Export (0) Print
Expand All

Chapter 1. Introduction

Click here to download the PDF of this document. (W2kCCAdm.pdf)

On This Page

Introduction
Audience Assumptions
Document Overview
Conventions
Document Links

Introduction

Welcome to the Microsoft Windows 2000 Evaluated Configuration Administrator's Guide. This document provides sufficient guidance to allow an administrator to securely operate Windows 2000 in accordance with the requirements stated in the Windows 2000 Common Criteria Security Target (ST).

The Windows 2000 Common Criteria Security Target, henceforth referred to as the Windows 2000 ST, provides a set of security requirements taken from the Common Criteria (CC) for Information Technology Security Evaluation. The Windows 2000 product was evaluated against the Windows 2000 ST and found to satisfy the ST requirements.

This document is targeted at the administrator and provides a description of how to perform the administrative security functions needed to securely operate Windows 2000 in accordance with the ST requirements.

Audience Assumptions

This document assumes the administrator is familiar with the security features of the Windows 2000 product. To administer a Windows 2000 computer or system, one should be familiar with the product documentation for the operating system such as the Microsoft Windows 2000 Resource Kit.

Document Overview

This document has the following chapters:

Chapter 1, "Introduction", introduces the purpose and structure of the document and the assumptions of the audience.

Chapter 2, "Security Administration", describes the Evaluated Configuration and provides an overview of the security functionality.

Chapter 3, "Administering Windows 2000 in a Secure Manner", provides a description of each of the security functions that must be performed by the administrator to securely operate the system in accordance with the requirements stated in the Security Target.

Chapter 4, "External Security Measures", describes any measures that should be addressed by the Windows 2000 environment which require the administrator's attention.

Chapter 5, "Acronyms"

Chapter 6, "References"

Conventions

Throughout the document, the following conventions are followed:

Warnings: warnings are provided to make the administrator aware of cautions they should take to ensure the system is secure. Warnings are identified with the bolded word Warning (e.g. Warning: ").

Note: Text that is important for the administrator to take notice of is identified with a bolded word "Note" (e.g. Note).

Evaluated Configuration: used to refer to the configuration of Windows 2000 that was evaluated and determined to meet the Windows 2000 ST.

Document Links

Chapter 2. Security Administration

Chapter 3. Administering Windows 2000 Security

Chapter 4. External Security Measures

Chapter 5. Acronyms

Chapter 6. References

Version 1.0

October 4, 2002

Prepared For:
Microsoft Corporation
Corporate Headquarters
One Microsoft Way
Redmond, WA 98052-6399

Prepared By:
Science Applications International Corporation
7125 Gateway Drive
Columbia, MD 21046

With special acknowledgement to the Windows 2000 Resource Kit, Microsoft Press

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback
Show:
© 2014 Microsoft