Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Designing a Secure Network Framework
Figure 1.1: Generating RSoP Data
Figure 1.2: Computer Selection in the RSoP Query Wizard
Figure 1.3: Results of RSoP Query
Figure 1.4: Illustration of a DDoS Attack
Figure 1.5: ktpass Command-Line Descriptions
Chapter 2: Securing Servers Based on Function
Figure 2.1: Setup security.inf Viewed in Notepad
Figure 2.2: Network Security Settings: LAN Manager Authentication Level Security Settings Policy
Figure 2.3: Add/Remove Snap-In to the Microsoft Management Console
Figure 2.4: Viewing and Modifying Predefined Template Settings
Figure 2.5: Information Warning Regarding Down-Level Clients
Figure 2.6: Registry Policy Properties
Figure 2.7: Group Policy Wizard
Figure 2.8: Imported Policy or Template in Group Policy Editor
Figure 2.9: New Group Policy Object
Figure 2.10: Applied Group Policy to Domain or OU
Figure 2.11: Action Alert in Resultant Set of Policy Snap-In
Figure 2.12: Resultant Set of Policy Results
Figure 2.13: Group Policy Management ConsoleOrganizational Unit Management
Figure 2.14: Group Policy Management ConsoleManagement Options
Figure 2.15: Configure Your Server WizardSelect Server Role
Figure 2.16: Configure Your Server Summary of Selected Options
Figure 2.17: Installing Components and Server Role
Figure 2.18: Configure Your Server Wizard Complete
Figure 2.19: IIS Default Web Service Extensions
Figure 2.20: Creating a New Group Policy Link to OU
Figure 2.21: Import Policy Dialog
Figure 2.22: Security Analysis Results
Chapter 3: Designing a Secure Public Key Infrastructure
Figure 3.1: PKI Overview
Figure 3.2: Common Arrangements of the CA Hierarchy of an Enterprise
Figure 3.3: Example of Geographical Hierarchy
Figure 3.4: Example of Organizational Trust Hierarchy
Figure 3.5: Example of Network Trust Security
Figure 3.6: Example of a Three-Tiered CA Enterprise Hierarchy
Figure 3.7: Selecting Certificate Service to Install
Figure 3.8: Warning Screen before Installing Certificate Services
Figure 3.9: Selecting a CA Type
Figure 3.10: Selecting Public and Private Key Pairs
Figure 3.11: CA Identity Information
Figure 3.12: Configuring Database Settings
Figure 3.13: Select a Certificate Type
Figure 3.14: Enter the Users Details to Issue a Certificate
Figure 3.15: Confirmation Screen for a Certificate Request
Figure 3.16: Pending Queue of the CA
Figure 3.17: Approve a Certificate from Pending Queue
Figure 3.18: Auditing Tab of the CA Properties
Figure 3.19: Confirmation to Stop the Certificate Service
Figure 3.20: Confirmation to Generate New Keys
Chapter 4: Securing the Network Management Process
Figure 4.1: Using the Delegation of Control Wizard
Figure 4.2: Creating a Remote Desktop Connection
Figure 4.3: Configuring the Remote Desktop Connection
Figure 4.4: Activating Remote Assistance
Figure 4.5: Approving Critical Updates in SUS
Figure 4.6: Synchronizing Child SUS Servers
Figure 4.7: Configuring Software Installation Policies
Figure 4.8: Microsoft Baseline Security Analyzer
Figure 4.9: The One-Way Trust Relationship
Figure 4.10: The Two-Way Trust Relationship
Figure 4.11: Trust Transitivity in Domains
Figure 4.12: Transitivity of Forest Trusts
Figure 4.13: Realm Trusts
Figure 4.14: Using a Shortcut Trust
Figure 4.15: Figure for Question 1
Chapter 5: Securing Network Services and Protocols
Figure 5.1: IPSec Transport Mode with Authentication Header
Figure 5.2: IPSec Tunnel Mode with Authentication Header
Figure 5.3: IPSec Transport Mode with ESP
Figure 5.4: IPSec Tunnel Mode with ESP
Figure 5.5: Key Exchange Security Methods Dialog
Figure 5.6: Disabling Default Response Rule
Figure 5.7: Interaction of IPSec Components
Figure 5.8: IPSec Process
Figure 5.9: Export IPSec Policy via IP Security Policy Management Snap-In
Figure 5.10: Default Policies in Active Directory
Figure 5.11: Default Settings for Key Exchange Security Methods for Default IPSec Policy
Figure 5.12: Web Site Properties Dialog
Figure 5.13: Require Secure Channel (SSL) Configuration
Figure 5.14: Server Message Block Signing Options
Figure 5.15: Sample Domain Wireless Policy Properties Dialog
Figure 5.16: Adding a New Preferred Network
Figure 5.17: Wireless Policy Defined in Default Domain
Figure 5.18: IEEE 802.1X Properties in the Selected Preferred Network
Figure 5.19: Smart Card or Other Certificate Properties Options
Figure 5.20: Protected EAP Properties Options
Figure 5.21: Functional Diagram of Wireless Access Infrastructure
Figure 5.22: IPSec Settings
