Chapter 8: Designing Security for Servers with Specific Roles

 < Day Day Up > 



Overview

In order to maintain a secure network environment, your organization will need to specify the configuration settings for its hardware and software as well as the procedures that are in line with your organizational security policy. This configuration information is known as a trusted computing base. A trusted computing base is the total combination of protection mechanisms in a computer system. A secure baseline applies pieces of this trusted computing base to computers.

In this chapter, you will learn how to create and maintain a secure baseline for the various types of servers in your environment.

Note

Securing Internet Information Services (IIS) was covered in Chapter 7, “Designing Security for Internet Information Services,” and securing Terminal Server is covered in Chapter 10, “Designing Secure Network Management Infrastructure.”



 < Day Day Up > 



MCSE. Windows Server 2003 Network Security Design Study Guide Exam 70-298
MCSE: Windows(r) Server 2003 Network Security Design Study Guide (70-298)
ISBN: 0782143296
EAN: 2147483647
Year: 2004
Pages: 168

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net