Flylib.com
List of Figures
Previous page
Table of content
Next page
< Day Day Up >
Chapter 2: Identifying and Designing for Potential Security Threats
Figure 2.1: Telnet session to Exchange Server 2003
Figure 2.2: Telnet Session to IIS 4.0
Figure 2.3: Telnet Session to IIS 6.0
Figure 2.4: The Event Viewer
Figure 2.5: An example of the net share output
Figure 2.6: Task Manager
Figure 2.7: Tasklist output
Figure 2.8: A bastion host
Figure 2.9: A three-pronged configuration
Figure 2.10: A back-to-back configuration
Chapter 3: Designing Network Infrastructure Security
Figure 3.1: The usual place for SSL in a network infrastructure.
Figure 3.2: Enabling PPP encryption on Windows Server 2003
Figure 3.3: The policy settings for IPSec on Windows Server 2003
Figure 3.4: Creating IPSec rules on Windows Server 2003
Figure 3.5: Filtering IP addresses using the IP Address And Domain Name Restrictions dialog box
Figure 3.6: Filtering IP packets using the TCP/IP Filtering dialog box
Figure 3.7: Selecting the Store Password Using Reversible Encryption option
Figure 3.8: Various demand-dial connection types that can be used for the demand-dial interface
Figure 3.9: Setting up caller ID and callback.
Figure 3.10: Configuring WEP keys in Windows Server 2003
Figure 3.11: The wireless network policy settings container
Figure 3.12: The Wireless Networks tab on the wireless network’s Properties dialog box
Figure 3.13: Enabling 802.1x on a client
Figure 3.14: Enabling PEAP for 802.1x authentication
Figure 3.15: Enabling PEAP on Windows Server 2003
Figure 3.16: Network layout with an open access point
Chapter 4: Designing an Authentication Strategy for Active Directory
Figure 4.1: LC4 password recovery
Figure 4.2: Transitive trust model
Figure 4.3: User Rights Assignment
Chapter 5: Designing an Access Control Strategy for Network Resources
Figure 5.1: The
net share
command
Figure 5.2: Viewing shared folders in Computer Management
Figure 5.3: The Advanced Attributes dialog box
Figure 5.4: The Registry Editor
Chapter 6: Designing a Public Key Infrastructure with Certificate Services
Figure 6.1: How PKI works when applied to SSL
Figure 6.5: The Details tab of the Certificate dialog box
Figure 6.2: The Content tab of the Internet Options dialog box
Figure 6.3: The Trusted Root Certification Authorities tab of the Certificates dialog box
Figure 6.4: The General tab of the Certificate dialog box
Figure 6.6: Warning in Internet Explorer
Figure 6.7: Client requesting certificate from the server
Figure 6.8: Client verifies certificate signature and uses public key to encrypt response.
Figure 6.9: An encrypted response with the session key is sent to the server.
Figure 6.10: A two-tier hierarchy
Figure 6.11: A three-tier hierarchy
Figure 6.12: Web-based certificate administration
Figure 6.13: The Automatic Certificate Request Setup Wizard
Figure 6.14: The automatic certificate request settings in the Group Policy Editor
Figure 6.15: The Autoenroll setting on the Security tab
Figure 6.16: The Security tab of a CA server Properties dialog box
Figure 6.17: The Certificate Managers Restrictions tab
Chapter 7: Designing Security for Internet Information Services
Figure 7.1: Selecting the IIS services to install through Windows Component Wizard’s Internet Information Services (IIS) dialog box
Figure 7.2: Prohibiting or Allowing Web Service Extensions.
Figure 7.3: Setting authentication mechanisms in the Authentication Methods dialog box
Figure 7.4: Requiring client certificates to access the website
Figure 7.5: Mapping your certification using the Account Mappings dialog box
Figure 7.6: Enabling logging through the Web Site tab
Figure 7.7: The Advanced tab of the Logging Properties dialog box is where you can configure additional information to log.
Figure 7.8: Configuring the audit policy
Chapter 8: Designing Security for Servers with Specific Roles
Figure 8.1: Security Templates MMC snap-in
Figure 8.2: Security Templates World Wide Web Publishing Service properties
Figure 8.3: User Rights Assignment
Figure 8.4: Do Not Store LAN Manager Hash Value On Next Password Change Setting dialog
Figure 8.5: Sample OU design for Group Policy
Figure 8.6: DNS zone SRV records
Figure 8.7: Zone Transfers tab
Figure 8.8: Dynamic updates via the General tab
Figure 8.9: Proper DNS caching process
Figure 8.10: Compromised process
Figure 8.11: DNS server properties
Chapter 9: Designing an Infrastructure for Updating Computers
Figure 9.1: Example OU hierarchy for application of Group Policy based on operating system
Figure 9.2: Example OU hierarchy for application of Group Policy based on computer type
Figure 9.3: OU Model with security groups for computer function.
Figure 9.4: Computer Properties dialog box
Figure 9.5: Setting the default security level
Figure 9.6: The Enforcement Properties dialog box
Figure 9.7: The Designated File Types Properties dialog box
Figure 9.8: The Trusted Publishers Properties dialog box
Figure 9.9: The New Hash Rule dialog box
Figure 9.10: Administrative templates
Figure 9.11: The Explain tab for the Remove File Menu From Windows Explorer Properties dialog box
Figure 9.12: The Do Not Allow Windows Messenger To Be Run Properties dialog box
Figure 9.13: Software Update Services administrative website
Figure 9.14: The Default Web Site Properties dialog box
Figure 9.15: The Synchronize Server page
Figure 9.16: SUSAdmin Approve Updates page
Figure 9.17: The Configure Automatic Updates Properties dialog box
Figure 9.18: Specify Intranet Microsoft Update Service Location
Figure 9.19: The Automatic Updates tab
Figure 9.20: MBSA manual scan interface
Figure 9.21: MBSA security report
Chapter 10: Designing Secure Network Management Infrastructure
Figure 10.1: The MMC console
Figure 10.2: Enabling Remote Desktop for Administration
Figure 10.3: Warning about users without a password
Figure 10.4: Setting the encryption level for the RDP protocol
Figure 10.5: The Remote tab of the System Properties dialog box
Figure 10.6: The Remote Assistance Settings dialog box
Figure 10.7: Telnet to a Windows Server 2003 machine
Figure 10.8: Special Administration Console
Figure 10.9: Direct serial connection
Figure 10.10: Remote EMS through a modem
Figure 10.11: Using a terminal concentrator
Figure 10.12: Intelligent UPS setup
< Day Day Up >
Previous page
Table of content
Next page
MCSE: Windows(r) Server 2003 Network Security Design Study Guide (70-298)
ISBN: 0782143296
EAN: 2147483647
Year: 2004
Pages: 168
Authors:
Brian Reisman
,
Mitch Ruebush
,
Sybex
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Making Programs Think Branching Statements and Subroutines
More Power to the Numbers Data Sequences and Arrays
The Art of Using Animated Sprites for 2D Games
Programming the Keyboard, Mouse, and Joystick
Playing Some Tunes CD Audio, MIDI and MP3 Music
Introducing Microsoft Office InfoPath 2003 (Bpg-Other)
Presenting InfoPath 2003 SP-1
Adding Basic Controls and Lists
Validating Form Data
Adding Views to a Template
Designing InfoPath Web Service Clients
Cisco IOS Cookbook (Cookbooks (OReilly))
Filtering Routes with RIP
Implementing Standards-Based Per-Hop Behavior
Debugging Dial Backup
Using SNMP to Copy a New IOS Image
IP Precedence, TOS, and DSCP Classifications
AutoCAD 2005 and AutoCAD LT 2005. No Experience Required
Gaining Drawing Strategies: Part 1
Grouping Objects into Blocks
Working with Hatches and Fills
Dimensioning a Drawing
Managing External References
Junos Cookbook (Cookbooks (OReilly))
Using a Firewall Filter to Protect SNMP Access
Creating a Firewall Filter that Negates a Match
Reordering Firewall Terms
Authenticating BGP Peers
Introduction
Extending and Embedding PHP
Reference Counting
Summary
Returning Values
Constants
Resources/Lists
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies