Many organizations still use Windows NT for some or all mission-critical systems. This is because it has been around...
for a long time and many administrators are familiar with its security features and ways to enhance its security.
One of the ways you can enhance that security is to change the Windows logon. The log on dialog box usually displays the user name of the last user who logged on to the network. Some administrators prefer to have this feature enabled so that if any authorized user of the network accessed a particular user's workstation, that user name will remain visible as the last logged on user.
On the other hand, some administrators prefer to hide the user name of the last log on user. If the name is there, someone who is not the normal user might be able to guess the password knowing the name and thereby access information that may be confidential to the organization.
Here's how you can hide the information.
Execute registry editor
Go to HKEY_LOCAL_MACHINESoftwareMicrosoftWindows NTCurrent Version WinLogon
Add a new value called "Don'tDisplayLastUserName" as a REG_SZ data type, with a value of 1.
Save the changes and when restarted the user name field will now be blanked.
Adesh Rampat has 10 years experience with network and IT administration. He is a member of the Association Of Internet Professionals, the Institute For Network Professionals, and the International Webmasters Association. He has also lectured extensively on a variety of topics.
Did you like this tip? If so, (or if not) why not let us know. Send an email to us and sound off.
Windows NT/2000 Network Security
Author : E. Schultz
Publisher : Macmillan Technical Publishing
Published : Jul 2000
This book is intended primarily for LAN administrators, system programmers, information security staff, and advanced users. Although the main focus of the book will be technical, many facets of Windows NT security involve practicing sound control procedures. As such, much of the book's discussion will be pertinent to all three groups. Windows NT/2000 Network Security will also thoroughly cover security-relevant technical issues such as controlling services protocols like Web-services and SMB. The book will be carefully sequenced to delve into technical issues increasingly with each chapter, so that the last half of the book will be more relevant to LAN administrators and system programmers than anyone else - whereas the first half will be equally pertinent to all groups.