Password age is an important setting that many managers tend to ignore, especially in smaller networks. That’s a mistake, because invoking this option forces users to change their passwords regularly.
But keep your accounts under close surveillance for unusual usage statistics. For that matter, a regular inventory of all your user accounts is a good idea, especially in larger networks where more than one administrator has the right to add or remove users. Delete dead accounts and passwords.
2. Organize and document user permissions in functional groups.
Many network managers often neglect the importance of each user name. This is an extremely important facet not only of network security but of network organization in general. Be careful during the process of assigning user names and be sure to document the process.
User names are as central to the NT security model as passwords are. Proper user names and passwords work in conjunction during the logon process to ensure legitimate access…