Summary

skip navigation

honeypots for windows
Chapter 4 - Windows Honeypot Deployment
Honeypots for Windows
by Roger A. Grimes
Apress 2005
progress indicator progress indicatorprogress indicator progress indicator

This chapter covered the decisions you need to make in deploying your honeypot and the steps for installing it. The remainder of the chapter described suggestions for hardening honeypots.

You will need to harden any computer hosting VM honeypots. Even Windows honeypots need to be hardened against unauthorized compromise. You can harden a Windows host by installing needed patches, disabling or removing any applications or services not needed by the host, hardening the TCP/IP stack, filtering unneeded network traffic and connections, securing service accounts, protecting user accounts, disabling anonymous enumerations, and enforcing the use of the newer authentication protocols.

Chapter 5 will begin a three-chapter journey through installing, configuring, and using the low-interaction honeypot, Honeyd.

progress indicator progress indicatorprogress indicator progress indicator


Honeypots for Windows
Honeypots for Windows (Books for Professionals by Professionals)
ISBN: 1590593359
EAN: 2147483647
Year: 2006
Pages: 119

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net