Information Technology Systems and Services at Stanford Link to ITSS Home
Secure Computing
Security Self-Test for Windows Help Page

Self-Test Tool > Help

Don't Panic!

If you came to this page because you ran the Security Self-Test utility and it discovered some problems, you should be able to find the information you need in order to address those problems somewhere below. There is information specific to the utility, covering its use and limitations, as well as links to security best-practices documents for different Windows platforms, which provide step-by-step instructions for securing your Windows PC based on the Self-Test utility's suggestions. If all else fails, there is also a link to the HelpSU web form, if you need help from ITSS technical support.

Note: If your computer belongs to a Windows domain, or if you have a local Windows system administrator, some of the advice below won't necessarily apply to you. If you have local computer support, you should talk first to your support technician before attempting any changes other than setting a strong password for your own Windows account, which is always important to do!

On this page:
Working with the Security Self-Test Tool
Help for Win9x/ME
Help for WinNT/2k/XP

Working with the Security Self-Test Tool

System Requirements for the Security Self-Test
Windows 95, 98, ME, NT 4.0, 2000, or XP. [This utility is not intended for use on servers.]

Downloading and Installing the Self-Test Utility
To download the Security Self-Test, go to the Security Self-Test home page.

When you start the download, your web browser will display a dialog box asking if you want to "Save" or to "Open" the Self-Test utility's installer. Choose the option to "Open" if you are given it: the installer will launch automatically and guide you through the installation process.

If you are given only the option to "Save," then save the installer to a convenient location, such as your computer's desktop. To begin the installation process, simply double-click the file that you saved.

Once the software is installed, an icon labeled "Security Self-Test" will appear on your desktop. You run the Security Self-Test by double-clicking its desktop icon. If you saved the installer file, you may now throw it away, or you can hold on to it if you want to use it later to remove the utility.

If you installed the utility into its default directory, you may also run it by going to your Start menu + Programs + Stanford + Security Test.

Removing the Self-Test Utility
There is no reason you should have to remove the utility - it does nothing unless you launch it and tell it either to look for new versions of itself on the network, or to "Run Security Tests" - but it's nonetheless easy to remove.

Use either the Windows Add/Remove Programs control panel, or if you preserved the Self-Test installer, run the installer again and choose "Remove."

How to Check for New Versions of the Utility
The Security Self-Test has the capability to check for new versions of itself on the network. The first time you use it, it will display a dialog box:

"This program can check the network for a newer version of itself when it is started. In order to do that, however, it must access the network. Would you like to check for program updates?"

If you respond "Yes," the utility will attempt to go on the network and look for an update. This process takes a few seconds, unless no network connection is present, in which case it might take a little longer. If there is no update available, or no network connection, the utility will open its main window.

If an update is available, you'll be given the option to go to the Security Self-Test's home page on the Secure Computing web site, in order to download the new version.

If you respond "No," the Self-Test's main window opens immediately.

Note also that there's a check-box in this "enable self-updating feature?" dialog box: "Don't ask me again (remember my choice)." If you click to place a check in that box, then the utility will assume that each time you run it, you want it either to look for updates or not, depending on whether you said "Yes" or "No" the first time.

You can always change your mind. The Self-Test's Preferences menu allows you to turn the auto-update feature on or off, as well as to "Check for Update Now."

Security Self-Test Help Button
The Security Self-Test's "Security Self-Test Help..." button launches your default web browser and takes you to this page.

Important Note on Privacy
The Security Self-Test utility is a simple, self-contained tool that performs a set of basic security checks appropriate to the kind of computer you run it on. The tool is non-intrusive, sends absolutely no information about your computer over the network, and is provided as an educational aid in your efforts to keep your computer more secure.

The utility has been carefully designed to do nothing unless you tell it to. It will not access the network unless you give it permission, it will not scan your computer until you click its "Run Security Tests" button, and it will save none of its test results without your explicit request.

Under only one circumstance will the utility access the network to which your computer is attached: you instruct it to check for an update to itself. If it finds one, and you choose to update, it will launch your default web browser to handle the download of the new software. If you click the utility's "Security Self-Test Help..." button, it will also launch your default web browser. In both of these latter cases, it is the web browser, not the utility, which goes on the network.

Printing and Saving Reports
Once you have run the security tests, you can save the results in the form of a report, either printed to your Windows default printer, or saved as a text file. Use either the "Print Report" and "Save Report" buttons in the utility's main window, or the appropriate commands under its File menu.

