O'Reilly logo

Windows Forensics and Incident Recovery by Harlan Carvey

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Host Configuration

The host systems we are most concerned with are those computers that make up your internal infrastructure. These systems can include web or FTP servers (which may be located on the DMZ or the corporate LAN), file servers, application servers, domain controllers, and workstations. Any of these systems may be a target for attack and compromise, depending upon the configuration of the infrastructure and of the host systems themselves. In particular, any system exposed to the Internet will likely be a target for at least scanning and probing at some point. However, the exposure of these systems can be limited by the configuration of the infrastructure. Configuration of perimeter devices was addressed in the previous section in ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required