An Attacker with Physical Access to Your Computer May Be Able to Access Your Files and Other Data (818200)
The information in this article applies to:
- Microsoft Windows Server 2003, 64-Bit Datacenter Edition
- Microsoft Windows Server 2003, 64-Bit Enterprise Edition
- Microsoft Windows Server 2003, Datacenter Edition
- Microsoft Windows Server 2003, Enterprise Edition
- Microsoft Windows Server 2003, Standard Edition
- Microsoft Windows Server 2003, Web Edition
- Microsoft Windows XP 64-Bit Edition
- Microsoft Windows XP Professional
- Microsoft Windows XP Tablet PC Edition
- Microsoft Windows 2000 Advanced Server
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Server
- Microsoft Windows NT Server 4.0
- Microsoft Windows NT Server 4.0 Terminal Server Edition
- Microsoft Windows NT Server, Enterprise Edition
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows Small Business Server 2003, Premium Edition
- Microsoft Windows Small Business Server 2003, Standard Edition
SYMPTOMSAn attacker who has physical access to your computer may be
able to start your computer by using another operating system to obtain access
to your files and other data. For example, an attacker who has physical access
to your computer may be able to use any of the following methods to access
files and other data on your computer:
- Remove your hard disk and attach it to another
computer.
- Start your computer by using a Microsoft Windows or a
third-party operating system CD-ROM to access your hard disk or to perform a
"parallel" installation.
- Start your computer with an MS-DOS or Windows 98 Startup
disk. If your drives are formatted with the NTFS file system, the attacker may
be able to use a driver that mounts NTFS volumes to gain access to files on the
NTFS volume.
- Start your Windows XP-based computer by using a Windows
2000 CD-ROM and then running Recovery Console. Because the security accounts
manager (SAM) database format has changed in Windows XP, you are not prompted
for an administrator password when you run Windows 2000 Recovery Console on a
Windows XP-based computer.
CAUSEAn administrator can use the methods that are described in
the "Symptoms" section of this article to perform disaster recovery on a
computer. However, without physical security controls, these methods can also
be used by an attacker to access files or other data on your computer. This
issue is not specific to computers that are running a Windows NT-based
operating system. Therefore, security experts do not consider such attacks to
be computer security vulnerabilities.RESOLUTIONTo help prevent an attacker from using the methods that are
described in the "Symptoms" section of this article, implement appropriate
security measures to restrict physical access to your computer. For information
about basic physical security best practices, visit the following Microsoft Web
site: Microsoft also recommends the following methods that can help to
reduce the threat that is posed by such attacks:
- Configure the system and startup password features in your
computer's BIOS (or CMOS) setup utility. A system and startup password may help
to prevent an unauthorized person from starting your computer. See the
documentation that is included with your computer, or contact your computer
manufacturer for information about how to configure a system and startup
password in the BIOS.
- Disable the options to start your computer from the CD-ROM
drive or floppy disk drive in your computer's BIOS. This can help to prevent an
unauthorized person from starting your computer with another operating system.
See the documentation that is included with your computer, or contact your
computer manufacturer for information about how to disable the options to start
the computer from the CD-ROM drive or floppy disk drive in your
computer.
- Use the System Key tool (Syskey.exe) with a
computer-generated random key that is stored on a floppy disk to prevent
Windows from being started by an unauthorized person. Keep the floppy disk in a
secure location. The floppy disk must be inserted in a drive during Windows
startup for the startup sequence to complete. The System Key tool is included
with Windows NT 4.0 Service Pack 3 and later, Windows 2000, Windows XP, and
Windows Server 2003.
For additional information about how to use the System Key tool, click the
following article number to view the article in the Microsoft Knowledge Base:
143475
Windows NT System Key Permits Strong Encryption of the SAM
- Use the NTFS file system and encrypt your files by using
the Encrypting File System (EFS) feature. EFS is a feature of the NTFS file
system in Windows 2000, Windows XP, and Windows Server 2003. You can use EFS to
encrypt files, folders, or whole data drives. EFS uses industry-standard
algorithms and public key cryptography to help keep encrypted files
confidential even if an attacker gains unrestricted access to the encrypted
files or folders.
308989 HOW TO: Encrypt a Folder in Windows XP
Note In Windows XP, there is no default recovery agent for EFS. Even
an attacker who gains administrative access to a Windows XP-based computer
cannot gain access to EFS-encrypted files on the computer.
Modification Type: | Major | Last Reviewed: | 10/9/2006 |
---|
Keywords: | kbprb KB818200 |
---|
|