One good way to make use of the Security Self-Test's report is to send a copy by e-mail to your local technical support person. Use the "Copy Report to Clipboard" command in the utility's File menu, then open a new message window in your e-mail program and paste the copied report into the body of the message.

Help for Win9x/ME

Windows 95, 98, and ME were never designed with security in mind. Like many other operating systems developed for personal computers in the late 1970s and after (such as DOS, or the Macintosh "Classic" operating system), they assume each PC has a single user who controls physical access to the machine by keeping it in a locked office. The locked door is pretty much all the security you need. Thus most of the operating system security issues that are so very significant for Windows NT, 2000, and XP simply aren't part of the picture for Windows 95, 98, or ME.

Notable exceptions to this rule are computer virus protection and Internet Explorer. It's as important to maintain good virus protection software for Windows 98 as it is for Windows 2000. It's always a good idea to keep Internet Explorer up-to-date, whatever platform you're running it on.

The only other significant security measure you can take for Windows 95, 98, or ME is to disable file and printer sharing. If you don't need these services, they should always be turned off.

The Security Self-Test checks to see whether you have Norton AntiVirus installed, and whether it's up-to-date; it also checks to see if Internet Explorer is a secure version; and it will tell you if file or printer sharing is enabled.

To be sure Windows and Internet Explorer are up-to-date, you should visit the Microsoft Windows Update page. But if you're running Windows on older hardware, it might not be a good idea to upgrade to the latest version of Internet Explore. Stick with version 5.5, but be sure you've applied all available security patches.

Green Checkmarks, Yellow Circles, Red X's
For all tests, once you run them, the Self-Test utility displays either a green checkmark, a yellow circle, or a red X. The green checkmark means no problem was found. The red X means a potentially serious problem was found, and you should try to take corrective action. A yellow circle is somewhere in the middle.

Each heading below corresponds to one of the tests in the Self-Test utility's main window.

Norton AntiVirus
One of the most important steps you can take to secure your computer is to install and use a good virus protection program. Stanford has a site-license for one of the better products on the market, Norton AntiVirus, and you are entitled to install it on all of your computers. Virus protection software has to be maintained regularly, and Norton makes that easy. You should schedule full virus scans periodically on all of your hard drives.

For more information go to the Essential Stanford Software web site, where you can download Norton AntiVirus and get information about how to configure it for Windows.

File and Printer Sharing
These network services allow you to share files with other computer users (using Network Neighborhood), or to share a printer that's attached directly to your PC. It is not possible to secure these services for Windows 95, 98, or ME, so unless you absolutely must use them, you should disable them.

Go to your Network Control Panel (Start menu + Settings + Control Panel), in which you'll find a button labeled "File and Printer Sharing..." Click the button, which opens a new dialog box, then click to remove the checkmarks from both check-boxes. Click "OK," then "OK" again to close the Network control panel. You must restart your computer for this change to take effect.

Internet Explorer Version
Internet Explorer is an integral component of the Windows operating system, and has long been a target for various hacker exploits. Keeping Internet Explorer up-to-date is as important as keeping Windows itself up-to-date, and fortunately you only have to visit one web site to update both of them.

http://windowsupdate.microsoft.com/

If you're running Windows on older hardware, however, it might not be a good idea to upgrade to the latest version of Internet Explorer. Stick with version 5.5, but be sure you've applied all available security patches.

PC-Leland
PC-Leland is a Stanford-specific software package that provides secure authentication, for access to university computing resources that are restricted for Stanford affiliates' exclusive use - such as Stanford electronic mail, some electronic journals and databases on the Library's web site, and so forth - as well as the ability to store and share files very easily on the Leland system.

For more information go to the PC-Leland web site.

Personal Web Services
Desktop computers should not be running Web servers of any sort, IIS or otherwise. Web servers are the most frequently exploited systems on the Internet, and they represent a huge security risk.

If you must use IIS, keeping it secure is a full-time job, requiring constant vigilance - but this is true of any web server. You don't want to run it on Windows 95 or 98, anyhow.

For more information on IIS, visit the Microsoft IIS Community Center. To learn how to disable personal Web services, see the appropriate best-practices document.

Help for WinNT/2k/XP

The security tests for Windows NT, 2000, and XP concern themselves with the most significant vulnerabilities found in default installations of Windows platforms.

