Index_I

 < Day Day Up > 



I

IAS (Internet Authentication Service), 264–265

identity spoofing attacks, 5, 42, 43

IIS (Internet Information Server) security, 242–286,

See also server

authenticating users on websites

ASP.NET forms-based authentication, 261–262

certificate authentication, 262–264, 263–264

IIS methods of, 258–261, 259

overview, 257–258

RADIUS authentication, 264–265

case study, 280–282

case study answers, 286

case study questions, 283–285

designing baselines based on business requirements

backing up server content, 247

conflicting requirements and, 247

design scenario, 248

enabling logging, 246

enabling used services only, 244

encrypting communications, 245

enforcing/verifying baselines, 248

evaluating account permissions, 245

filtering unused protocols, 245–246

installing Authorization Manager, 246–247

installing UrlScan, 246

overview, 242–243

questions to ask in, 243–244

removing sample applications, 246

removing unused components, 244

setting ACLs on web content, 244

updating server content/security, 247

designing for minimum required website services

Code Red worms and, 249–250

design scenario, 258

on IIS, 253–256, 254

overview, 244, 249

real world scenario, 249–250

for Web Service Extensions, 244, 256–257, 256

on Windows Server 2003, 250–253

exam essentials, 273–274

IIS authentication methods

anonymous access, 259

basic authentication, 259

design scenario, 261

digest authentication, 260

integrated Windows authentication, 260

Microsoft .NET Passport, 260

overview, 258

setting, 258, 259

IIS, defined, 242

key terms, 274

monitoring and auditing IIS

with audit policies, 268–269, 269

design scenario, 270

with HTTP.sys logging, 268

with IIS protocol logging, 266–268, 266–267

overview, 246, 265

overview, 3, 242, 272–273

review question answers, 278–279

review questions, 275–277

updating server security, 247

updating website/server content

design scenario, 272

using file share, 271

using File Transfer Protocol, 271

using FrontPage Server extensions, 272

overview, 247, 270

in-band tools. See remote networkusing

WebDAV, 271

information disclosure threats, 42, 43

infrastructure mode of communication, 99

infrastructure server baseline templates, 299

infrastructures. See network; PKIs

integrated Windows authentication, 260

intelligent UPSes, 394–396, 395–396

intermediate CA role, 207–208, 208

internal user accounts, 131, 133

Internet Authentication Service (IAS), 264–265

Internet connection security, 3

Internet Information Services dialog box, 253–254, 254, 255

Internet Options dialog box, 199, 199

Internet Printing service, 255

Internet Zone rules, 335

interoperability constraints, 21–22 , 124

IP address filtering,

See also filtering

defined, 79

enabling, 79–80, 80

machine authentication using, 374

IP infrastructures. See network

IP packet filtering

defined, 80

in demand-dial routing, 96

enabling, 80–82, 81

overview, 79

in remote management, 377

IPSec (IP Security) protocol,

See also network

configuring IPSec policies, 76–78, 76, 78

defined, 75

encrypting remote data transfers, 375

filters, applying in IIS, 245–246

using with L2TP, 75, 88–89

overview, 70, 71

issuing CA hierarchies, 209–210

issuing CA role, 207–208, 208



 < Day Day Up > 



MCSE. Windows Server 2003 Network Security Design Study Guide Exam 70-298
MCSE: Windows(r) Server 2003 Network Security Design Study Guide (70-298)
ISBN: 0782143296
EAN: 2147483647
Year: 2004
Pages: 168

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net