With the success of computer viruses like Slammer, security issues are now a top priority for Windows system administrators, right alongside day-to-day tasks such as setting up accounts and managing performance. If you use Windows 2003 Server at a small to medium-sized organization, or use Microsoft's Small Business Server, this thorough yet concise tutorial offers the hands-on advice you need for securing your network. Modern network operating systems include bundled services that range from traditional file and print sharing and Internet services to authentication, directory and remote access services each a potential security vulnerability as well as a capability. Securing Windows Server 2003 shows you how to put Windows security tools to work, and how to run the server's subsystems to protect users and resources. But that's just the beginning. Network security needs to be well thought-out, not treated as a fire drill when a threat occurs. This book focuses primarily on ways to plan and implement a secure operating environment. Microsoft security veteran Mike Danseglio uses real-world examples to show you how various security concepts relate to your own system, including:
File System Security
Group Policy and security templates
Running secure code
Public Key Certificates and Public Key Infrastructure
Smart Card technology
DHCP and DNS security
Internet Information Services security
Active Directory security
Remote access security
Sending secure email, and more
Many chapters include a debate, in which fictional protagonists discuss the pros and cons of a particular strategy or solution. These debates provide an objective look at competing methodologies, so you can select the solutions that best fit your network. Read this book cover to cover to create and implement a security plan, or use individual chapters as stand-alone lessons. Either way, Securing Windows Server 2003 will guide you safely through the morass of security threats.
Table of contents
Securing Windows Server 2003
1. Introduction to Windows Server 2003 Security
- What Is Security?
- What Is Windows Server 2003?
- Security Design in Windows Server 2003
- Security Features in the Windows Server 2003 Family
2. Basics of Computer Security
- Why Computer Security Is Important
- Security Enforcement Mechanisms
- POLA: The Principle of Least Access
- Key-Based Cryptography
- Authorization and Authentication
- Password Basics
- Network Security
- Keeping Your Eyes Open
3. Physical Security
- Identifying Physical Security Vulnerabilities
- Protecting Physical Assets
- Holistic Security: Best Practices
4. File System Security
- Protecting Files with NTFS File Permissions
Protecting Data with the Encrypting File System
- How EFS Works
- Benefits of the Encrypting File System
- Drawbacks of the Encrypting File System
- Using the Encrypting File System Correctly
- Example: Ensuring New Files are Encrypted
- Example: Managing the Private Key to Ensure Maximum Protection
- Example: Using cipher.exe to Remove Old Unencrypted Data
- Example: Storing Shared Encrypted Files on a Windows Server 2003 File Server
- Configuring EFS with Group Policy
- Protecting System Information with Syskey
5. Group Policy and Security Templates
- What Is Group Policy?
- How Group Policy Works
- How Do Security Templates Work?
Using Group Policy to Enforce Security
- Controlling Password Policies with Group Policy
- Configuring the Desktop with Group Policy
- Configuring Auditing with Group Policy
Using Security Templates to Deploy Secure Configurations
- Using Built-in Templates
- Analyzing Your Security Configuration
- Creating Your Own Security Template
- Deploying the Security Template with Group Policy
- Using Security Templates Effectively
6. Running Secure Code
- Identifying Secure Code
- Driver Signing
- Software Restriction Policies
- LAN Manager and NTLM
8. IP Security
- What Is IP Security?
- How Does IPSec Work?
- Microsoft’s Implementation of IPSec in Windows Server 2003
Using IPSec Correctly
- Example: Woodgrove Bank Corporate Accounts Payable
- Verifying IPSec Operation
- Example: Restricting a Server to Highly Secure IPSec Communication
- Example: Using IPSec with a Non-Microsoft Client
9. Certificates and Public Key Infrastructure
- What Are Certificates?
- What Do I Do with Certificates?
- What Is a Certification Authority?
- Deciding Between Public and Private Certification Authorities
- Implementing a Public PKI
- Planning Your Private Certification Hierarchy
Implementing a Private Certification Hierarchy
- Create a PKI Deployment Plan
- Construct Certificate Policy and Certificate Practice Statement
- Install the Root Certification Authority
- Install Intermediate and Issuing CAs
- Configure Certificate Templates for Desired Certificates
- Configure the Issuing CA
- Configure Autoenrollment for Windows XP
- Test Desired Applications
- Maintaining Your Hierarchy
- 10. Smart Card Technology
11. DHCP and DNS Security
- What Is DNS?
- Using DNS Securely
- DNS and DHCP Together
12. Internet Information Services Security
- What Is IIS?
- How Does IIS Work?
- Using IIS Securely
13. Active Directory Security
- What Is Active Directory?
- Structural Components of Active Directory
- Domain Controllers
- Default Security Through GPOs
Providing Security for Domains
- Users, Groups, and Computers
- Administrative Groups
- Administrator Accounts
- Object Security and ACLs
- Example: Configuring Domain User Accountsto Access Resources
- Account Policies
- Providing Security for Forests
- Providing Security for Active Directory Objects
- Providing Security for Domain Controllers
14. Remote Access Security
- What Is Remote Access?
- Controlling Access
- Authentication and Encryption Protocols
- Virtual Private Networks
- Example Implementations for Remote Access
15. Auditing and Ongoing Security
- Security Policies and Procedures
- Operating System Updates
A. Sending Secure Email
- What Is Secure Email?
- How Does Secure Email Work?
- Considerations for Secure Email
- Secure Email Implementation
- Title: Securing Windows Server 2003
- Release date: November 2004
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9780596006853
You might also like
Designing Data-Intensive Applications
Data is at the center of many challenges in system design today. Difficult issues need to …
The subject of security never strays far from the minds of IT workers, for good reason. …
Kerberos: The Definitive Guide
Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful …
Clean Code: A Handbook of Agile Software Craftsmanship
Even bad code can function. But if code isn’t clean, it can bring a development organization …