If the Security Self-Test finds no problems, that does not mean that your computer is perfectly secure. And if it does find a few problems, depending on their nature and severity, that doesn't necessarily mean that your computer is insecure.

Some tests are more important than others; and the ordering from top to bottom of the tests in the utility's main window runs approximately from most to least serious. More specific information is below.

After setting a good password, and keeping your antivirus software properly configured and up-to-date, probably the single most important security measure you can take is to visit the Microsoft Windows Update page on a regular basis, to check for security patches and other fixes both for Windows and Internet Explorer. The Self-Test utility isn't able to test whether or not your system has been patched to a current level. It's up to you to go to the Windows Update site.

Green Checkmarks, Yellow Circles, Red X's
For most tests, once you run them, the Self-Test utility displays either a green checkmark, a yellow circle, or a red X. The green checkmark means no problem was found. The red X means a potentially serious problem was found, and you should try to take corrective action. A yellow circle is somewhat equivocal, and has varying significance depending on which test has displayed it, and other circumstances. See below for specific discussions.

Advanced Tests
The Self-Test Tool for Windows NT, 2000, and XP includes an "advanced" section, which you can se by clicking on the View menu either before or after you run the basic tests.

Because of the complexity of the issues involved, ITSS cannot provide technical support for "advanced" tests, which are intended for expert users of Windows.

Here's specific information on each of the tests in the Self-Test utility's main window:

Windows XP Home Edition

This test will only appear if you are running Windows XP Home Edition.

If you use your PC to conduct Stanford business, even if it's a home computer that isn't connected directly to the Stanford network, you are strongly encouraged not to use Windows XP Home Edition, because it cannot be made as secure as XP Professional.

  • Here are some specific concerns (though not all of these will necessarily apply to you):

    • XP Home cannot join a Windows domain, so centralized administration is not possible. Without centralized administration, security-related group policies and templates cannot be applied.
    • XP Home does not allow users to encrypt files.
    • XP Home only supports "Simple File Sharing." To access an XP machine's resources over the network, a user must access the insecure Guest account, which cannot be disabled as it can for Windows XP Professional.
    • In the default configuration of XP Home, all users are granted Administrator privileges, and are not required to set any password.
    • XP Home doesn't support Remote Desktop, which can be very useful for sharing files and other resources between home and office, though its use also increases one's exposure to security threats from the Internet. (The use of Remote Desktop isn't recommended, unless you really need it.)
    • XP Home doesn't support multiple languages. While this is not a security problem, it limits XP Home's usefulness to some people.

    Consider upgrading to Windows XP Professional. An upgrade license isn't too expensive if purchased through a departmental requisition. For more information go to Stanford's Procurement web site.

    Back to list

    Password Security

    Choosing strong, hard-to-guess passwords for all of your computer accounts is extremely important. The Self-Test utility is only concerned with the various Windows user accounts on the computer on which it is run. It has nothing to say about other computer accounts you may have, such as your SUNet ID.

    The Password Security test in the Self-Test's main window is very limited: it checks only user accounts that have Administrator privileges (see "Privileged User Accounts" below for further explanations), and then it only looks for "blank" or "null" passwords. In other words, it only looks for privileged accounts for which no password at all has been set. If it finds any such accounts, it will list them as having "no password set" in the utility's message pane, and display a red X for this test.

    It is critically important that you set strong passwords for all user accounts, especially for user accounts with Administrator privileges!

    If this test finds a problem, it is imperative that you take action as soon as possible. For specific help with choosing and setting passwords, click on one of these links. You can then use your web browser's "back" button to return to this page.

    How to Choose a Strong Password

    How to Set Your Password

    You are strongly encouraged also to use the Self-Test utility's Full Password Check, if that test is available to you (see next entry).

    Back to list

    Full Password Check

    Since the main window's Password Security test is so limited, the Self-Test utility also provides a "Full Password Check," a completely separate and much more thorough test.

    Note: The Full Password Check will not always be available. If you can run this test, a button labeled "Full Password Check" will appear in the utility's main window after you click "Run Security Tests." If you are logged in to Windows as an ordinary user, or if there is an account lock-out policy set on your computer, you cannot run the Full Password Check, so its button will not appear.

    How it works: The Full Password Check is not a real password "cracker" but rather a password "guesser." It makes no attempt to decipher any user passwords on your computer, which are stored in an encrypted form. It simply tries to log in to one or more user accounts by working its way through a dictionary of common passwords. Password "guessing" is usually how hackers break in. Many people use very common passwords, often without realizing they are doing so.

