Chapter 21. Implementing Security

Physical Security 725

Using Templates to Implement Security Policies 727

Using Security Configuration and Analysis 734

Enabling Authentication 739

Implementing Access Control 745

Managing Certificates 748

Using Internet Protocol Security Policies 752

Securing Local Data 761

Auditing 766

Using Microsoft Baseline Security Analyzer 769

What to Do When Hacked 769

Summary 770

In the realm of computer security, one of the most common and critical mistakes administrators make is to confuse the presence of security features with a secure system. It’s not enough to piece together protocols, methods, and algorithms into a collage of security. In such environments, the weakest link usually goes unnoticed until it’s too late. To be ...

Get Microsoft® Windows Server 2003: Administrator’s Companion now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.