Skip to Content
Microsoft® Windows® 2000 Security Handbook
book

Microsoft® Windows® 2000 Security Handbook

by Jeff Schmidt
August 2000
Intermediate to advanced
800 pages
21h 5m
English
Que
Content preview from Microsoft® Windows® 2000 Security Handbook

Reporting and Regimen

To most management, the most important part of penetration testing deals specifically with how the results are condensed into plans to rectify security holes. Concise technical detail is imperative here because it helps you explain specific problems and possible solutions. This is the reason you went on this big chase, and it should be the real meat of a follow-up report.

The other important thing to remember is that good reporting is key in procuring a new security budget and the chance to continue to perform regularly scheduled follow-up audits.

This portion of the chapter explains what should appear in a report and what should be left out. First, I help you define the levels of threat a hole could pose to your organization. ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Windows Server® 2008 Security Resource Kit

Windows Server® 2008 Security Resource Kit

Jesper M. Johansson
Windows Server® 2008 Active Directory® Resource Kit

Windows Server® 2008 Active Directory® Resource Kit

Conan Kezema Stan Riemer Mike Mulcare, Byron Wright, and Microsoft Active Directory

Publisher Resources

ISBN: 0789719991Purchase book