HOW TO: Apply Registry and File System ACLs on Computers That Are Upgraded to Windows 2000

Article translations Article translations
Article ID: 313205 - View products that this article applies to.
This article was previously published under Q313205
This article has been archived. It is offered "as is" and will no longer be updated.
Expand all | Collapse all

On This Page

SUMMARY

This step-by-step article describes how to apply registry and file system Access Control Lists (ACLs) on computers that are upgraded from Windows NT 4.0 to Windows 2000. When you upgrade a Windows NT 4.0-based computer to Windows 2000, the registry and file system ACLs are not changed by Windows 2000 Setup. Windows 2000 handles registry and file system permissions differently than Windows NT 4.0, which allows a greater security for the server or workstation. Microsoft recommends that you apply the Windows 2000 ACLs to computers that are upgraded from Windows NT 4.0.

The easiest way to apply Windows 2000 default registry and file system ACLs to an upgraded computer is to use the Windows 2000 Security Configuration and Analysis tool. This tool can apply the default Windows 2000 Security Configuration to the upgraded computer.

How to Apply the default Windows 2000 System Security Settings to an Upgraded Windows 2000-Based Computer

  1. Log on as administrator.
  2. Click Start, click Run, type mmc, and then click OK.
  3. In the Console1 console, click Add/Remove snap-in on the Console menu.
  4. In the Add/Remove Snap-in dialog box, click Add, click the Security Configuration and Analysis entry, and then click Add.
  5. Click Close in the Add Standalone Snap-in dialog box.
  6. Click OK in the Add/Remove Snap-in dialog box.
  7. In the left pane of the Console1 console, right-click the Security Configuration and Analysis entry, and then click Open database.
  8. In the Open database dialog box, type a name for the database (such as upgdbase), and then click Open.
  9. In the Import Template dialog box, locate and click the Setup Security.inf security template, and then click Open.
  10. Right-click the Security Configuration and Analysis node in the left pane, and then click Analyze Computer Now. The template security settings are compared to the existing computer settings.
  11. View the entries in each of the nodes. Current computer settings that conflict with the template are marked with a red "x". Entries that match the template settings are marked with a green checkmark. Entries that are not defined in the database do not have a mark on the entry's icon.
  12. If you need to change any of the entries, right-click the entry, and then click Security to change the setting in the Security database. The settings that are stored in the database are applied to the system security configuration when you apply them.
  13. Right-click the Security Configuration and Analysis node in the left pane, and then click Configure Computer Now. The settings in the Security database are applied to the local computer.

    NOTE: If there are conflicts between the database entries and the existing security configuration on the computer, the existing entries will be overwritten unless you reconcile the differences in the Security database before you configure the computer.

Properties

Article ID: 313205 - Last Review: October 24, 2013 - Revision: 3.2
APPLIES TO
  • Microsoft Windows 2000 Server
  • Microsoft Windows 2000 Professional Edition
Keywords: 
kbnosurvey kbarchive kbenv kbhowto kbhowtomaster KB313205

Contact us for more help

Contact us for more help
Connect with Answer Desk for expert help.
Get more support from smallbusiness.support.microsoft.com