Summary
In this chapter, you learned about the security vulnerabilities presented by computer software and how code signing provides assurances that the software your users install is from a particular author. As long as you trust that author, you can trust the code, since the signature guarantees that it hasn’t been modified since written. You also learned how to configure Windows Server 2003 to prevent the installation of unsigned software, including unsigned device driver software. As more and more nefarious programmers seek to use software to compromise the security of business information systems, you will need to take stronger steps to protect your systems against unauthorized software. Digitally signed software and effective software restrictions provide the tools you need to protect your network.
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access