Inside Windows Server 1002003 [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Inside Windows Server 1002003 [Electronic resources] - نسخه متنی

Addison Wesley

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید









Service Accounts


When a background service starts, it needs to run in the security context of an account. In classic NT, services typically run under the LocalSystem account. This causes security problems because processes running as LocalSystem have virtually unlimited privileges.

In Windows Server 2003, Microsoft tried to correct this vulnerability by including two new service accounts:


  • LocalService .
    This account provides a security context for several services that access local system resources.


  • NetworkService .
    This account provides a security context for several services that access network resources.



These two accounts have their own profiles under Documents and Settings so they can obtain public key certificates. This enables them to digitally sign files and network communications.

If you look at the service list in the Services.msc console, you'll notice that LocalSystem still owns the lion's share of the services. LocalService owns a few processes such as Alerter, Remote Registry, and the Web Client. NetworkService owns DNS client, RPC Locator, License Logging, and a few others. Look for an expansion of their roles in the future; but for now, don't expect the local service accounts to prevent too many attacks

/ 245