(Page 7 of 8)   < Prev  2 3 4 5 6 7 8  Next >

Category: System Security Management » Windows NT

HardenNT Security Script Generator
Added 2001-10-22
by Bart Timmermans and Filip Sneppe
HardenNT is a tool created to automate the task of securing one or more Microsoft Windows based computers. It is specifically aimed at securing Windows NT 4.0 machines, although some of the functionality could also be used on Windows 9x or even Windows 2000 networks.

RegDACL
Added 2001-10-22
by Frank Heyne Software
RegDACL allows you to query and change the discretionary access control list (DACL) of any Windows NT Registry key. You can of course use NT´s built-in RegEdt32 to set registry permissions,but if you need to edit more than a few machines then you are faced with quite a boring job, not to mention being more prone to make mistakes. RegDACL, gives you the ability to use a batch script to perform this job. The freeware version 1.1 of RegDACL allows you to define access permissions for the predefined groups Administrators, Everyone, Interactive, Network, System, Creator Owner, User, Authenticated Users, Batch, Local, Service, Anonymous Logon, Domain Administrators, Domain Users and DomainGuests and in much more detail than RegEdt32 will allow.

Harden NT
Added 2001-10-22
by Bart Timmermans and Filip Sneppe
HardenNT is a tool created to automate the task of securing one or more Microsoft Windows based computers. It is specifically aimed at securing Windows NT 4.0 machines, although some of the functionality could also be used on Windows 9x or even Windows 2000 networks. HardenNT is aimed at: Security minded system administrators who are willing to put some time and effort into securing their Windows systems; Security consultants who find themselves having to secure Windows NT computers regularly, and who are looking at a way to automate this as much as possible without losing the flexibility of easy customization. HardenNT's strength lies in its ability to provide security baselines for various systems. It can be used to perform the following tasks: Install one or more security patches on a Windows computer depending on its operating system, CPU architecture and service pack level; Restrict a user group's default NT privileges; Turn on NT auditing for security events a user considers important; Set NTFS ACL permissions, delete and/or move security critical files; Secure a computer's registry. HardenNT is not a tool that is to be installed or even run on a computer that one wants to secure. It merely creates a number of batch files that run standard NT (and NT resource kit) tools. This means that the batch files created by HardenNT are to be copied and run on the host you want to secure. The batch files rely on Microsoft Windows NT resource kit utilities (xcalcs.exe, auditpol.exe, ntrights.exe, regini.exe and shutdown.exe) and Microsoft security hotfixes. These executables will have to be purchased or downloaded from Microsoft and copied to the host you are trying to secure.

NetWatcherPro
Added 2001-10-22
by L.A. van der Hoogt
Utility to monitor and manage network access to your PC. Sounds alarm at connections, allows restrictions and kick features. Can be executed on access to a file, to further protect your machine from unwanted access.

GSD (Get Service DACL)
Added 2001-10-22
by Arne Vidström
GSD (Get Service Dacl) gives you the DACL (Discretionary Access Control List) of the Windows NT service you specify as a command line option. More information can be found in the the GSD FAQ.

ClearEventLog
Added 2001-10-22
by Duke Engineering
ClearEventLog is a FREEWARE Windows NT application that can clear the system, application, and security event logs via a simple command-line operation. It can clear them separately, or all at once.

WDumpEvt
Added 2001-10-22
by Isabelle Vollant
WDumpEvt is an administration tool that makes it easy to manage all the information from Windows NT logs. Browse the eventlog tree, dump the data to a file in ASCII-delimited format for importing into a database or spreadsheet, or choose HTML format for an easy-to-read display. The resulting file can contain information such as type, number, and category of the event, plus computer name, date, user, description. Dump the data of the system, security, application log, or only a source, category, or event. Dump all the data or just the data from the last dump. Erase or save the data in the eventlogs, too. Schedule all these actions thanks to the LogSched service to have regular save or dump. Retrieve properties about eventlog files: events number, begin and end date, file size, etc.

RegEdit (SomarSoft)
Added 2001-10-22
by SomarSoft
Somarsoft RegEdit, a DLL callable by 32 bit Visual Basic that can be used to view and/or modify user registry profile.

Lava98
Added 2001-10-22
by Duke Engineering
Lava98 is a desktop application that allows you to monitor any log file (that is, a Web server or mail server log file), or a Windows NT event log.

WinAudlog
Added 2001-10-22
by Core SDI
WinAudlog is a centralized logfile checking tool for auditing distributed system logs in a network and certify that intruders did not modify these logs.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus