reklama - zainteresowany?

Windows Server 2003 Security Cookbook. Security Solutions and Scripts for System Administrators - Helion

Windows Server 2003 Security Cookbook. Security Solutions and Scripts for System Administrators
ebook
Autor: Mike Danseglio, Robbie Allen
ISBN: 978-0-5965-5269-5
stron: 528, Format: ebook
Data wydania: 2005-12-16
Księgarnia: Helion

Cena książki: 123,55 zł (poprzednio: 158,40 zł)
Oszczędzasz: 22% (-34,85 zł)

Dodaj do koszyka Windows Server 2003 Security Cookbook. Security Solutions and Scripts for System Administrators

Tagi: Bezpieczeństwo systemów | Inne | Windows Server

In the last few years, security has become a hot-button issue for IT organizations of all sizes. Accordingly, many of the security features that were either optional or suspect in Windows 2000 have become solid, effective fixtures in Windows Server 2003-making it the most secure operating system Microsoft has ever produced. That is, if you know how to configure it properly.

The Windows Server 2003 Security Cookbook wants to make sure that you do know how. Picking up right where its predecessor, the Windows Server Cookbook, left off, this desktop companion is focused solely on Windows Server security. It teaches you how to perform important security tasks in the Windows Server 2003 OS using specific and adaptable recipes. Each recipe features a brief description of the problem, a step-by-step solution, and then a discussion of the technology at work. Whenever possible, the authors even tell you where to look for further information on a recipe.

The book is written in a highly modular format, with each chapter devoted to one or more technologies that Windows Server 2003 provides. This approach allows you to look up a task or scenario that you want to accomplish, find that page, and read that particular recipe only. Topics include:

  • System preparation and administration
  • Protecting the computer at the TCP/IP level
  • Applying security options to Active Directory
  • Improving security on domain controllers
  • Securing DHCP controllers
  • Encrypting and signing network traffic using IPSec
  • Patch management

If you're an intermediate or advanced system administrator who wants to feel secure when deploying Windows Server 2003 and its related services, then you don't want to be without the Windows Server 2003 Security Cookbook.

Dodaj do koszyka Windows Server 2003 Security Cookbook. Security Solutions and Scripts for System Administrators

 

Osoby które kupowały "Windows Server 2003 Security Cookbook. Security Solutions and Scripts for System Administrators", wybierały także:

  • Managing Security with Snort & IDS Tools
  • Linux Security Cookbook

Dodaj do koszyka Windows Server 2003 Security Cookbook. Security Solutions and Scripts for System Administrators

Spis treści

Windows Server 2003 Security Cookbook. Security Solutions and Scripts for System Administrators eBook -- spis treści

