Chapter 12.  Users, Policies, Certificates, and Security

As privacy concerns grow, security and intrusion protection become increasingly important topics for many people. This chapter provides answers to questions about a broad range of security-related topics.

For example, you’ll learn in this chapter how to prevent your email from being forged and assure the recipient of its authenticity. Encryption and digital signatures are also covered in detail, including how to use digital signatures for multiple IDs and ensuring that a digital signature on an incoming message is valid.

Certificates play an important role in Windows 2000 security, and this chapter provides solutions for the more common issues you’ll face regarding certificates and Certificate Authorities (CAs). For example, you’ll learn how to obtain certificates from a CA and how to move certificates from one computer to another.

Sharing is another topic covered in this chapter. You’ll learn how to monitor the users who are accessing your computer across the network as well as the resources they are using. If you’re sharing your computer with others, you’ll find ways to restrict the tasks a user or group can perform, prevent modification of the registry, and otherwise limit the changes that can be made to your system, whether locally or across the LAN.

The chapter covers additional security topics as well, including how and why to rename the Administrator and Guest accounts, control driver installation, prevent a system ...

Get Windows 2000 Quick Fixes now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.