    How to use it: To run the Full Password Check, click the button in the utility's main window. A new window will open and present you with a number of options.

    To begin with, in the "Options" box you should select either "Administrators" (only user accounts in the Administrator group are tested) or "All Users". Then you must select at least one account to be tested. To select multiple accounts, hold down your shift or control key while clicking. To select all displayed user accounts, use the button provided. There is also a button to deselect all displayed user accounts.

    Then, also in the "Options" box, you should choose whether you want the Full Password Check to use the smaller dictionary of more than 800 common passwords, or the larger one containing over 3000 common passwords, in its attempts at password guessing.

    Warning: On some computers the Full Password Check will run quite slowly, and - depending on the options you select, as well as the number of accounts being tested - it could take hours or even days to finish. If this test runs too slowly to suit you, you can always click "Cancel" to stop it immediately.

    Having made your selections, click the "Run Password Check" button to start the test.

    There is a counter at the bottom of the Full Password Check window, which shows you how the test is progressing. As soon as the test discovers a weak password, it displays a warning, and continues on to the next account to be tested, if there is one.

    If any of the user accounts on your computer have weak passwords, it is very important that you change them. See the information above, under "Password Security."

    Privileged User Accounts

    A "yellow circle" rather than a "green checkmark" for this test isn't something to worry about, but it is something to think about. Please read on...

    Computer operating systems designed to accommodate multiple users have long depended on the concept of user privilege. Most users are quite limited in what they can do, and are only permitted access to those computing resources they need for particular tasks. Only a very few users are permitted to have complete control over the entire operating system, because such privilege brings with it great responsibility. An administrative user has the power to make or break the entire system.

    With the advent of personal computers, the assumption no longer held that computing power was always a scarce and expensive resource that could only be cost-effective if shared by many users. People who gained their first exposure to computers as small, personal desktop machines never learned to think about privileged access - beyond, perhaps, keeping the computer in a locked office.

    Windows NT, and the other Windows operating systems that it spawned, have returned to a multiple-user model, and the concept of privileged access is once again important. An Administrator account on a Windows NT, 2000 or XP computer has complete control over the operating system.

    So long as you're careful about what you do, it generally doesn't matter that if you're an Administrator, you have sufficient privileges to wreck your computer. The potential for trouble arises when an interloper gains access to your computer through your account -- they also assume your administrative privileges, and then have full control over your operating system.

    While that interloper could be a person who physically walks up to your computer when you've left your desk without locking your screen, it's much likelier to be a computer virus or other malicious program that uses administrative privileges to wreak havoc on your machine, and spread to other systems.

    If you inadvertently open a virus program, for example, while logged in as an Administrator, that virus has a much easier time making trouble for you (and probably others as well). If you're logged in as a non-privileged user, the risk of system compromise is much smaller.

    In an ideal world, Windows users would only log in as an Administrator when system-wide privileges were required for a particular task. Unfortunately, as is so often the case, reality is different from theory. You may be using software that requires Administrator privileges to run. Or you may need to install or update software, which requires privileged access. It is a hassle to keep logging in and out with different user accounts, just to perform routine maintenance on your own PC.

    Windows 2000 and XP do permit users who are logged in without Administrator privileges to become Administrator temporarily in order to run a specific program. Hold down the shift key while right-clicking an application, select "Run as..." and then supply an Administrator password. But this trick will seem a little complicated to many people.

    So consider using an account in the "Power Users" group, rather than "Administrators" group, for your usual activities, if it's possible for you to do so.

    For more information, please see the appropriate section of the Windows best-practices document specific to your operating system.

    Guest Account

    The Windows Guest account is used to provide temporary anonymous access to a computer's resources, typically over a network, and it has limited privileges.

    The Guest account in Windows NT 4.0, 2000 and XP Professional is disabled by default, because it poses a significant security risk in a networked environment; the Guest account in Windows XP Home Edition cannot be disabled - and this is one of the main reasons XP Home should be avoided.

    If you use XP Home, then set a good password for your Guest account.

    You'll find instructions for disabling the Guest account in the appropriate Windows best-practices document.

    Back to list

    Norton AntiVirus

    One of the most important steps you can take to secure your computer is to install and use a good virus protection program. Stanford has a site-license for one of the better products on the market, Norton AntiVirus, and you are entitled to install it on all of your computers.