  • Windows Server 2003 Security Cookbook
    • SPECIAL OFFER: Upgrade this ebook with OReilly
    • Preface
      • Audience
      • About This Book
      • Whats in This Book?
      • Assumptions This Book Makes
      • Conventions Used in This Book
      • Using Code Examples
      • Safari Enabled
      • Comments and Questions
      • Acknowledgments
    • 1. Getting Started
      • 1.1. What Is Security?
        • Security Design in Windows Server 2003
      • 1.2. Approach to the Book
        • So Many Ways to Do It!
      • 1.3. Where to Find the Tools
        • Running Tools with Alternate Credentials
      • 1.4. Group Policy Notes
      • 1.5. Programming Notes
        • Running Scripts Using Alternate Credentials
          • WMI
          • ADSI
          • ADO
        • Defining Variables and Error Checking
        • Using Command-Line Options in a Script
        • Writing the Output of a Script to a File
        • Sending the Output of a Script in Email
        • Reading and Writing from Excel
      • 1.6. Replaceable Text
      • 1.7. Reporting Security Issues to Microsoft
      • 1.8. Where to Find More Information
        • Command-Line Tools
        • Microsoft Knowledge Base
        • Microsoft Technet
        • Microsoft Developers Network
        • Web Sites
        • Newsgroups
        • Mailing Lists
        • Books
        • Magazines
    • 2. System Preparation and Administration
      • 2.1. Introduction
        • Using a Graphical User Interface
        • Using a Command-Line Interface
        • Using Group Policy
      • 2.1. Creating a Reference Installation
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 2.2. Renaming the Domain Administrator Account
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
          • Using a graphical user interface
        • See Also
      • 2.3. Renaming the Local Administrator Accounts
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using Group Policy
          • Using VBScript
        • Discussion
          • Using Group Policy
        • See Also
      • 2.4. Disabling the Local Administrator Accounts
        • Problem
        • Solution
          • Using a graphical user interface
          • Using Group Policy
          • Using VBScript
        • Discussion
        • See Also
      • 2.5. Renaming the Guest Account
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 2.6. Logging in as a Non-Administrator
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
          • Using a graphical user interface
          • Using a command-line interface
        • See Also
      • 2.7. Configuring Internet Explorer Enhanced Security Configuration
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 2.8. Preventing Automatic Installation of New Hardware Drivers
        • Problem
        • Solution
          • Using Group Policy
        • Discussion
        • See Also
      • 2.9. Protecting Against Modified Device Drivers
        • Problem
        • Solution
          • Using Group Policy
        • Discussion
          • Using the Registry
        • See Also
      • 2.10. Encrypting the SAM
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 2.11. Locking the Console
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
      • 2.12. Enabling Screensaver Locking
        • Problem
        • Solution
          • Using a graphical user interface
          • Using Group Policy
          • Using the Registry
          • Using VBScript
        • Discussion
        • See Also
    • 3. TCP/IP
      • 3.1. Introduction
        • Using a Graphical User Interface
        • Using a Command-Line Interface
      • 3.1. Displaying the Status of TCP Ports
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • See Also
      • 3.2. Disabling NetBIOS over TCP/IP
        • Problem
        • Solution
          • Using a graphical user interface
          • Using VBScript
        • Discussion
        • See Also
      • 3.3. Disabling File and Printer Sharing for MicrosoftNetworks
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
      • 3.4. Enabling SYN Flood Protection
        • Problem
        • Solution
          • Using the Registry
        • Discussion
        • See Also
      • 3.5. Disabling Source Routing
        • Problem
        • Solution
          • Using the Registry
        • Discussion
        • See Also
      • 3.6. Disabling Router Discovery
        • Problem
        • Solution
          • Using the Registry
        • Discussion
      • 3.7. Configuring TCP/IP Filtering
        • Problem
        • Solution
          • Using a graphical user interface
          • Using VBScript
        • Discussion
      • 3.8. Enabling and Configuring Windows Firewall
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
          • Using a graphical user interface
          • Using a command-line interface
        • See Also
    • 4. Encrypting File System
      • 4.1. Introduction
        • Using a Graphical User Interface
        • Using a Command-Line Interface
        • Using Group Policy
        • Using the Registry
        • Using VBScript
      • 4.1. Enabling EFS Without a Recovery Agent
        • Problem
        • Solution
          • Using Group Policy
        • Discussion
        • See Also
      • 4.2. Configuring a Recovery Agent
        • Problem
        • Solution
          • Using Group Policy
        • Discussion
        • See Also
      • 4.3. Configuring Server-Based EFS
        • Problem
        • Solution
          • Using a graphical user interface
          • Using VBScript
        • Discussion
        • See Also
      • 4.4. Encrypting a File
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
          • Using a graphical user interface
        • See Also
      • 4.5. Encrypting a Folder
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
          • Using a graphical user interface
          • Using a command-line interface
