Book description
Thor's Microsoft Security Bible provides a one-stop-shop for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. Written by world-renowned security expert Timothy Thor Mullen, the book presents a fascinating collection of practical and immediately implementable Microsoft security techniques, processes and methodologies uniquely illustrated through real-world process examples.
This book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, and application specific security (IIS, SQL, Active Directory, etc.). It also includes new, never-before-published security tools complete with source code; detailed technical information on security processes for all major Microsoft applications; unique project-based storytelling delivery, combining multiple security techniques and methods together for real-world solutions to security challenges in actual business use cases; reference-style content for access to specific application security techniques and methods; actual author opinion and guidance as not only HOW to go about security particular applications, but WHY to do so.
This book will be of interest to systems and network administrators, IT managers, security and network engineers, and database administrators.
- Named the 2011 Best Systems Administration Book by InfoSec Reviews
- Detailed technical information on security processes for all major Microsoft applications
- Unique project-based "storytelling" delivery, combining multiple security techniques and methods together for real-world solutions to security challenges in actual business use cases
- Reference-style content for access to specific application security techniques and methods
- Actual author opinion and guidance as not only HOW to go about security particular applications, but WHY to do so
Table of contents
- Cover image
- Table of Contents
- Front matter
- Copyright
- About the Author
- Introduction
- Chapter 1. Securely Writing Web Proxy Log Data to SQL Server and Programmatically Monitoring Web Traffic Data in Order to Automatically Inject Allow/Deny Rules into TMG
- Chapter 2. Internet Information Server (IIS) Authentication and Authorization Models, and Locking Down File Access with EFS and WebDAV
- Chapter 3. Analyzing and Blocking Malicious Traffic Based on Geolocation
- Chapter 4. Creating an Externally Accessible Authenticated Proxy in a Secure Manner
- Chapter 5. The Creation and Maintenance of Low-Privileged Service Users (with a Focus on SQL)
- Chapter 6. Remote Security Log Collection in a Least Privilege Environment
- Chapter 7. Securing RDP
- Appendix A. List of Acronyms
- Appendix B. Full List of Server 2008 Logs via the WEVTUTIL Tool
- Index
Product information
- Title: Thor's Microsoft Security Bible
- Author(s):
- Release date: July 2011
- Publisher(s): Syngress
- ISBN: 9781597495738
You might also like
book
Microsoft® Windows® Security: Essentials
Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially …
book
Windows Server 2003 Security: A Technical Reference
"Once again, Roberta Bragg proves why she is a leading authority in the security field! It's …
book
Windows Forensic Analysis Toolkit, 4th Edition
Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows …
book
Windows 10 for Enterprise Administrators
Tag line About This Book Learn the art of configuring, deploying, managing and securing Windows 10 …