Abstract
Preface 1. Introduction to Windows Server 2003 Security What Is Security? What Is Windows Server 2003? Security Design in Windows Server 2003 Security Features in the Windows Server 2003 Family 2. Basics of Computer Security Why Computer Security Is Important Security Enforcement Mechanisms POLA: The Principle of Least Access Key-Based Cryptography Authorization and Authentication Password Basics Network Security Keeping Your Eyes Open 3. Physical Security Identifying Physical Security Vulnerabilities Protecting Physical Assets Holistic Security: Best Practices 4. File System Security Protecting Files with NTFS File Permissions Protecting Data with the Encrypting File System Protecting System Information with Syskey 5. Group Policy and Security Templates What Is Group Policy? How Group Policy Works How Do Security Templates Work? Using Group Policy to Enforce Security Using Security Templates to Deploy Secure Configurations 6. Running Secure Code Identifying Secure Code Driver Signing Software Restriction Policies 7. Authentication LAN Manager and NTLM Kerberos 8. IP Security What Is IP Security? How Does IPSec Work? Microsoft's Implementation of IPSec in Windows Server 2003 Using IPSec Correctly 9. Certificates and Public Key Infrastructure What Are Certificates? What Do I Do with Certificates? What Is a Certification Authority? Deciding Between Public and Private Certification Authorities Implementing a Public PKI Planning Your Private Certification Hierarchy Implementing a Private Certification Hierarchy Maintaining Your Hierarchy 10. Smart Card Technology What Are Smart Cards? Using Smart Cards 11. DHCP and DNS Security DHCP DNS DNS and DHCP Together 12. Internet Information Services Security What Is IIS? How Does IIS Work? Using IIS Securely 13. Active Directory Security What Is Active Directory? Structural Components of Active Directory Domain Controllers Default Security Through GPOs Providing Security for Domains Providing Security for Forests Providing Security for Active Directory Objects Providing Security for Domain Controllers 14. Remote Access Security What Is Remote Access? Controlling Access Authentication and Encryption Protocols Virtual Private Networks Example Implementations for Remote Access 15. Auditing and Ongoing Security Security Policies and Procedures Auditing Operating System Updates Appendix: Sending Secure Email Index
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.