        • See Also
      • 4.6. Enabling EFS Context Menus
        • Problem
        • Solution
          • Using the Registry
        • Discussion
        • See Also
      • 4.7. Viewing Users and Recovery Agents
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
          • Using a command-line interface
        • See Also
      • 4.8. Moving or Copying an Encrypted File or Folder
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 4.9. Changing Encryption Algorithms
        • Problem
        • Solution
          • Using the Registry
        • Discussion
        • See Also
      • 4.10. Encrypting Offline Files
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 4.11. Sharing Encrypted Files
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface or VBScript
        • Discussion
        • See Also
      • 4.12. Backing Up EFS Keys
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
          • Using a graphical user interface
          • Using a command-line interface
        • See Also
      • 4.13. Using a Recovery Agent
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface or VBScript
        • Discussion
        • See Also
      • 4.14. Removing Unused Data
        • Problem
        • Solution
          • Using a command-line interface
        • Discussion
        • See Also
    • 5. Active Directory
      • 5.1. Introduction
        • Using a Graphical User Interface
        • Using a Command-Line Interface
      • 5.1. Enabling SSL/TLS
        • Problem
        • Solution
        • Discussion
        • See Also
      • 5.2. Encrypting LDAP Traffic with SSL or TLS; Digital Signing
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 5.3. Using the Delegation of Control Wizard
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 5.4. Customizing the Delegation of Control Wizard
        • Problem
        • Solution
        • Discussion
        • See Also
      • 5.5. Using the Default ACL for an Objectclass
        • Problem
        • Solution
        • Discussion
        • See Also
      • 5.6. Enabling List Object Access Mode
        • Problem
        • Solution
          • Using a graphical user interface
          • Using VBScript
        • Discussion
        • See Also
      • 5.7. Modifying the ACL on Administrator Accounts
        • Problem
        • Solution
        • Discussion
        • See Also
      • 5.8. Viewing and Purging Your Kerberos Tickets
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 5.9. Resetting the Directory Service Restore ModeAdministrator Password
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 5.10. Implementing Role-Based Access Control
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
          • Using a graphical user interface
        • See Also
      • 5.11. Displaying Delegated Rights
        • Problem
        • Solution
          • Using a command-line interface
        • Discussion
          • Using a command-line interface
        • See Also
      • 5.12. Removing Delegated Rights
        • Problem
        • Solution
          • Using a command-line interface
        • Discussion
        • See Also
    • 6. Group Policy
      • 6.1. Introduction
        • GPO Scope and Architecture
        • Managing GPOs
      • 6.1. Creating a GPO
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
          • Using VBScript
        • See Also
      • 6.2. Copying a GPO
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
          • Using VBScript
        • See Also
      • 6.3. Deleting a GPO
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
          • Using VBScript
        • See Also
      • 6.4. Modifying the Settings of a GPO
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface or VBScript
        • Discussion
        • See Also
      • 6.5. Creating a GPO Link to an OU
        • Problem
        • Solution
          • Using a graphical user interface
          • Using VBScript
        • Discussion
          • Using VBScript
        • See Also
      • 6.6. Blocking Inheritance of GPOs on an OU
        • Problem
        • Solution
          • Using a graphical user interface
          • Using VBScript
        • Discussion
          • Using VBScript
        • See Also
      • 6.7. Forcing a GPO Application
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 6.8. Applying a Security Filter to a GPO
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
          • Using VBScript
        • See Also
      • 6.9. Refreshing GPO Settings on a Computer
        • Problem
        • Solution
          • Using a command-line interface
        • Discussion
        • See Also
      • 6.10. Configuring the Group Policy Refresh Interval
        • Problem
        • Solution
          • Using Group Policy
        • Discussion
        • See Also
      • 6.11. Installing Applications with a GPO
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 6.12. Assigning Logon/Logoff and Startup/ShutdownScripts in a GPO
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 6.13. Configuring Password Policies
        • Problem
        • Solution
          • Using Group Policy
        • Discussion
        • See Also
      • 6.14. Configuring Account Lockout Policies
        • Problem
        • Solution
          • Using Group Policy
        • Discussion
        • See Also
      • 6.15. Configuring Kerberos Policies
        • Problem
        • Solution
          • Using Group Policy
        • Discussion
        • See Also
      • 6.16. Configuring User Rights Assignment
        • Problem
        • Solution
          • Using Group Policy
        • Discussion
          • Using Group Policy
        • See Also
      • 6.17. Configuring Security Options
        • Problem
        • Solution
          • Using Group Policy
        • Discussion
        • See Also
      • 6.18. Configuring Time Synchronization Settings
        • Problem
        • Solution
          • Using Group Policy
        • Discussion
        • See Also
      • 6.19. Using Restricted Groups
        • Problem
        • Solution
          • Using Group Policy
        • Discussion
          • Using Group Policy
        • See Also
      • 6.20. Configuring Service Parameters
        • Problem
        • Solution
          • Using Group Policy
        • Discussion
        • See Also
      • 6.21. Configuring Registry Permissions
        • Problem
        • Solution
          • Using Group Policy
        • Discussion
          • Using Group Policy
        • See Also
      • 6.22. Configuring File Permissions
        • Problem
        • Solution
          • Using Group Policy
        • Discussion
          • Using Group Policy
        • See Also
    • 7. Security Templates
      • 7.1. Introduction
        • Benefits of Security Templates
        • Using a Graphical User Interface
        • Using a Command-Line Interface
        • Using VBScript
      • 7.1. Using Default Security Templates
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
          • Using a graphical user interface
        • See Also
      • 7.2. Creating a Security Template
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
          • Using a graphical user interface
        • See Also
      • 7.3. Changing Account Policies
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 7.4. Changing Local Policies
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 7.5. Changing Event Log Settings
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 7.6. Making Group Membership Changes
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 7.7. Disabling Unwanted System Services
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 7.8. Modifying Registry Permissions
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
          • Using a graphical user interface
        • See Also
      • 7.9. Modifying Filesystem Permissions
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
          • Using a graphical user interface
        • See Also
      • 7.10. Exporting Security Templates
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 7.11. Importing Security Templates
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 7.12. Verifying Template Application
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface or VBScript
        • Discussion
        • See Also
      • 7.13. Analyzing a Security Configuration
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
          • Using a graphical user interface
        • See Also
      • 7.14. Testing Template Compatibility
        • Problem
        • Solution
        • Discussion
        • See Also
    • 8. Domain Controllers
      • 8.1. Introduction
        • Using a Graphical User Interface
        • Using Group Policy
      • 8.1. Disabling LM Hash Storage
        • Problem
        • Solution
          • Using Group Policy
          • Using the Registry
        • Discussion
        • See Also
      • 8.2. Removing Stored LM Hashes
        • Problem
        • Solution
          • Step 1: set the password history value to zero
          • Step 2: force all user accounts to change their password
          • Step 3: set the password history back to its original value
        • Discussion
        • See Also
      • 8.3. Requiring NTLM Authentication
        • Problem
        • Solution
          • Using Group Policy
          • Using the Registry
        • Discussion
        • See Also
      • 8.4. Using Syskey to Thwart Offline Attacks
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
          • Using a graphical user interface
        • See Also
      • 8.5. Signing LDAP Communications
        • Problem
        • Solution
          • Using Group Policy
        • Discussion
        • See Also
      • 8.6. Hardening Domain Controllers with SecurityTemplates
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
    • 9. User and Computer Accounts
      • 9.1. Introduction
        • Using a Graphical User Interface
        • Using a Command-Line Interface
      • 9.1. Enabling and Disabling a User
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 9.2. Finding Disabled Users
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 9.3. Unlocking a User
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 9.4. Troubleshooting Account Lockout Problems
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 9.5. Viewing and Modifying the Account Lockout andPassword Policies
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • See Also
      • 9.6. Setting a User's Account to Expire
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 9.7. Setting a User's Password
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 9.8. Forcing a User Password Change at Next Logon
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
      • 9.9. Preventing a User's Password from Expiring
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 9.10. Setting a User's Account Options
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 9.11. Finding a User's Last Logon Time
        • Problem
        • Solution
          • Using a graphical user interface
          • Using VBScript
        • Discussion
      • 9.12. Restricting a User's Logon Hours and Workstations
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 9.13. Resetting a Computer Account
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 9.14. Finding Inactive or Unused Computer Accounts
        • Problem
        • Solution
          • Using a command-line interface
          • Using Perl
        • Discussion
          • Using a command-line interface
          • Using Perl
        • See Also
      • 9.15. Trusting a Computer Account for Delegation
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
    • 10. Rights and Permissions
      • 10.1. Introduction
        • Using a Graphical User Interface
