Windows NT 4.0 upgrade to win 2003 related issues

  

There are always a series of problems in the upgrade, or the related issues are not answered after the upgrade, so this article describes how to upgrade from Windows NT 4.0 to Windows Server The registry on the 2003 computer uses the registry "Access Control Lists" (ACLs) and file system ACLs.

When upgrading a Windows NT 4.0-based computer to Windows Server 2003, the "Windows Installer" does not change the registry and file system ACLs. Windows Server 2003 allows for a higher level of security, and it handles registry and file system permissions differently than Windows NT 4.0. Microsoft recommends that you apply Windows 2003 ACLs to computers that are upgraded from Windows NT 4.0.

To apply the registry and file system ACLs, you can use the "Security Configuration and Analysis" snap-in. Please note that you must be a member of the “Administrators” group to perform this procedure.

How to apply the default system security settings on a computer that is upgraded from Windows NT 4.0 to Windows Server 2003 as a member of the "Administrator" or "Administrators" group.

Click Start, click Run, type mmc in the Open box, and then click OK.

On the File menu, click “Add/Remove Snap-in.

Click Add, <;Security Configuration & Analysis", Add, click Close, then click OK.

In the console tree, right-click “Security Configuration and Analysis" and click Open Database.

Specify the name of the database (for example, upgdbase) and location, then click Open.

In the Import Templates dialog box that appears on the screen, click Set Security.inf, and then click Open.

Right-click on “Security Configuration and Analysis" and click Analyze Computer Now.

In the Execution Analysis dialog box that appears on the screen, accept the default log file path shown in the "Error log file path" box, or specify the desired location and click OK.

Compare this template security settings to your existing computer settings.

Note: At this point, no changes will be made to the computer. The results of this process indicate how the security settings in the template differ from the actual system settings.

When you complete the analysis, expand the various components in the console tree, such as account policies, local policies, event logs, restricted groups, and system services.

For each component you expanded in step 10, view its security properties in the right pane of the policy column, and note the following:

with green The item marked with a check indicates that the current computer settings are the same as the security settings in the database.

Copyright © Windows knowledge All Rights Reserved