![]() |
For many of us, the holidays will be spent with sugar plum fairies and the Grinch. For those of us less fortunate, the coming weeks will be spent grappling with Microsoft Corp.’s unique endowment to the enterprise computing world–Windows 2000. Large migrations are getting under way. So for those of us working in large shops, if the question of migration hasn’t yet come up, it will.
Microsoft is determined to maintain its command of the corporate server market through a combination of impressive features and coercion tactics (see Joe Mullich’s related story, No Rush To Open Windows 2000). These persuasive methods are already familiar to most of us: The folks in Redmond have a history of jettisoning prior versions while promoting the new ones. Because of the support implications of this philosophy, most corporate shops will be well on their way to Win2K by this time next year.
Once you’ve got the kvetching out of your system, you may find some value in the new and improved Windows OS. Aside from the performance and manageability perks that Microsoft has bundled into this package, the company has addressed many of the significant security weaknesses that plagued Windows NT 4.0. The result of this overhaul is a new set of security features, including a public key infrastructure platform, a transparent file encryption service, and Kerberos authentication.
How Secure Is Secure, Really?
If the new security features of Windows 2000 were a leading motivation for migration, then a good understanding of a significant W2K security limitation would be helpful. Take Windows 2000 and Kerberos authentication.
The cornerstone of Win2K’s security architecture is Microsoft’s implementation of Kerberos as an authentication protocol. To fully utilize all the features of Kerberos authentication, however, all existing installations of previous versions of Windows need to be upgraded. That means every server and every workstation throughout the enterprise. The source of the problem is a lingering vestige of Microsoft’s past–the Windows NT Lanman protocol.
The Lanman NT (LMNT) protocol in Win2K allows backward compatibility with Windows NT, 98, 95, and 3.11 clients. It also manages the authentication of a Windows 2000 workstation to an NT 4 server. Thus, a network running multiple versions of Windows would be open to attack via password compromises, the often-exploited method of authentication in the earlier OSs.
From a hacker’s perspective, this allows the weakest link type of vulnerability, where access to a well-protected Windows 2000 server is made trivial if a Windows 98 or NT 4 machine is connected to the server using the LMNT protocol. One fix for this weak link would be for Microsoft to release Kerberos client software for previous versions of Windows. But this solution would be a disincentive for those considering enterprisewide upgrades.
Novell NetWare environments will likewise be relegated to LMNT authentication. In fact, when it comes to Windows 2000’s Kerberos interoperability with non-Windows operating systems, the message from Microsoft officials remains confusing. Earlier in 2000, the open-source community reprimanded Microsoft over-proposed enhancements to Kerberos that threatened to reduce interoperability.
It Helps To Be Prepared |
Launching a migration to Windows 2000 will require careful planning and significant resources. The following guidelines, which reflect the complexity of the operation, may help you prepare for migration:
|
The noise has died down, as Microsoft has clarified its interoperability with the various implementations of Kerberos on UNIX. This is accomplished chiefly through Active Directory Service Accounts, which allow subsets of Kerberos functionality. True Active Directory clients for non-Microsoft platforms may be on the drawing board, but don’t expect an early release.
Don’t Let Your Guard Down
Microsoft’s track record for securing the previous versions of Windows is less than brilliant. Critics charge that the company allows hackers to do much of its R&D work. Of course, Microsoft sees the constant attempts by hackers to penetrate its products as an unfortunate price of having the largest server market share.
Ultimately, a secure migration to Win2K will depend on adequate staffing and sufficient funding. Management must provide sufficient staffing and training resources to simultaneously maintain the existing system while launching the new one. An IT staff wrestling with newly introduced technologies cannot be expected to maintain the same level of security during migration without preparation.
Time will be the judge of Microsoft’s success with Windows 2000. If W2K migration is in your company’s immediate future, you’d be wise to remember that Microsoft is first and foremost a marketing company. R&D for security should follow the new product line since officials in Redmond have little interest in nurturing yesterday’s revenue streams.
Furthermore, hackers will continue to be pleased with the company’s business imperatives because easy exploits like password compromises will remain accessible for years to come. Given this unstable climate, and as widespread adoption of Windows 2000 commences, secure your migration to Windows 2000 by preparing your IT staff and not losing sight of ever-present and ever-changing security concerns. //
Brett Regan Young works for the Netigy Corporation in Houston. Netigy provides comprehensive eCommerce solutions, including secure migration to Win2K. Send your migration horror stories to: brett.young@netigy.com.
Ethics and Artificial Intelligence: Driving Greater Equality
FEATURE | By James Maguire,
December 16, 2020
AI vs. Machine Learning vs. Deep Learning
FEATURE | By Cynthia Harvey,
December 11, 2020
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
FEATURE | By Samuel Greengard,
November 05, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
FEATURE | By Cynthia Harvey,
October 07, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
Top 10 Machine Learning Companies 2021
FEATURE | By Cynthia Harvey,
September 22, 2020
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.
Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.
Advertise with Us
Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this
site are from companies from which TechnologyAdvice receives
compensation. This compensation may impact how and where products
appear on this site including, for example, the order in which
they appear. TechnologyAdvice does not include all companies
or all types of products available in the marketplace.