        • Using a Command-Line Interface
      • 10.1. Using Standard File Permissions
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 10.2. Using Special File Permissions
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 10.3. Determining File Permission Inheritance
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
          • Using a command-line interface
        • See Also
      • 10.4. Using Deny Permission
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
          • Using a graphical user interface
          • Using a command-line interface
        • See Also
      • 10.5. Determining Effective Permissions
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
          • Using a graphical user interface
          • Using a command-line interface
        • See Also
      • 10.6. Determining File Ownership
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 10.7. Modifying File Ownership
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 10.8. Restoring Default Permissions
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 10.9. Hardening Registry Permissions
        • Problem
        • Solution
          • Using a graphical user interface
          • Using Group Policy
          • Using a command-line interface
        • Discussion
        • See Also
      • 10.10. Restricting Remote Access to the Registry
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
          • Using a graphical user interface
        • See Also
    • 11. Dynamic Host Configuration Protocol
      • 11.1. Introduction
        • Using a Graphical User Interface
        • Using a Command-Line Interface
        • Using VBScript
      • 11.1. Authorizing a DHCP Server
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
          • Using a graphical user interface
          • Using a command-line interface
        • See Also
      • 11.2. Detecting Rogue DHCP Servers
        • Problem
        • Solution
        • Discussion
        • See Also
      • 11.3. Restricting DHCP Administrators
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 11.4. Disabling NetBIOS over TCP/IP Name Resolution
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 11.5. Enabling Dynamic DNS Updates from the DHCP Server
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 11.6. Running DHCP Server on a Domain Controller
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
    • 12. Domain Name System
      • 12.1. Introduction
        • Using a Graphical User Interface
        • Using a Command-Line Interface
        • Using VBScript
      • 12.1. Securing DNS Using the Separate NamespacesApproach
        • Problem
        • Solution
        • Discussion
        • See Also
      • 12.2. Securing DNS Using the Split-Brain Approach
        • Problem
        • Solution
        • Discussion
        • See Also
      • 12.3. Restricting DNS Administration Using theDNSAdmins Group
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 12.4. Hiding Your Internal IP Addressing Scheme
        • Problem
        • Solution
        • Discussion
        • See Also
      • 12.5. Blocking Unwanted DNS Traffic Through aFirewall
        • Problem
        • Solution
        • Discussion
        • See Also
      • 12.6. Restricting DNS Traffic Through a Firewall UsingForwarders
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 12.7. Preventing DoS Attacks by Disabling Recursion
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 12.8. Hardening DNS by Converting Standard Zones to Active Directory Integrated
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 12.9. Protecting DNS Zones by Requiring Only SecureDynamic Updates
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 12.10. Hardening DNS Clients by Requiring Them to UseSecure Dynamic Updates
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 12.11. Protecting DNS Zones by Disabling DynamicUpdates
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 12.12. Hardening DNS Clients by Preventing Them fromAttempting Dynamic Updates
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 12.13. Preventing Unauthorized Zone Transfers
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 12.14. Restricting Zone Transfers to Legitimate DNS Servers
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
      • 12.15. Preventing Cache Pollution on DNS Servers
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 12.16. Monitoring Suspicious DNS Requests UsingDebug Logging
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 12.17. Securing Resource Records When Usingthe DnsUpdateProxy Group
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 12.18. Preventing DNS Session Sniffing and Hijacking
        • Problem
        • Solution
        • Discussion
        • See Also
    • 13. File and Print Servers
      • 13.1. Introduction
        • Using a Graphical User Interface
        • Using a Command-Line Interface
        • Using Group Policy
        • Using the Registry
      • 13.1. Creating a Hidden File Share
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 13.2. Deleting a File Share
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 13.3. Securing Shared Folders and Files
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 13.4. Preventing Shared File Caching
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 13.5. Determining Access Levels for a File Share
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 13.6. Listing All File Shares
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 13.7. Restricting Printing Permissions
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 13.8. Hardening the Print Spooler
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 13.9. Moving the Print Spool Folder
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 13.10. Disabling Internet Printing
        • Problem
        • Solution
          • Using Group Policy
          • Using the Registry
        • Discussion
        • See Also
      • 13.11. Removing Internet Printing
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
    • 14. IPsec
      • 14.1. Introduction
        • Using a Graphical User Interface
        • Using a Command-Line Interface
        • Using VBScript
        • Using Group Policy
      • 14.1. Using a Default IPsec Policy
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 14.2. Creating an IPsec Policy
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 14.3. Creating a Blocking Rule
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 14.4. Creating a Permit Rule
        • Problem
        • Solution
          • Using a command-line interface
        • Discussion
        • See Also
      • 14.5. Configuring IPsec Boot Mode
        • Problem
        • Solution
          • Using a command-line interface
        • Discussion
        • See Also
      • 14.6. Configuring Authentication Methods
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 14.7. Configuring Connection Types
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 14.8. Configuring Key Exchange
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 14.9. Configuring Session Cryptography
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 14.10. Configuring IP Filter Lists
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 14.11. Configuring IP Filter Actions
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 14.12. Configuring Security Methods
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
          • Using a command-line interface
        • See Also
      • 14.13. Activating an IPsec Rule
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 14.14. Deactivating an IPsec Rule
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 14.15. Assigning and Unassigning IPsec Policies
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 14.16. Viewing IPsec Statistics with System Monitor
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 14.17. Verifying IPsec Traffic
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 14.18. Using IPsec Monitor to Verify IPsec
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 14.19. Troubleshooting IPsec Connections
        • Problem
        • Solution
        • See Also
    • 15. Internet Information Services
      • 15.1. Introduction
        • Using a Graphical User Interface
        • Using VBScript
      • 15.1. Configuring Listening Port
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
      • 15.2. Removing Unused Components
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 15.3. Configuring HTTP Authentication
        • Problem
        • Solution
          • Using a graphical user interface
          • Using VBScript
        • Discussion
          • Using VBScript
        • See Also
      • 15.4. Configuring FTP Authentication
        • Problem
        • Solution
          • Using a graphical user interface
          • Using VBScript
        • Discussion
        • See Also
      • 15.5. Changing the User Context for AnonymousAccess
        • Problem
        • Solution
          • Using a graphical user interface
          • Using VBScript
        • Discussion
        • See Also
      • 15.6. Disabling Anonymous Access
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 15.7. Restricting Client Access by ACL
        • Problem
        • Solution
          • Using a graphical user interface
          • Using VBScript
        • Discussion
        • See Also
      • 15.8. Restricting Client Access by IP Address or DNSName
        • Problem
        • Solution
          • Using a graphical user interface
          • Using VBScript
        • Discussion
          • Using VBScript
        • See Also
      • 15.9. Installing Server Certificates
        • Problem
        • Solution
          • Using a graphical user interface
          • Using VBScript
        • Discussion
        • See Also
      • 15.10. Enabling Secure Sockets Layer
        • Problem
        • Solution
          • Using a graphical user interface
          • Using VBScript
        • Discussion
        • See Also
      • 15.11. Enabling Client Certificate Authentication
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 15.12. Requiring Client Certificate Authentication
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 15.13. Configuring Trusted Certification Authorities
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 15.14. Configuring One-to-One Client Certificate Mapping
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 15.15. Configuring Many-to-One Client CertificateMapping
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
    • 16. RRAS and IAS
      • 16.1. Introduction
        • Using a Graphical User Interface
      • 16.1. Configuring the Routing and Remote Access Server
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 16.2. Allowing Authentication Protocols
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 16.3. Requiring Smart Card Authentication
        • Problem
        • Solution
          • Using a graphical user interface to configure the RRAS server
          • Using a graphical user interface to configure the remote access policy
        • Discussion
        • See Also
      • 16.4. Using Preshared Keys
        • Problem
        • Solution
          • Using a graphical user interface to configure the RRAS computer
          • Using a graphical user interface to configure the VPN client
        • Discussion
        • See Also
      • 16.5. Configuring RRAS to Use IAS
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 16.6. Installing Internet Authentication Service
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 16.7. Configuring IAS Auditing
        • Problem
        • Solution
          • Using a graphical user interface
          • Using the Registry
        • Discussion
        • See Also
      • 16.8. Configuring Local IAS Logging
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 16.9. Configuring SQL IAS Logging
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
          • Using a graphical user interface
        • See Also
      • 16.10. Creating a Remote Access Policy
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 16.11. Configuring Connection Time
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
    • 17. Terminal Services and Remote Desktop
      • 17.1. Introduction
        • Using a Graphical User Interface
        • Using a Command-Line Interface
        • Using Group Policy
        • Using the Registry
        • Using VBScript
      • 17.1. Choosing a Security Mode
        • Problem
        • Solution
          • Using a graphical user interface
          • Using VBScript
        • Discussion
        • See Also
      • 17.2. Configuring Session Encryption
        • Problem
        • Solution
          • Using a graphical user interface
          • Using Group Policy
          • Using VBScript
        • Discussion
        • See Also
      • 17.3. Limiting Client Sessions
        • Problem
        • Solution
          • Using a graphical user interface
          • Using VBScript
        • Discussion
        • See Also
      • 17.4. Requiring a Password for Connection
        • Problem
        • Solution
          • Using a graphical user interface
          • Using Group Policy
          • Using the Registry
          • Using VBScript
        • Discussion
        • See Also
      • 17.5. Securing RPC Administration Traffic
        • Problem
        • Solution
          • Using Group Policy
          • Using VBScript
        • Discussion
      • 17.6. Allowing Silent Session Monitoring
        • Problem
        • Solution
          • Using a graphical user interface
          • Using Group Policy
          • Using VBScript
        • Discussion
        • See Also
      • 17.7. Monitoring Sessions
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
          • Using a graphical user interface
          • Using a command-line interface
        • See Also
      • 17.8. Enabling Remote Desktop
        • Problem
        • Solution
          • Using a graphical user interface
          • Using Group Policy
          • Using VBScript
        • Discussion
        • See Also
      • 17.9. Configuring Access to Remote Desktop
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
    • 18. Public Key Infrastructure and Certificates
      • 18.1. Introduction
        • Using a Graphical User Interface
        • Using a Command-Line Interface
        • Using Group Policy
      • 18.1. Installing an Offline Root CA
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 18.2. Installing an Enterprise Subordinate CA
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 18.3. Installing a Standalone Subordinate CA
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
          • Using a graphical user interface
        • See Also
      • 18.4. Publishing a CRL from an Online CA
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
          • Using a command-line interface
        • See Also
      • 18.5. Publishing a CRL from an Offline CA
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 18.6. Restricting Access to the CA
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 18.7. Auditing CA Operations
        • Problem
        • Solution
          • Using Group Policy to enable object auditing
          • Using a graphical user interface to enable CA auditing
        • Discussion
        • See Also
      • 18.8. Configuring Certificate Templates
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 18.9. Authorizing the CA to Issue Certificates
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
          • Using a graphical user interface
        • See Also
      • 18.10. Archiving Private Keys
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 18.11. Sending Enrollment Notifications via Email
        • Problem
        • Solution
          • Using a command-line interface
        • Discussion
        • See Also
      • 18.12. Requesting Certificates Automatically
        • Problem
        • Solution
          • Using Group Policy
        • Discussion
        • See Also
      • 18.13. Approving and Denying Certificate Requests
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 18.14. Retrieving Issued Certificates
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 18.15. Renewing Certificates
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
          • Using a graphical user interface
        • See Also
      • 18.16. Revoking Certificates
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 18.17. Configuring a Trusted Certificate
        • Problem
        • Solution
          • Using Group Policy
        • Discussion
          • Using Group Policy
        • See Also
      • 18.18. Identifying Local Certificates and Private Keys
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
          • Using a graphical user interface
          • Using a command-line interface
        • See Also
      • 18.19. Backing Up Certificates and Private Keys
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 18.20. Restoring Certificates and Private Keys
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
    • 19. Auditing
      • 19.1. Introduction
        • Using Group Policy
      • 19.1. Auditing Account Logon Events
        • Problem
        • Solution
          • Using Group Policy
        • Discussion
        • See Also
      • 19.2. Auditing Account Management Events
        • Problem
        • Solution
        • Discussion
          • Using Group Policy
        • See Also
      • 19.3. Auditing Directory Service Events
        • Problem
        • Solution
          • Using Group Policy
          • Using a graphical user interface
        • Discussion
        • See Also
      • 19.4. Auditing File Access
        • Problem
        • Solution
          • Using Group Policy
          • Using a graphical user interface
        • Discussion
          • Using a graphical user interface
        • See Also
      • 19.5. Auditing File Share Configuration Events
        • Problem
        • Solution
          • Using Group Policy
          • Using a graphical user interface
        • Discussion
        • See Also
      • 19.6. Auditing Web Server Access
        • Problem
        • Solution
          • Using Group Policy
          • Using a graphical user interface
        • Discussion
        • See Also
      • 19.7. Auditing Policy Change Events
        • Problem
        • Solution
        • Discussion
        • See Also
      • 19.8. Auditing Privilege Use Events
        • Problem
        • Solution
        • Discussion
        • See Also
      • 19.9. Auditing Process Tracking Events
        • Problem
        • Solution
        • Discussion
        • See Also
      • 19.10. Auditing System Events
        • Problem
        • Solution
        • Discussion
        • See Also
      • 19.11. Shutting Down Windows When Unable to LogEvents
        • Problem
        • Solution
          • Using Group Policy
          • Using the Registry
        • Discussion
          • Using the Registry
        • See Also
    • 20. Event Logs
      • 20.1. Introduction
        • Using a Graphical User Interface
        • Using a Command-Line Interface
        • Using VBScript
      • 20.1. Viewing Events
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
          • Using VBScript
        • See Also
      • 20.2. Setting the Maximum Size of an Event Log
        • Problem
        • Solution
          • Using a graphical user interface
          • Using Group Policy
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 20.3. Setting the Event Log Retention Policy
        • Problem
        • Solution
          • Using a graphical user interface
          • Using Group Policy
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 20.4. Clearing the Events in an Event Log
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 20.5. Restricting Access to an Event Log
        • Problem
        • Solution
        • Discussion
        • See Also
      • 20.6. Searching the Event Logs on Multiple Servers
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 20.7. Archiving an Event Log
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
          • Using VBScript
        • Discussion
        • See Also
      • 20.8. Finding More Information About an Event
        • Problem
        • Solution
        • Discussion
        • See Also
      • 20.9. Triggering an Action when an Event Occurs
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
      • 20.10. Consolidating Event Logs
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
    • 21. Patch Management
      • 21.1. Introduction
        • Using a Graphical User Interface
        • Using a Command-Line Interface
        • Using Group Policy
      • 21.1. Installing a Root Update Server
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 21.2. Installing a Subordinate Update Server
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 21.3. Installing a Nonstoring Update Server
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 21.4. Installing an Update Server on a NondedicatedServer
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 21.5. Configuring Computers to Use the InternalUpdate Server
        • Problem
        • Solution
          • Using Group Policy
        • Discussion
        • See Also
      • 21.6. Refreshing the Update Server
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
          • Using a graphical user interface
        • See Also
      • 21.7. Configuring the Computer Update Type andSchedule
        • Problem
        • Solution
        • Discussion
        • See Also
      • 21.8. Creating a Test Group
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
          • Using a graphical user interface
        • See Also
      • 21.9. Approving and Declining Updates
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
          • Using a graphical user interface
        • See Also
      • 21.10. Automatically Approving Critical Updates
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
          • Using a graphical user interface
        • See Also
      • 21.11. Removing Updates
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
          • Using a graphical user interface
        • See Also
      • 21.12. Forcing an Update Scan
        • Problem
        • Solution
          • Using a command-line interface
        • Discussion
        • See Also
      • 21.13. Manually Applying Updates
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
        • See Also
      • 21.14. Disabling Windows Update
        • Problem
        • Solution
          • Using Group Policy
          • Using the Registry
          • Using VBScript
        • Discussion
        • See Also
      • 21.15. Checking Status of Update Application
        • Problem
        • Solution
          • Using a graphical user interface
        • Discussion
          • Using a graphical user interface
        • See Also
      • 21.16. Verifying Update Application with MBSA
        • Problem
        • Solution
          • Using a graphical user interface
          • Using a command-line interface
        • Discussion
        • See Also
    • About the Authors
    • Colophon
    • SPECIAL OFFER: Upgrade this ebook with OReilly

Dodaj do koszyka Windows Server 2003 Security Cookbook. Security Solutions and Scripts for System Administrators

Code, Publish & WebDesing by CATALIST.com.pl



(c) 2005-2019 CATALIST agencja interaktywna, znaki firmowe należą do wydawnictwa Helion S.A.