List of Figures

Chapter 1: Designing a Secure Network Framework

Figure 1.1: Generating RSoP Data
Figure 1.2: Computer Selection in the RSoP Query Wizard
Figure 1.3: Results of RSoP Query
Figure 1.4: Illustration of a DDoS Attack
Figure 1.5: ktpass Command-Line Descriptions

Chapter 2: Securing Servers Based on Function

Figure 2.1: Setup security.inf Viewed in Notepad
Figure 2.2: Network Security Settings: LAN Manager Authentication Level Security Settings Policy
Figure 2.3: Add/Remove Snap-In to the Microsoft Management Console
Figure 2.4: Viewing and Modifying Predefined Template Settings
Figure 2.5: Information Warning Regarding Down-Level Clients
Figure 2.6: Registry Policy Properties
Figure 2.7: Group Policy Wizard
Figure 2.8: Imported Policy or Template in Group Policy Editor
Figure 2.9: New Group Policy Object
Figure 2.10: Applied Group Policy to Domain or OU
Figure 2.11: Action Alert in Resultant Set of Policy Snap-In
Figure 2.12: Resultant Set of Policy Results
Figure 2.13: Group Policy Management ConsoleOrganizational Unit Management
Figure 2.14: Group Policy Management ConsoleManagement Options
Figure 2.15: Configure Your Server WizardSelect Server Role
Figure 2.16: Configure Your Server Summary of Selected Options
Figure 2.17: Installing Components and Server Role
Figure 2.18: Configure Your Server Wizard Complete
Figure 2.19: IIS Default Web Service Extensions
Figure 2.20: Creating a New Group Policy Link to OU
Figure 2.21: Import Policy Dialog
Figure 2.22: Security Analysis Results

Chapter 3: Designing a Secure Public Key Infrastructure

Figure 3.1: PKI Overview
Figure 3.2: Common Arrangements of the CA Hierarchy of an Enterprise
Figure 3.3: Example of Geographical Hierarchy
Figure 3.4: Example of Organizational Trust Hierarchy
Figure 3.5: Example of Network Trust Security
Figure 3.6: Example of a Three-Tiered CA Enterprise Hierarchy
Figure 3.7: Selecting Certificate Service to Install
Figure 3.8: Warning Screen before Installing Certificate Services
Figure 3.9: Selecting a CA Type
Figure 3.10: Selecting Public and Private Key Pairs
Figure 3.11: CA Identity Information
Figure 3.12: Configuring Database Settings
Figure 3.13: Select a Certificate Type
Figure 3.14: Enter the Users Details to Issue a Certificate
Figure 3.15: Confirmation Screen for a Certificate Request
Figure 3.16: Pending Queue of the CA
Figure 3.17: Approve a Certificate from Pending Queue
Figure 3.18: Auditing Tab of the CA Properties
Figure 3.19: Confirmation to Stop the Certificate Service
Figure 3.20: Confirmation to Generate New Keys

Chapter 4: Securing the Network Management Process

Figure 4.1: Using the Delegation of Control Wizard
Figure 4.2: Creating a Remote Desktop Connection
Figure 4.3: Configuring the Remote Desktop Connection
Figure 4.4: Activating Remote Assistance
Figure 4.5: Approving Critical Updates in SUS
Figure 4.6: Synchronizing Child SUS Servers
Figure 4.7: Configuring Software Installation Policies
Figure 4.8: Microsoft Baseline Security Analyzer
Figure 4.9: The One-Way Trust Relationship
Figure 4.10: The Two-Way Trust Relationship
Figure 4.11: Trust Transitivity in Domains
Figure 4.12: Transitivity of Forest Trusts
Figure 4.13: Realm Trusts
Figure 4.14: Using a Shortcut Trust
Figure 4.15: Figure for Question 1

Chapter 5: Securing Network Services and Protocols

Figure 5.1: IPSec Transport Mode with Authentication Header
Figure 5.2: IPSec Tunnel Mode with Authentication Header
Figure 5.3: IPSec Transport Mode with ESP
Figure 5.4: IPSec Tunnel Mode with ESP
Figure 5.5: Key Exchange Security Methods Dialog
Figure 5.6: Disabling Default Response Rule
Figure 5.7: Interaction of IPSec Components
Figure 5.8: IPSec Process
Figure 5.9: Export IPSec Policy via IP Security Policy Management Snap-In
Figure 5.10: Default Policies in Active Directory
Figure 5.11: Default Settings for Key Exchange Security Methods for Default IPSec Policy
Figure 5.12: Web Site Properties Dialog
Figure 5.13: Require Secure Channel (SSL) Configuration
Figure 5.14: Server Message Block Signing Options
Figure 5.15: Sample Domain Wireless Policy Properties Dialog
Figure 5.16: Adding a New Preferred Network
Figure 5.17: Wireless Policy Defined in Default Domain
Figure 5.18: IEEE 802.1X Properties in the Selected Preferred Network
Figure 5.19: Smart Card or Other Certificate Properties Options
Figure 5.20: Protected EAP Properties Options
Figure 5.21: Functional Diagram of Wireless Access Infrastructure
Figure 5.22: IPSec Settings
Figure 5.23: Network Configuration

