microsoft.com/support/kb/articles/Q120/9/29.asp?LN=EN-US&SD=gn&FR=0&qry=Q120929&rnk=1&src=DHCS_MSPSS_gn_SRCH&SPR=WIN2000

          Let me
know if you have any questions about these accounts or security in general.

Latest Posts

Installing and Activating Hyper-V Linux Integration Services

Editor's Note: Updated to reflect changes with the Hyper-V Linux Integration Services 4.3 release. Microsoft developers have designed components that help in improving the performance of...

What is a Hypervisor Server?

At its most basic, a hypervisor is the “manager” of a software-hardware stack. The term “hypervisor” derives from the word “supervisor.” What is a Hypervisor? When...

HPE SimpliVity 380 Server Review

The HPE SimpliVity 380 Server was designed to deliver the high performance required by enterprise data centers in a simplified package. One of the...

What is Server Virtualization?

Server virtualization is essential for the efficient operation of any datacenter. But what exactly is server virtualization and is it right for your business?...

Using Netsh Commands for Wi-Fi Management in Windows 10

In this Server Tutorial, we’ll show you how to use Netsh Commands for Wi-FI management in Windows 10. Some basic networking settings and functionality...

Related Stories