Improve Windows XP operating system security

  

Windows XP system is a system that many users often use, but with the popularity of computers, the choice of the system has been paid more and more attention. Although the win7 system has been used now, it is still used by many old xp system users. Windows XP system.

Although the Windows XP system now has superior stability and reliable security. However, the vulnerabilities discovered one after another have caused the Windows XP system to be threatened by attacks. The following will give a few tips to ensure the security of WindowsXP system, for the reader's reference.

(1) Select NTFS format to partition

It is best to have all partitions under Windows XP system in NTFS format, because NTFS format partitions are more secure in terms of security. Even if other partitions use other formats (such as FAT32), at least the partition where the Windows XP system is located should be in NTFS format. In addition, the application should not be placed in the same partition as the system, so as to prevent the attacker from exploiting the vulnerability of the application (such as Microsoft's IIS vulnerability), causing system file leakage, and even allowing the intruder to obtain administrator rights remotely.

(2) Optimize component customization

Windows XP system will install some common components by default, but it is this default installation is very dangerous, you should know exactly what you need Which services, and only the services you really need, according to security principles, the least service + the minimum permissions = the greatest security.

(3) Manage system and resource permissions

Each user has the corresponding permissions on Windows XP system. Users with corresponding permissions can perform different operations on the system, such as hardware and software. Make the installation configuration, add and delete the document directory. Therefore, the user's authority must be controlled to ensure the security of the system.

Windows XP system has many permission groups by default. Users who are added to these permission groups will be given the corresponding permissions as shown below. The commonly used group functions are described as follows:

Administrators group: This group has unrestricted full access by default, which gives full control over the entire system and allows users to specify the highest number of user groups.

PowerUser Group: This group can perform any operations other than the Administrators group retention task. The default permissions assigned to the PowerUser group allow it to modify the settings of the entire computer, but cannot add itself to the Administrators group. Permissions are second only to Administrators.

Users group: Users of this group cannot modify operating system settings, registry or user profiles. It can only run a validated application or create a local group, but only modify the created local group.

Guests group: The permissions of this group are the same as those of the Users group, but the operating system has more restrictions on it.

(4) User account security settings

Check the user account, stop the unwanted account, it is recommended to change the default account name.

Disabling the Guest account disables the Guest account in the computer-managed user. To be on the safe side, it is best to add a complex password to the Guest.

Restrict unnecessary users from removing all DuplicateUser users, test users, sharing users, and more. User Group Policy sets the appropriate permissions, and often checks the users of the system to delete users who are no longer in use.

Create two administrator accounts to create a general privilege user to receive and handle some daily things, and another user with Administrator privileges to use only when needed.

Renaming the System Administrator account to the Windows XP system Administrator can not be disabled, which means that others can try this user's password over and over again. Try to disguise it as a normal user, for example, change to Guesycludx.

Do not let the system display the last login user name Open the registry editor and find the registry key HKLMSoftwareMicrosoftWindowsTCurrentVersionWinlogonDont-DisplayLastUserName, change the key value to 1.

System Account/Share List The default installation of Windows XP system allows any user to get all account/share lists of the system through empty users. This is originally for the convenience of LAN users to share files, but a remote user can also get yours. User list and use brute force to crack user passwords. You can disable 139 empty connections by changing the registry Local_Machine/System/CurrentControlSet/Control/LSA-RestrictAnonymous=1, or you can use the local security policy of Windows XP system (if it is a domain server or a domain server security and domain security policy) There is such an option RestrictAnonymous (an extra limit for anonymous connections).

Copyright © Windows knowledge All Rights Reserved