O'Reilly logo

Thor's Microsoft Security Bible by Timothy Thor Mullen

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. Internet Information Server (IIS) Authentication and Authorization Models, and Locking Down File Access with EFS and WebDAV
Information in this chapter:
▪ RSA and AES
▪ Building the Web Application Structure
▪ Security in Depth
▪ Securing Access with WebDAV
▪ Conclusion
Products, Tools, and Methods:
▪ Internet Information Server (IIS)
▪ WebDAV
▪ New Technology File System (NTFS)
▪ Encrypting File System (EFS)
▪ Custom Application Pools
This chapter explains the different authentication and authorization mechanisms and models one can deploy in IIS, and goes on to use EFS as an example of how to substantially increase the security posture of remotely accessible files.
Keywords: IIS EFS WebDAV

Introduction

Microsoft's Encrypting File System technology ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required