    Virus protection software has to be maintained, and requires regular updating. Norton AntiVirus makes it easy to automate these updates. You should periodically schedule a full virus scan on all of your hard drives.

    For more information go to the Essential Stanford Software, where you can download Norton AntiVirus and find details on configuring Norton AntiVirus on Windows.

    Back to list

    Internet Explorer Version

    Internet Explorer is an integral component of the Windows operating system, and has long been a target for various hacker exploits. Keeping Internet Explorer up-to-date is as important as keeping Windows itself up-to-date, and fortunately you only have to visit one web site to update both of them:

    http://windowsupdate.microsoft.com

    Be a frequent visitor to the Windows Update site!

    Note that on some Windows systems, updates are automated. If your computer tells you a Windows update is available, you should go ahead and install it.

    Also note: If you're running Windows on older hardware, with limited memory, it might not be a good idea to upgrade to the latest version of Internet Explorer. Stick with version 5.5, but be sure you've applied all available security patches.

    Back to list

    PC-Leland

    PC-Leland is a Stanford-specific software package that provides secure authentication, for access to university computing resources that are restricted for Stanford affiliates' exclusive use - such as Stanford electronic mail, some electronic journals and databases on the Library's web site, and so forth - as well as the ability to store and share files very easily on the Leland system.

    For more information go to the PC-Leland web site. You might also want to consult the appropriate best-practices document.

    Internet Information Server

    Desktop computers should not be running Web servers of any sort, IIS or otherwise. Web servers are the most frequently exploited systems on the Internet, and they represent a huge security risk.

    If you must use IIS, keeping it secure is a full-time job, requiring constant vigilance - but this is true of any web server.

    For more information on IIS, visit the Microsoft IIS Community Center. To learn how to disable services, see the appropriate best-practices document.

    * File Sharing

    This test is only available in the "advanced" view.

    The File Sharing test only checks whether or not your hard drive has been formatted with NTFS (New Technology File System, first introduced with Windows NT) instead of FAT (File Allocation Table). NTFS permits you a great deal more control over users' access privileges for specific files and folders.

    Anyone with a DOS boot diskette can walk up to a PC formatted with FAT and read everything on the drive that isn't encrypted.

    If you choose to convert your drive from FAT to NTFS, first make a complete back-up of all user data.

    * Domain Membership

    This test is only available in the "advanced" view.

    Membership in a centrally managed Windows domain lessens the burden on individual users to maintain their computers' security. Some Schools and other groups at Stanford already have well-established domains, and there is an effort underway to provide the advantages of domain membership to a broader segment of the university community.

    For more information go to the Stanford Windows Infrastructure web site.

    Back to list

    * Services

    This test is only available in the "advanced" view.

    If your computer is part of a Windows domain or workgroup, or if you have a local Windows system administrator, you should talk to your support technician before making any changes to your Windows services. Services that are clearly unnecessary or dangerous in some environments might be required in others.

    Note that the Services test will never display a green checkmark, yellow circle, or red X.


    If disabling a service causes problems, simply enable it again. For instructions on configuring services see the appropriate best-practices document.

    Back to list

    * Logon Settings

    This test is only available in the "advanced" view.

    Auto-logon permits a user to log in to Windows without manually entering a password. If you always have physical control of your PC, this isn't necessarily a terrible thing; but with auto-logon enabled, anyone with physical access can get right into your Windows account. Worse still, the password for an account with auto-logon enabled may be saved in the Windows registry in an unencrypted form. If the Self-Test finds your password in the registry, it will alert you to this fact, and tell you how to fix the problem.

    It's very easy to enable auto-logon in Windows 2000, and you can do it - but you have to work a little harder in Windows XP.

    You are strongly encouraged not to use auto-logon. To learn how to disable this feature, see the appropriate best-practices document.

    * Restrict Anonymous Logon

    This test is only available in the "advanced" view.

    The "restrict anonymous" registry setting controls whether or not an anonymous user can connect to your PC and get a complete list of all the user accounts that are on it. Once a hacker knows all your user account names, it's that much easier to start trying to break in.

    You are strongly encouraged to set "restrict anonymous" to "2," or at least to "1." For instructions see the appropriate best-practices document.

    Back to list

    Last modified Thursday, 17-Apr-2003 13:12:24 PDT

    © 2003, Stanford University. All rights reserved.
    Comments about this document? Use the HelpSU submission form.
    Need computing help? Visit HelpSU or call 5-HELP (650-725-4357).