Managing security
Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2
Managing security
Using the Windows interface
Using command-line tools
Using the Windows interface
The following table lists some of the most common tasks for managing security, and the tools you can use to perform them. For more information, click the corresponding link under Tool or Feature.
Task | Tool or feature |
---|---|
Secure a computer by granting users or groups specific user rights, or assign permissions to an object to enable users or groups to perform specific actions on that object. |
|
Set up an auditing policy to record user or system activity in specified event categories. |
|
Confirm the identity of any user trying to log on to a domain or access network resources. |
|
Grant access to assigned user roles related to job function. |
|
Encrypt files and directories that are stored on a disk. |
|
Verify and authenticate the validity of each party involved in an electronic transaction through the use of public key cryptography. |
|
Create, apply, and edit the security for your local computer, organizational unit, or domain. |
|
Understand security. |
|
Identify software and control its ability to run on your local computer, organizational unit, domain, or site. |
For more information about deploying security, see "Part 2: Deploying Distributed Security Services" at the Microsoft Windows Resource Kits Web site.
For more information about managing security, see "Part One: Security" at the Microsoft Windows Resource Kits Web site.
Using command-line tools
The following table lists some of the most common tasks for managing security, and the command-line tools you can use to perform them. For more information, click the corresponding link under Command-line tool.
Task | Command-line tool |
---|---|
Display or modify discretionary access control list (DACL) files. |
|
Request certificates from a certification authority (CA). |
|
Process and display certification authority (CA) configuration information, configure Certificate Services, back up and restore CA components, and verify certificates, key pairs, and certificate chains. |
|
Create, list or delete stored user names and passwords or credentials. |
|
Enable a user to run specific tools and programs with different permissions than the user's current logon provides. |
|
Configure and analyze system security by comparing your current configuration to at least one template. |
|
Recover access to a file that previously was denied by making the administrator owner of the file. |
|
Display domain or computer name, user name, group names, logon identifier and privileges for the user currently logged on. |
For more information about the command shell, see Command shell overview. For information about tools used to manage the command-prompt window, see Manage the command-prompt window. For an alphabetical list of all of the command-line tools, see Command-line reference A-Z.