Chapter 6: Securing Internet Information Services

Figure 6.1: IIS 6.0 Worker Process Model
Figure 6.2: IIS 5.0 Isolation Model
Figure 6.3: Directory Security Tab of IIS 6.0
Figure 6.4: Enable Secure Communication
Figure 6.5: One-to-One Mapping Screen
Figure 6.6: Select Credentials for Mapping
Figure 6.7: Add a Wildcard Rule
Figure 6.8: The Rules Window
Figure 6.9: Enter Rule Information
Figure 6.10: Enter Credentials for Many-to-One Mapping
Figure 6.11: Enable Anonymous Access
Figure 6.12: Basic Authentication Warning
Figure 6.13: Basic Authentication Settings
Figure 6.14: Digest Authentication Warning
Figure 6.15: RADIUS Architecture in Windows Server 2003
Figure 6.16: Select Network Services
Figure 6.17: Select Internet Authentication Service
Figure 6.18: IAS MMC Snap-In
Figure 6.19: Properties of Remote Access Policies
Figure 6.20: Edit the Default Policy Settings
Figure 6.21: Web Service Extensions View
Figure 6.22: Enabling the Internet Connection Firewall
Figure 6.23: Available Protocol Configuration Window
Figure 6.24: Entering Machine Name or IP Address to Configure the Firewall
Figure 6.25: Enable Logging for Default Web Site
Figure 6.26: Customizing Log Fields
Figure 6.27: Local Audit Policy Settings
Figure 6.28: Enable Success or Failure Audit Options
Figure 6.29: Enable Health Detection

Chapter 7: Securing VPN and Extranet Communications

Figure 7.1: Configuring Routing and Remote Access
Figure 7.2: Routing and Remote Access Server Setup Wizard
Figure 7.3: RRAS Custom Configuration Screen
Figure 7.4: Setting Up a New Routing Protocol
Figure 7.5: Choosing RIP
Figure 7.6: General Tab of the RIP Property Interface Sheet
Figure 7.7: Security Tab of the RIP Property Interface Sheet
Figure 7.8: Neighbors Tab of the RIP Property Interface Sheet
Figure 7.9: Two Sites Connected via VPN Tunnel
Figure 7.10: Diagram of a PPTP Packet
Figure 7.11: Configuration Screen of the Routing and Remote Access Setup Wizard
Figure 7.12: Remote Access Screen of the Routing and Remote Access Setup Wizard
Figure 7.13: VPN Connection Screen of the Routing and Remote Access Setup Wizard
Figure 7.14: IP Address Assignment Screen of the Routing and Remote Access Setup Wizard
Figure 7.15: DHCP Relay Agent Reminder
Figure 7.16: Setting Up a Demand Dial Interface
Figure 7.17: Connection Type Screen of the Demand Dial Wizard
Figure 7.18: VPN Type Screen of the Demand Dial Wizard
Figure 7.19: Destination Address Screen of the Demand Dial Wizard
Figure 7.20: Protocols and Security Screen of the Demand Dial Wizard
Figure 7.21: Dial In Credentials Screen of the Demand Dial Wizard
Figure 7.22: Dial Out Credentials Screen of the Demand Dial Wizard
Figure 7.23: Diagram of an L2TP Packet
Figure 7.24: Security Tab of the Answering Routers Properties Sheet
Figure 7.25: Authentication Methods Screen
Figure 7.26: Choosing Properties of a Demand Dial Interface
Figure 7.27: Security Tab of the Demand Dial Interface
Figure 7.28: Advanced Security Settings Screen of the Security Tab
Figure 7.29: Smart Card or Other Certificates Properties Screen
Figure 7.30: Setting Credentials on the Demand Dial Interface
Figure 7.31: Remote Access Policy Settings Screen
Figure 7.32: Authentication Tab of the Remote Access Profile Screen
Figure 7.33: Encryption Tab of the Remote Access Profile Screen
Figure 7.34: Dial-in Constraints Tab of the Remote Access Profile Screen
Figure 7.35: IP Tab of the Remote Access Profile Screen

Chapter 8: Securing Active Directory

Figure 8.1: NTFS Permissions Configuration Window
Figure 8.2: Setting Permissions on Folders via Group Policy
Figure 8.3: Files and Folder Permissions Configured in Group Policy
Figure 8.4: Changing the Account a Service Uses to Start
Figure 8.5: Account Policies Window in Group Policy
Figure 8.6: Configuring Restricted Groups in Group Policy
Figure 8.7: Kerberos Policy Configuration
Figure 8.8: Enabling Reversible Encryption on a Per-Account Basis
Figure 8.9: Configuring Password Complexity
Figure 8.10: Logon Events Registration Process
Figure 8.11: Setting Auditing on an Object
Figure 8.12: Advanced Auditing Settings
Figure 8.13: Delegation of Control Wizard

Chapter 9: Securing Network Resources

Figure 9.1: Access Control List with Access Control Entries
Figure 9.2: Access Mask Compared with Access Request
Figure 9.3: Nested Group Hierarchy
Figure 9.4: LDAP Query
Figure 9.5: Result of LDAP Query
Figure 9.6: Delegating Control of the Finance OU in Active Directory Users and Computers
Figure 9.7: Adding Users to Delegate Control
Figure 9.8: Selecting Tasks to Delegate
Figure 9.9: Completion of Delegation of Control Wizard
Figure 9.10: Shared Folder Permissions Access Control List
Figure 9.11: Modifying Default Permissions on Registry Key
Figure 9.12: Advanced Registry Settings for HKEY_CURRENT_USER
Figure 9.13: Auditing Tab Options
Figure 9.14: Effective Permissions Options
Figure 9.15: Registry Node in Group Policy Object Editor Snap-In
Figure 9.16: Adding Key to Registry Access
Figure 9.17: Selecting the Software Node
Figure 9.18: View or Modify Permissions for Registry Key
Figure 9.19: Users Permissions Set to Read Only by Default
Figure 9.20: Advanced Settings Options
Figure 9.21: Modifying Permissions for the RegEdt32 Registry Key
Figure 9.22: Default Domain Policy with RegEdt32 Permissions Specified
Figure 9.23: Advanced Attributes for EFS Folder Encryption
Figure 9.24: File Attribute Indicating Encryption
Figure 9.25: EFS File Sharing Dialog
Figure 9.26: Adding User for Shared EFS File
Figure 9.27: No User Certificate Available
Figure 9.28: cipher.exe Commands, Part 1
Figure 9.29: cipher.exe Commands, Part 2
Figure 9.30: cipher.exe /R to Create Recovery Agent Key and Certificate
Figure 9.31: Structure of an Encrypted File
Figure 9.32: Encrypting File System Properties Dialog
Figure 9.33: Select Recovery Agents Dialog
Figure 9.34: Importing Certificate for Recovery Agent
Figure 9.35: Windows Warning Regarding Certificate Status
Figure 9.36: Default Domain Policy Encrypting File System Node
Figure 9.37: Key Backup from Microsoft Management Console
Figure 9.38: Export File Format for Certificate Only (Excludes Private Key)
Figure 9.39: Export File Format Including Private Key with Certificate
Figure 9.40: Certificate Export Wizard Successful Completion
Figure 9.41: Export Successful Notice
Figure 9.42: Create Secure Printer
Figure 9.43: SpoolDirectory in Registry
Figure 9.44: Startup and Recovery Options for Local Computer via Control Panel
Figure 9.45: Startup and Recovery Options

Chapter 10: Securing Network Clients

Figure 10.1: Enabling Syskey Encryption
Figure 10.2: Selecting Syskey Encryption Options
Figure 10.3: Confirmation of Syskey Success
Figure 10.4: Interactive Logons Using Local vs. Domain Accounts
Figure 10.5: Passport Sign-On through
Figure 10.6: Passport on
Figure 10.7: Creating a Remote Access Policy
Figure 10.8: Remote Access Authentication Methods
Figure 10.9: Remote Access Policy Conditions
Figure 10.10: Installing the Internet Authorization Service
Figure 10.11: The IAS Administrative Console
Figure 10.12: Configuring Permissions for IAS
Figure 10.13: Question 1 Illustration
Figure 10.14: Administrator Properties Sheet

Appendix A: Self Test Questions, Answers, and Explanations

Figure 2.22: Security Analysis Results
Figure 4.15: Figure for Question 1
Figure 5.22: IPSec Settings
Figure 5.23: Network Configuration
Figure 10.13: Question 1 Illustration
Figure 10.14: Administrator Properties Sheet

MCSE Designing Security for a Windows Server 2003 Network. Exam 70-298
MCSE Designing Security for a Windows Server 2003 Network: Exam 70-298
ISBN: 1932266550
EAN: 2147483647
Year: 2003
Pages: 122 © 2008-2017.
If you may any questions please contact us: