O'Reilly logo

Windows Server® 2008 Administrator’s Companion by Charlie Russel and Sharon Crawford

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 23. Implementing Security

If you look back on the history of major security events, many have shaped the way Microsoft engineers software. Two stand out as pivotal:

  • The Code Red/Nimba worm

  • The MS Blaster worm

In this chapter, we’ll cover the security features of Windows Server 2008 that would have prevented these two attacks, and show you how to implement security to help protect your network from the next attack. As you implement security on your network, however, it’s essential to remember that securing a network is not an event or an action—it’s a goal. A goal that requires an ongoing process ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required