Chapter 11 summarized the various e-mail attacks that any organization or home user can face. It provided a multitude of defense steps that anyone can take to minimize the threat of e-mail-based malware, including blocking high-risk file attachments, disabling HTML content, authenticating URL links, running antivirus software, blocking spam, blocking unmanaged e-mail connections, securing DNS, and supplementing the defenses with end-user education.
This chapter and Chapter 10 covered client-side Internet risks. Chapter 12 will detail how to secure Microsoft's Internet Information Service, whether running on a server or a workstation.