Figure 5.23: Network Configuration
Chapter 6: Securing Internet Information Services
Figure 6.1: IIS 6.0 Worker Process Model
Figure 6.2: IIS 5.0 Isolation Model
Figure 6.3: Directory Security Tab of IIS 6.0
Figure 6.4: Enable Secure Communication
Figure 6.5: One-to-One Mapping Screen
Figure 6.6: Select Credentials for Mapping
Figure 6.7: Add a Wildcard Rule
Figure 6.8: The Rules Window
Figure 6.9: Enter Rule Information
Figure 6.10: Enter Credentials for Many-to-One Mapping
Figure 6.11: Enable Anonymous Access
Figure 6.12: Basic Authentication Warning
Figure 6.13: Basic Authentication Settings
Figure 6.14: Digest Authentication Warning
Figure 6.15: RADIUS Architecture in Windows Server 2003
Figure 6.16: Select Network Services
Figure 6.17: Select Internet Authentication Service
Figure 6.18: IAS MMC Snap-In
Figure 6.19: Properties of Remote Access Policies
Figure 6.20: Edit the Default Policy Settings
Figure 6.21: Web Service Extensions View
Figure 6.22: Enabling the Internet Connection Firewall
Figure 6.23: Available Protocol Configuration Window
Figure 6.24: Entering Machine Name or IP Address to Configure the Firewall
Figure 6.25: Enable Logging for Default Web Site
Figure 6.26: Customizing Log Fields
Figure 6.27: Local Audit Policy Settings
Figure 6.28: Enable Success or Failure Audit Options
Figure 6.29: Enable Health Detection
Chapter 7: Securing VPN and Extranet Communications
Figure 7.1: Configuring Routing and Remote Access
Figure 7.2: Routing and Remote Access Server Setup Wizard
Figure 7.3: RRAS Custom Configuration Screen
Figure 7.4: Setting Up a New Routing Protocol
Figure 7.5: Choosing RIP
Figure 7.6: General Tab of the RIP Property Interface Sheet
Figure 7.7: Security Tab of the RIP Property Interface Sheet
Figure 7.8: Neighbors Tab of the RIP Property Interface Sheet
Figure 7.9: Two Sites Connected via VPN Tunnel
Figure 7.10: Diagram of a PPTP Packet
Figure 7.11: Configuration Screen of the Routing and Remote Access Setup Wizard
Figure 7.12: Remote Access Screen of the Routing and Remote Access Setup Wizard
Figure 7.13: VPN Connection Screen of the Routing and Remote Access Setup Wizard
Figure 7.14: IP Address Assignment Screen of the Routing and Remote Access Setup Wizard
Figure 7.15: DHCP Relay Agent Reminder
Figure 7.16: Setting Up a Demand Dial Interface
Figure 7.17: Connection Type Screen of the Demand Dial Wizard
Figure 7.18: VPN Type Screen of the Demand Dial Wizard
Figure 7.19: Destination Address Screen of the Demand Dial Wizard
Figure 7.20: Protocols and Security Screen of the Demand Dial Wizard
Figure 7.21: Dial In Credentials Screen of the Demand Dial Wizard
Figure 7.22: Dial Out Credentials Screen of the Demand Dial Wizard
Figure 7.23: Diagram of an L2TP Packet
Figure 7.24: Security Tab of the Answering Routers Properties Sheet
Figure 7.25: Authentication Methods Screen
Figure 7.26: Choosing Properties of a Demand Dial Interface
Figure 7.27: Security Tab of the Demand Dial Interface
Figure 7.28: Advanced Security Settings Screen of the Security Tab
Figure 7.29: Smart Card or Other Certificates Properties Screen
Figure 7.30: Setting Credentials on the Demand Dial Interface
Figure 7.31: Remote Access Policy Settings Screen
Figure 7.32: Authentication Tab of the Remote Access Profile Screen
Figure 7.33: Encryption Tab of the Remote Access Profile Screen
Figure 7.34: Dial-in Constraints Tab of the Remote Access Profile Screen
Figure 7.35: IP Tab of the Remote Access Profile Screen
Chapter 8: Securing Active Directory
Figure 8.1: NTFS Permissions Configuration Window
Figure 8.2: Setting Permissions on Folders via Group Policy
Figure 8.3: Files and Folder Permissions Configured in Group Policy
Figure 8.4: Changing the Account a Service Uses to Start
Figure 8.5: Account Policies Window in Group Policy
Figure 8.6: Configuring Restricted Groups in Group Policy
Figure 8.7: Kerberos Policy Configuration
Figure 8.8: Enabling Reversible Encryption on a Per-Account Basis
Figure 8.9: Configuring Password Complexity
Figure 8.10: Logon Events Registration Process
Figure 8.11: Setting Auditing on an Object
Figure 8.12: Advanced Auditing Settings
Figure 8.13: Delegation of Control Wizard
Chapter 9: Securing Network Resources
Figure 9.1: Access Control List with Access Control Entries
Figure 9.2: Access Mask Compared with Access Request
Figure 9.3: Nested Group Hierarchy
Figure 9.4: LDAP Query
Figure 9.5: Result of LDAP Query
Figure 9.6: Delegating Control of the Finance OU in Active Directory Users and Computers
