Flylib.com
List of Exercises
Previous page
Table of content
Next page
Chapter 1: Basic Windows 2000 Security: Using Security Templates
Exercise 1.01: Creating the Security Console
Exercise 1.02: Configuring Restricted Groups
Exercise 1.03: Configuring System Services Security
Exercise 1.04: Configuring Registry Security
Exercise 1.05: Configuring File System Security
Exercise 1.06: Configuring Security Templates
Exercise 1.07: Importing and Exporting Templates
Exercise 1.08: Importing Security Templates at the Organizational Unit Level
Exercise 1.09: Importing Security Templates at the Domain Level
Exercise 1.10: Implementing Security Templates Using Scripting
Exercise 1.11: Analyzing Local Security with the Security Configuration and Analysis Snap-in
Exercise 1.12: Analyzing Security with Secedit.exe
Chapter 2: Advanced Security Template and Group Policy Issues
Exercise 2.01: Securing Domain Controllers
Exercise 2.02: Locking Down SQL Server with the IIS Lockdown Tool
Exercise 2.03: Hardening the SQL Server with the Microsoft Baseline Security Analyzer
Exercise 2.04: Routine Maintenance with the HFNetChk Tool
Exercise 2.05: Locking Down Exchange Server with the IIS Lockdown Tool
Exercise 2.06: Locking Down IIS Servers with the URLScan Tool
Exercise 2.07: Locking Down IIS Servers with the IIS Lockdown Tool
Exercise 2.08: Removing the Local Computer Recovery Agent Keys
Exercise 2.09: Applying the Setup Security Template
Exercise 2.10: Analyzing Security Issues with the Event Logs
Chapter 3: Identifying, Installing, and Troubleshooting Required Updates
Exercise 3.01: Determining the Need for Updating Using Windows Update
Exercise 3.02: Using HFNetChk to Analyze for Updates
Exercise 3.03: Using MBSA to Analyze for Updates from the GUI
Exercise 3.04: Using MBSA to Analyze for Updates from the Command Line
Exercise 3.05: Slipstreaming the Windows 2000 Professional Source Files with Service Pack 3
Exercise 3.06: Installing and Configuring the Remote Installation Service
Exercise 3.07: Creating a New RIS CD-Based Installation Image
Exercise 3.08: Updating a Single Computer Using Windows Update
Exercise 3.09: Getting Updates Using the Windows Update Catalog
Exercise 3.10: Installing and Configuring Software Update Services
Exercise 3.11: Installing and Configuring the Automatic Updates Client
Chapter 4: Installing, Configuring, & Managing Windows 2000 Certificate Authorities
Exercise 4.01: Installing Certificate Services
Exercise 4.02: Using the Certificate Request Wizard
Exercise 4.03: Using the Certificate Services Web Interface
Exercise 4.04: Exporting a Certificate and a Private Key
Exercise 4.05: Importing a Certificate from a Trusted Root CA
Exercise 4.06: Revoking a Certificate and Publishing a CRL
Exercise 4.07: Configuring CRL Publishing Options
Exercise 4.08: Selecting the Available Certificate Templates for New Certificate Issue
Exercise 4.09: Configuring Automatic Certificate Enrollment
Exercise 4.10: Configuring Trusted Root CAs
Exercise 4.11: Backing Up Certificate Services
Exercise 4.12: Restoring Certificate Services
Exercise 4.13: Selecting the Publication Location for New Certificates
Exercise 4.14: Recovering a Lost KMS Key
Exercise 4.15: Configuring Auto-enrollment
Chapter 5: Managing and Troubleshooting the Encrypting File System
Exercise 5.01: Encrypting Files with EFS Encryption
Exercise 5.02: Encrypting Remote Files with EFS Encryption
Exercise 5.03: Preventing EFS Use on a Server
Exercise 5.04: Adding Multiple Users to an Encrypted File in Windows XP
Exercise 5.05: Decrypting a File
Exercise 5.06: Creating a New EFS Recovery Agent
Exercise 5.07: Adding an EFS Recovery Agent
