Difference between revisions of "Securing your Windows Service installation"

From FileZilla Wiki
Jump to navigationJump to search
Line 6: Line 6:
  
 
== Tips & Tricks ==
 
== Tips & Tricks ==
* You can script setting up permissions using CACLS, XCACLS or [http://setacl.sourceforge.net/ SetACL] into the bat file.
 
* With Secondary Logon (Run As...) service you can execute commands as administrator even from LUA account.
 
* You can use [http://sudown.sourceforge.net/ suDown] to achieve LUA with Administrator account.
 
* Windows XP Home, "Security" tab cannot be enabled by default, but you can install update to enable it.
 
  
 
== Conclusion ==
 
== Conclusion ==
 
Advantages of this solution are obvious. Should there be vulnerability in FZS, only those files and folders can be manipulated to which FZS has write/delete rights. Rest of the computer is shielded from damage. To limit Denial Of Service attacks by filling disk where writable folders are, you can setup disk Quotas in Windows XP Pro and Windows 2003 Server. Moreover you will learn more about multi-user security principles.
 
Advantages of this solution are obvious. Should there be vulnerability in FZS, only those files and folders can be manipulated to which FZS has write/delete rights. Rest of the computer is shielded from damage. To limit Denial Of Service attacks by filling disk where writable folders are, you can setup disk Quotas in Windows XP Pro and Windows 2003 Server. Moreover you will learn more about multi-user security principles.

Revision as of 02:42, 12 October 2023

User accounts concepts

Configuration

Troubleshooting

Tips & Tricks

Conclusion

Advantages of this solution are obvious. Should there be vulnerability in FZS, only those files and folders can be manipulated to which FZS has write/delete rights. Rest of the computer is shielded from damage. To limit Denial Of Service attacks by filling disk where writable folders are, you can setup disk Quotas in Windows XP Pro and Windows 2003 Server. Moreover you will learn more about multi-user security principles.