| < Day Day Up > |
|
In order to maintain a secure network environment, your organization will need to specify the configuration settings for its hardware and software as well as the procedures that are in line with your organizational security policy. This configuration information is known as a trusted computing base. A trusted computing base is the total combination of protection mechanisms in a computer system. A secure baseline applies pieces of this trusted computing base to computers.
In this chapter, you will learn how to create and maintain a secure baseline for the various types of servers in your environment.
Note | Securing Internet Information Services (IIS) was covered in Chapter 7, “Designing Security for Internet Information Services,” and securing Terminal Server is covered in Chapter 10, “Designing Secure Network Management Infrastructure.” |
| < Day Day Up > |
|