Chapter 6: Configuring and Troubleshooting Windows IP Security
Exercise 6.01: Building an IPSec MMC Console
Exercise 6.02: Creating a New IPSec Policy
Chapter 7: Implementing Secure Wireless Networks
Exercise 7.01: Enabling WEP and 802.1
x
Security in Windows XP Professional
Exercise 7.02: Enabling WEP in Windows 2000 Professional
Chapter 8: Configuring Secure Network and Internet Authentication Methods
Exercise 8.01: Configuring a Client for Kerberos Delegation
Exercise 8.02: Configuring a Local Host Service for Kerberos Delegation
Exercise 8.03: Configuring a Domain Account Service for Kerberos Delegation
Exercise 8.04: Configuring Kerberos Preauthentication
Exercise 8.05: Configuring Trusts with Active Directory Domains and Trusts
Exercise 8.06: Configuring Trusts with NetDOM
Exercise 8.07: Configuring the Servers to Require NTLMv2
Exercise 8.08: Configuring Windows NT 4.0 Clients to Use NTLMv2
Exercise 8.09: Configuring Windows 9.
x
Clients to Use NTLMv2
Exercise 8.10: Requesting a Server Certificate for the IIS Server
Exercise 8.11: Configuring Anonymous, Basic, Digest, and Integrated Windows Web Site Authentication
Exercise 8.12: Configuring Web Authentication using SSL
Chapter 9: Configuring and Troubleshooting Remote Access and VPN Authentication
Exercise 9.01: Configuring the Routing and Remote Access Service for Dial-In Access
Exercise 9.02: Configuring Routing and Remote Access Service Modem Ports
Exercise 9.03: Configuring the Routing and Remote Access Service for Remote User VPN Access
Exercise 9.04: Configuring the PPTP and L2TP Ports for Inbound Access Only
Exercise 9.05: Checking the Status of a Connected VPN Port
Exercise 9.06: Creating a New Remote Access Policy to Restrict Remote User Access Times
Exercise 9.07: Configuring Windows 2000 for Connecting to a PPTP Server
Exercise 9.08: Creating a Dynamic Phone Book
Exercise 9.09: Creating a Basic Service Profile
Chapter 10: Configuring and Using Auditing and the Event Logs
Exercise 10.01: Auditing with Local Security Policy
Exercise 10.02: Configuring and Viewing the IIS Log Files
Exercise 10.03: Using EventCombMT
Chapter 11: Responding to and Recovering from Security Breaches
Exercise 11.01: Performing a DoS with SMBdie
Previous page
Table of content
Next page
MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network: Study Guide and DVD Training System (Exam 70-214)
ISBN: 1931836841
EAN: 2147483647
Year: 2003
Pages: 162
Authors:
Will Schmied
,
Thomas W. Shinder
BUY ON AMAZON
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
Implementing Shared Lines and Hunt Groups
Missing Transfer Patterns
Troubleshooting Backup and Restore
Summary
Cisco IPC Express Ordering Information
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
Viewing Table Descriptions
Aggregates
Numeric Values
Object IDs (OID)
The New PostgreSQL C++ APIlibpqxx
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
Calendar Applications
Web Applications
How to Attach a File to a Rich Text Object
Retrieve All Views in a Database
Developer-Specific Enhancements
Information Dashboard Design: The Effective Visual Communication of Data
Even Dashboards Have a History
Typical Dashboard Data
Thirteen Common Mistakes in Dashboard Design
Choosing a Deficient Measure
Tapping into the Power of Visual Perception
File System Forensic Analysis
Reading the Source Data
Content Category
Inodes
The Big Picture
UFS1 Inodes
802.11 Wireless Networks: The Definitive Guide, Second Edition
Robust Security Network (RSN) Operations
Contention-Free Service with the PCF
11g Components
11 Hardware
Using Antennas to Tailor Coverage
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies