Four measures to strengthen Windows2003 security

  
Windows 2003 is increasingly favored by users for its stable performance, but in the face of endless new viruses, you still need to strengthen the security of Windows 2003.

1. User Password Settings

Setting a password for a key can largely avoid password attacks. The character length of the password setting should be more than 8 characters, preferably a combination of letters, numbers, and special characters, such as "psp53, @pq", "skdfksadf10@", etc., which can effectively prevent brute force cracking. It is best not to use your own birthday, mobile number, phone number, etc. as a password.

2. Delete the default share

Click "Start → Run", enter "gpedit.msc" and press Enter to open the Group Policy Editor. Expand User Configuration→Windows Settings→Scripts (Login/Logout), double-click the login item, and then add “delshare.bat” (parameters do not need to be added) to delete the Windows 2003 default share.

Next, disable the IPC connection: Open the Registry Editor, expand the [HKEY_

LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Lsa] branch, and find "restrictanonymous" in the right window. Subkey, change its value to "1".

3. Close autoplay autoplay

drive not only acts, but also other drive functions, it is easy to be exploited to perform a hacking program.

Open the Group Policy Editor, expand "Computer Configuration → Administrative Templates → System", find the "Close Auto Play" option in the right window and double click, select "Enabled" in the dialog box that opens. Then select "All Drives" from the drop-down menu after "Automatically Close Auto" and press "OK" to take effect.

4. Clear remotely accessible registry path

Set the remotely accessible registry path to null, which prevents hackers from using the scanner to read system information and other information from the computer through the remote registry.


Open the Group Policy Editor, expand Computer Configuration→Windows Settings→Security Settings→Security Options, and find “Network Access: Remotely Accessible Registry Path” in the right window. Then in the window shown in the figure, the remotely accessible registry path and sub-path content are all deleted. Four strokes to enhance Windows 2003 security

Copyright © Windows knowledge All Rights Reserved