Monday, November 25, 2013

How To Secure Windows XP

 
Windows XP offers wonderful security features and as an administrator of the network or the computer it’s your responsibility to check the system’s security from every aspect.
In this article you will learn that how to implement the security procedures in the Windows XP Professional environment.  There is not a single method, software or hardware that can protect your computer from internal and external security threats. Before you determine the security strategy you need to understand that what the security risks are.
Due to the poor default settings, Windows XP has some security holes and these holes can be fixes by implementing the security procedures. Some of the major security procedures that can be configured and implemented in the Windows XP Professional are following.


  • Use NTFS on all the partitions.
NTFS provides additional security features so by converting your drives’ file system into NTFS you provide the additional security layer to your drives.
  • Disabling simple file sharing.
Both Windows XP Home Edition and Professional system that are not a part of the domain use Network Access model called Simple File Sharing.  Set you by default shared folders to read only.

  • 3. Disable guest account.
The guest accounts are always the great holes for the hackers so disable them as soon as you install the operating system.
  • 4. Installing antivirus & anti spyware software on all the computers.
Install up-to-dated antivirus and anti spyware program on all your systems to prevent them from viruses, spyware, adware and internal and external threats
  • 5. Using security configuration manager.
The Security Configuration Manager is a set of tools that allows the network administrators to define the security templates that can be applied on the single machine or a group of computers via group policy
  • 6. Limiting the numbers of unnecessary accounts.
 Delete any duplicate accounts, shared accounts, test accounts and general accounts.  Use group policies to assign permissions
  • 7. Renaming the administrator accounts.
Many hackers use SID to find the name of the account.  Renaming the administrator’s account will make it difficult for the hackers to make assault on the system
  • 8. Preventing last logged in user name.
When you use the CTRL-ALT-DEL, a logon dialog box shows the name of the last user and the last user name can be used in the password guessing attacks
  • Disabling unnecessary services.
An unnecessary service is another unnecessary hacker’s hole so you can stop the unnecessary services such as IIS, Remote Registry, Routing and Remote Access, Net Meeting, SSDP discovery service in the control panel.
  • 10. Install and user port scanner.
Ports are interfaces where devices communicate with each other. Scan all the open ports to find out any intrusion attempts
  • Encrypt the temp folder.
Encrypting the temp folder (where Windows XP Professional’s files are stored) provides an extra security layer
  • 12. Disable default shares.
Windows XP Professional creates hidden administrative shares that are used by the operating system.  These shares can be disabled in the Computer Management Console
  • 13. Enable auditing on the workstations.
Enable auditing such as Account Logon Events, Logon Events, Object Access, System Events and Policy change.  By these events, you can investigate any data theft and security related event
  • 14. Disable dump file creation.
Dump file is a good application tool and is used when system or application crashes and shows blue screen.  You can change the dump file settings in the control panel.
  • 15. Disable autorun for the CD ROM.
Turn the auto play feature in the Windows XP off.
  • 16. Install latest service packs.
Always update your operating system with the latest service packs.
  • 17. Implementing IPsec.
IP Sec provides the encryption for the network sessions so by using IP Sec your system gets extra security layer.
Other security procedures includes, limiting the access to resources, booting system from the primary hard driver. Secure internet explorer settings. Securing outlook express. disable the services that you don’t use, regularly update your operating system with latest security patches, using firewall router that supports the options of ports blocking NAT, stateful packet inspection and Virtual Private Network, disable the option of boot from floppy or CD-ROM, enable EFS, use firewall software or hardware on the gateway computer and on all workstations.