Figure 9.7: Adding Users to Delegate Control
Figure 9.8: Selecting Tasks to Delegate
Figure 9.9: Completion of Delegation of Control Wizard
Figure 9.10: Shared Folder Permissions Access Control List
Figure 9.11: Modifying Default Permissions on Registry Key
Figure 9.12: Advanced Registry Settings for HKEY_CURRENT_USER
Figure 9.13: Auditing Tab Options
Figure 9.14: Effective Permissions Options
Figure 9.15: Registry Node in Group Policy Object Editor Snap-In
Figure 9.16: Adding Key to Registry Access
Figure 9.17: Selecting the Software Node
Figure 9.18: View or Modify Permissions for Registry Key
Figure 9.19: Users Permissions Set to Read Only by Default
Figure 9.20: Advanced Settings Options
Figure 9.21: Modifying Permissions for the RegEdt32 Registry Key
Figure 9.22: Default Domain Policy with RegEdt32 Permissions Specified
Figure 9.23: Advanced Attributes for EFS Folder Encryption
Figure 9.24: File Attribute Indicating Encryption
Figure 9.25: EFS File Sharing Dialog
Figure 9.26: Adding User for Shared EFS File
Figure 9.27: No User Certificate Available
Figure 9.28:
cipher.exe
Commands, Part 1
Figure 9.29:
cipher.exe
Commands, Part 2
Figure 9.30:
cipher.exe /R
to Create Recovery Agent Key and Certificate
Figure 9.31: Structure of an Encrypted File
Figure 9.32: Encrypting File System Properties Dialog
Figure 9.33: Select Recovery Agents Dialog
Figure 9.34: Importing Certificate for Recovery Agent
Figure 9.35: Windows Warning Regarding Certificate Status
Figure 9.36: Default Domain Policy Encrypting File System Node
Figure 9.37: Key Backup from Microsoft Management Console
Figure 9.38: Export File Format for Certificate Only (Excludes Private Key)
Figure 9.39: Export File Format Including Private Key with Certificate
Figure 9.40: Certificate Export Wizard Successful Completion
Figure 9.41: Export Successful Notice
Figure 9.42: Create Secure Printer
Figure 9.43: SpoolDirectory in Registry
Figure 9.44: Startup and Recovery Options for Local Computer via Control Panel
Figure 9.45: Startup and Recovery Options
Chapter 10: Securing Network Clients
Figure 10.1: Enabling Syskey Encryption
Figure 10.2: Selecting Syskey Encryption Options
Figure 10.3: Confirmation of Syskey Success
Figure 10.4: Interactive Logons Using Local vs. Domain Accounts
Figure 10.5: Passport Sign-On through www.ebay.com
Figure 10.6: Passport on www.expedia.com
Figure 10.7: Creating a Remote Access Policy
Figure 10.8: Remote Access Authentication Methods
Figure 10.9: Remote Access Policy Conditions
Figure 10.10: Installing the Internet Authorization Service
Figure 10.11: The IAS Administrative Console
Figure 10.12: Configuring Permissions for IAS
Figure 10.13: Question 1 Illustration
Figure 10.14: Administrator Properties Sheet
Appendix A: Self Test Questions, Answers, and Explanations
Figure 2.22: Security Analysis Results
Figure 4.15: Figure for Question 1
Figure 5.22: IPSec Settings
Figure 5.23: Network Configuration
Figure 10.13: Question 1 Illustration
Figure 10.14: Administrator Properties Sheet
Previous page
Table of content
Next page
MCSE Designing Security for a Windows Server 2003 Network: Exam 70-298
ISBN: 1932266550
EAN: 2147483647
Year: 2003
Pages: 122
Authors:
Elias Khasner
,
Laura E. Hunter
BUY ON AMAZON
Metrics and Models in Software Quality Engineering (2nd Edition)
The Iterative Development Process Model
Examples of Metrics Programs
Relations Diagram
The Rayleigh Model Framework
How Do You Know Your Product Is Good Enough to Ship?
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Introduction to Kanban
Conduct Data Collection
Developing a Kanban Design
Auditing the Kanban
Conclusion
Snort Cookbook
Installing Snort Binaries on Linux
Logging Alerts to a Database
Detecting IDS Evasion
Installing and Configuring Swatch
Staying Legal
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Additional information
Principles of Service-Orientation
Native Web service support for service-orientation principles
Business service layer
Entity-centric business service design (a step-by-step process)
Twisted Network Programming Essentials
Working with Asynchronous Results
Accepting Mail with SMTP
Listing the Newsgroups on a Server
Setting Up a Custom SSH Server
Running Commands on a Remote Server
Comparing, Designing, and Deploying VPNs
Deploying IPsec VPNs: Fundamental Considerations
Summary
Operation of L2TP Voluntary/Client-Initiated Tunnel Mode
Review Questions
Summary
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies