Flylib.com
Microsoft Windows Security Resource Kit
Microsoft Windows Security Resource Kit
ISBN: 0735621748
EAN: 2147483647
Year: 2003
Pages: 189
Authors:
Ben Smith
,
Brian Komar
BUY ON AMAZON
Cover
LOC
Foreword
Acknowledgments
Introduction
Chapter 1: Key Principles of Security
Understanding Risk Management
Understanding Security
Chapter 2: Understanding Your Enemy
Knowing Yourself
Possessing Detailed Documentation of Your Network
Understanding the Level of Organizational Support You Receive
Identifying Your Attacker
What Motivates Attackers?
Why Defending Networks Is Difficult
Chapter 3: Securing User Accounts and Passwords
Securing Accounts
Granting Rights and Permissions Using Groups
Securing Passwords
Best Practices
Additional Information
Chapter 4: Securing Active Directory Objects and Attributes
Understanding the Active Directory Schema
Configuring DACLs to Secure Active Directory Objects
Securing Active Directory Objects and Attributes
Best Practices
Additional Information
Chapter 5: Implementing Group Policy
Understanding Group Policy
Processing Group Policy Objects
Altering Group Policy Application
Managing Group Policy
Best Practices
Additional Information
Chapter 6: Designing Active Directory Forests and Domains for Security
Autonomy and Isolation in Active Directory
Designing Forests for Active Directory Security
Designing Domains for Active Directory Security
Designing DNS for Active Directory Security
Designing the Delegation of Authority
Best Practices
Additional Information
Chapter 7: Securing Permissions
Securing File and Folder Permissions
Using the Encrypting File System
Securing Registry Permissions
Best Practices
Additional Information
Chapter 8: Securing Services
Managing Service Permissions
Default Services in Windows 2000 and Windows XP
Best Practices
Additional Information
Chapter 9: Implementing TCPIP Security
Securing TCPIP
Using IPSec
Best Practices
Additional Information
Chapter 10: Securing Microsoft Internet Explorer 6 and Microsoft Office XP
Security Settings in Internet Explorer 6
Security Settings in Office XP
Best Practices
Additional Information
Chapter 11: Configuring Security Templates
Using Security Template Settings
How Security Templates Work
Default Security Templates
Creating Custom Security Templates
Best Practices
Additional Information
Chapter 12: Auditing Microsoft Windows Security Events
Determining Which Events to Audit
Managing the Event Viewer
Configuring Audit Policies
Monitoring Audited Events
Best Practices
Additional Information
Chapter 13: Securing Mobile Computers
Understanding Mobile Computers
Implementing Additional Security for Laptop Computers
Securing Wireless Networking in Windows XP
Best Practices
Additional Information
Chapter 14: Implementing Security for Domain Controllers
Threats to Domain Controllers
Implementing Security on Domain Controllers
Best Practices
Additional Information
Chapter 15: Implementing Security for DNS Servers
Threats to DNS Servers
Securing DNS Servers
Best Practices
Additional Information
Chapter 16: Implementing Security for Terminal Services
Threats to Terminal Services
Securing Terminal Services
Best Practices
Additional Information
Chapter 17: Implementing Security for DHCP Servers
Threats to DHCP Servers
Securing DHCP Servers
Best Practices
Additional Information
Chapter 18: Implementing Security for WINS Servers
Threats to WINS Servers
Securing WINS Servers
Best Practices
Additional Information
Chapter 19: Implementing Security for Routing and Remote Access
Remote Access Solution Components
Threats to Remote Access Solutions
Securing Remote Access Servers
Securing Remote Access Clients
Best Practices
Additional Information
Chapter 20: Implementing Security for Certificate Services
Threats to Certificate Services
Securing Certificate Services
Best Practices
Additional Information
Chapter 21: Implementing Security for Microsoft IIS 5.0
Implementing Windows 2000 Security
Configuring IIS Security
Using Tools to Secure IIS
Configuring the FTP Service
Best Practices
Additional Information
Chapter 22: Patch Management
Types of Patches
Development of a Hotfix
Patch Management in Six Steps
Best Practices
Additional Information
Chapter 23: Using Patch Management Tools
The Security Patch Bulletin Catalog
Windows Update
Automatic Updates
Microsoft Software Update Services
Microsoft Baseline Security Analyzer
SMS Software Update Services Feature Pack
Best Practices
Additional Information
Chapter 24: Using Security Assessment Tools
Assessing Security Configuration
Performing Security Assessments
Best Practices
Additional Information
Chapter 25: Assessing the Security of a Network
Types of Security Assessments
How to Conduct Security Assessments
Conducting Penetration Tests
Best Practices
Additional Information
Chapter 26: Planning for Incident Response
Creating an Incident Response Team
Defining Incident Response Policy
Creating a Communications Plan
Best Practices
Additional Information
Chapter 27: Responding to Security Incidents
Common Indicators of Security Incidents
Analyzing a Security Incident
Conducting Security Investigations
Implementing Countermeasures to a Security Incident
Recovering Services After a Security Incident
Conducting a Security Incident Post Mortem
Best Practices
Additional Information
Chapter 28: Understanding the Importance of Privacy
Defining Privacy
The Roots of Privacy Legislation
Formulating an Enterprise Privacy Strategy
Best Practices
Additional Information
Chapter 29: Defining Privacy for the Corporate Web Site
Defining a Privacy Statement
Platform for Privacy Preferences Project
Best Practices
Additional Information
Chapter 30: Deploying Privacy in the Enterprise
Selecting Applications Based on Their Privacy Features
Protecting the Privacy of Your Employees
Protecting the Privacy of Your Customers and Business Partners
Creating a Centralized Contact System
Best Practices
Additional Information
About the Authors
Microsoft Windows Security Resource Kit
ISBN: 0735621748
EAN: 2147483647
Year: 2003
Pages: 189
Authors:
Ben Smith
,
Brian Komar
BUY ON AMAZON
Strategies for Information Technology Governance
Structures, Processes and Relational Mechanisms for IT Governance
Assessing Business-IT Alignment Maturity
Managing IT Functions
Governing Information Technology Through COBIT
Governance in IT Outsourcing Partnerships
A+ Fast Pass
Domain 1 Installation, Configuration, and Upgrading
Domain 5 Printers
Domain 1 Operating System Fundamentals
Domain 2 Installation, Configuration, and Upgrading
Domain 3 Diagnosing and Troubleshooting
101 Microsoft Visual Basic .NET Applications
Working with the Microsoft Visual Basic .NET Language
Data Access
Working with the .NET Framework
Advanced .NET Framework
GDI+
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
Following a Methodology
Scripting Issues with iSQL*Plus
An Excel-Specific HTML Hack
Reloading the Data
The DESCRIBE Command
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Office Automation Executables
Office Add-Ins
Advanced Topic: Dynamic Host Items
Local Machine Deployment Without a Deployment Manifest
Creating Setup Packages
MPLS Configuration on Cisco IOS Software
Frame-Mode MPLS Configuration and Verification
VPN Categories
Static PE-CE Routing Overview, Configuration, and Verification
Case Study-Multi-Homed Inter-AS Provider Network
MPLS QoS Implementation
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies