Preface |
|
xi | |
|
Identifying Security Risks |
|
|
1 | (20) |
|
|
2 | (6) |
|
|
3 | (1) |
|
Access to Network Traffic |
|
|
4 | (1) |
|
Access to Administrative Rights |
|
|
5 | (1) |
|
Access to Network Services |
|
|
6 | (2) |
|
|
8 | (3) |
|
Access to the Internal Network |
|
|
8 | (2) |
|
Sending Information on Public Networks |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
13 | (4) |
|
Setup For Hands-on Projects |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
19 | (2) |
|
Corporate Components to Security Planning |
|
|
21 | (36) |
|
Identifying Business Models |
|
|
22 | (14) |
|
|
23 | (3) |
|
|
26 | (2) |
|
|
28 | (3) |
|
Corporate Geographic Scope |
|
|
31 | (1) |
|
Corporate Management Model |
|
|
32 | (3) |
|
Relationships with Other Organizations |
|
|
35 | (1) |
|
Identifying Corporate Strategies and Goals |
|
|
36 | (3) |
|
Corporate Vision and Goals |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
38 | (1) |
|
Identifying IT Administrative Structures |
|
|
39 | (1) |
|
Identifying the Current Technical Environment |
|
|
40 | (8) |
|
|
41 | (1) |
|
Networking Infrastructure |
|
|
42 | (2) |
|
|
44 | (1) |
|
|
45 | (1) |
|
Configuration Change Management |
|
|
46 | (1) |
|
|
46 | (2) |
|
Identifying the Current Security Model |
|
|
48 | (2) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
51 | (3) |
|
|
54 | (2) |
|
|
56 | (1) |
|
Securing Resources on Windows 2000 Servers |
|
|
57 | (52) |
|
Implementing User Authentication |
|
|
58 | (7) |
|
Kerberos v5 Authentication |
|
|
59 | (3) |
|
|
62 | (1) |
|
Down-level Client Authentication |
|
|
63 | (1) |
|
Certificate-based Authentication |
|
|
63 | (2) |
|
Remote Access Authentication |
|
|
65 | (1) |
|
|
65 | (5) |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
67 | (3) |
|
|
70 | (8) |
|
|
70 | (4) |
|
|
74 | (3) |
|
Combining Share and NTFS Permissions |
|
|
77 | (1) |
|
|
78 | (3) |
|
The File Encryption Process |
|
|
79 | (1) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
81 | (1) |
|
|
82 | (4) |
|
Default Registry Settings |
|
|
85 | (1) |
|
Configuring an Audit Policy |
|
|
86 | (7) |
|
|
89 | (4) |
|
|
93 | (2) |
|
|
95 | (1) |
|
|
95 | (2) |
|
|
97 | (5) |
|
Setup for Hands-on Projects |
|
|
102 | (1) |
|
|
102 | (5) |
|
|
107 | (2) |
|
Designing Active Directory for Security |
|
|
109 | (60) |
|
Active Directory Components |
|
|
110 | (6) |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
Domain and Forest Design---Security Planning Implications |
|
|
115 | (1) |
|
Securing Active Directory |
|
|
116 | (9) |
|
|
117 | (8) |
|
Managing Account Policies |
|
|
125 | (3) |
|
|
125 | (1) |
|
|
126 | (1) |
|
|
127 | (1) |
|
Account Policies Security Implications |
|
|
127 | (1) |
|
Delegating Administrative Tasks |
|
|
128 | (11) |
|
|
129 | (1) |
|
|
130 | (7) |
|
Designing Active Directory for Delegation |
|
|
137 | (2) |
|
Implementing Security Groups |
|
|
139 | (5) |
|
|
139 | (1) |
|
Default and Built-in Groups |
|
|
140 | (3) |
|
|
143 | (1) |
|
Implementing Group Policies for Security |
|
|
144 | (11) |
|
|
144 | (3) |
|
|
147 | (8) |
|
|
155 | (1) |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
157 | (4) |
|
|
161 | (6) |
|
|
167 | (2) |
|
Implementing a Public Key Infrastructure |
|
|
169 | (50) |
|
Public Key Infrastructure (PKI) Overview |
|
|
170 | (12) |
|
|
170 | (4) |
|
|
174 | (3) |
|
|
177 | (5) |
|
Planning and Implementing a Public Key Infrastructure |
|
|
182 | (6) |
|
Designing the Certificate Server Hierarchy |
|
|
182 | (2) |
|
Planning the Certificate Server Type |
|
|
184 | (2) |
|
Identifying Client Certificate Needs |
|
|
186 | (2) |
|
Windows 2000 Certificate Server Implementation |
|
|
188 | (11) |
|
Installing Certificate Servers |
|
|
188 | (3) |
|
Configuring Servers to Use Certificates |
|
|
191 | (5) |
|
Managing Certification Requests |
|
|
196 | (1) |
|
Managing Certification Revocations |
|
|
197 | (2) |
|
Mapping User Accounts to Certificates |
|
|
199 | (2) |
|
Certificate Server Client Implementation |
|
|
201 | (4) |
|
Integration with Third-Party CAs |
|
|
205 | (2) |
|
Choosing a Third-Party PKI Solution |
|
|
206 | (1) |
|
Integrating Windows 2000 PKI and a Third-Party PKI |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
209 | (1) |
|
|
210 | (4) |
|
|
214 | (3) |
|
|
217 | (2) |
|
Securing Network Services |
|
|
219 | (46) |
|
Implementing DNS and DHCP Security |
|
|
220 | (11) |
|
DNS Zones in Windows 2000 |
|
|
221 | (3) |
|
DNS and DHCP Integration Concepts |
|
|
224 | (2) |
|
Securing Dynamic Updates to DNS |
|
|
226 | (5) |
|
Implementing Remote Installation Services Security |
|
|
231 | (7) |
|
|
232 | (1) |
|
|
232 | (1) |
|
Installing Windows 2000 Professional Clients Using RIS |
|
|
233 | (1) |
|
Securing Remote Installation Services |
|
|
234 | (4) |
|
Implementing Terminal Server Security |
|
|
238 | (6) |
|
Securing Terminal Services |
|
|
241 | (3) |
|
Implementing SNMP Security |
|
|
244 | (3) |
|
Securing Community Memberships |
|
|
245 | (1) |
|
Authorizing Management Stations |
|
|
246 | (1) |
|
Securing SNMP Transmissions |
|
|
247 | (1) |
|
Securing Servers Using Security Templates |
|
|
247 | (3) |
|
Default Security Settings |
|
|
248 | (2) |
|
Implementing Secure Access for NonMicrosoft Clients |
|
|
250 | (4) |
|
Securing Network Access to UNIX Clients |
|
|
251 | (1) |
|
Securing Network Access to Netware Clients |
|
|
252 | (1) |
|
Securing Network Access to Macintosh Clients |
|
|
253 | (1) |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
256 | (2) |
|
|
258 | (3) |
|
|
261 | (2) |
|
|
263 | (2) |
|
Securing Network Communications |
|
|
265 | (30) |
|
Implementing Server Message Block Signing |
|
|
266 | (5) |
|
|
266 | (5) |
|
Securing Network Traffic Using IP Security |
|
|
271 | (16) |
|
Authentication Header Protocol |
|
|
272 | (2) |
|
Encapsulating Security Payload |
|
|
274 | (1) |
|
|
275 | (2) |
|
|
277 | (1) |
|
IPSec Policy Configuration |
|
|
278 | (5) |
|
|
283 | (1) |
|
|
284 | (3) |
|
|
287 | (1) |
|
|
288 | (1) |
|
|
288 | (1) |
|
|
289 | (3) |
|
|
292 | (2) |
|
|
294 | (1) |
|
Securing Access For Remote Access Users |
|
|
295 | (46) |
|
Implementing and Configuring Routing and Remote Access |
|
|
296 | (12) |
|
Configuring a Dial-up Server |
|
|
296 | (4) |
|
Configuring Remote Access Clients |
|
|
300 | (2) |
|
Implementing Virtual Private Network Access |
|
|
302 | (3) |
|
|
305 | (2) |
|
|
307 | (1) |
|
|
308 | (8) |
|
Configuring Remote Access Authentication |
|
|
308 | (4) |
|
Configuring Callback Options |
|
|
312 | (2) |
|
Remote Access Account Lockout |
|
|
314 | (1) |
|
|
315 | (1) |
|
|
316 | (7) |
|
Remote Access Policy Concepts |
|
|
317 | (1) |
|
Configuring Remote Access Policies |
|
|
318 | (4) |
|
Planning for Remote Access Policies |
|
|
322 | (1) |
|
Internet Authentication Server |
|
|
323 | (7) |
|
Introduction to Remote Authentication Dial-in User Service (RADIUS) |
|
|
323 | (3) |
|
Implementing IAS as a RADIUS Server |
|
|
326 | (4) |
|
|
330 | (1) |
|
|
330 | (1) |
|
|
331 | (1) |
|
|
332 | (4) |
|
|
336 | (3) |
|
|
339 | (2) |
|
Securing Access Between Corporate Locations |
|
|
341 | (36) |
|
Security Risks for Data Between Corporate Locations |
|
|
342 | (3) |
|
Configuring Windows 2000 as a Router |
|
|
345 | (15) |
|
Configuring Routing Options |
|
|
345 | (12) |
|
Securing the Windows 2000 Router |
|
|
357 | (3) |
|
Configuring and Securing Virtual Private Networks |
|
|
360 | (5) |
|
VPN Tunneling Protocol Options |
|
|
361 | (4) |
|
Configuring Secure Access to Partner Organizations |
|
|
365 | (3) |
|
Securing Data Transmissions |
|
|
365 | (1) |
|
Securing Resource Access to the Company Network |
|
|
366 | (2) |
|
|
368 | (1) |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
370 | (3) |
|
|
373 | (2) |
|
|
375 | (2) |
|
Designing Secure Access to the Internet |
|
|
377 | (36) |
|
Securing the Internal Network from the Internet |
|
|
378 | (15) |
|
Network Address Translation |
|
|
380 | (5) |
|
|
385 | (5) |
|
Implementing Demilitarized Zones |
|
|
390 | (3) |
|
Securing User Access to the Internet |
|
|
393 | (9) |
|
Implementing Proxy Services |
|
|
394 | (2) |
|
Configuring Internet Clients |
|
|
396 | (6) |
|
|
402 | (1) |
|
|
403 | (1) |
|
|
404 | (1) |
|
|
405 | (3) |
|
|
408 | (3) |
|
|
411 | (2) |
|
APPENDIX A Exam Objectives for MCSE Certification Exam νm;70-220: Designing Security for a Microsoft Windows 2000 Network |
|
|
413 | (6) |
|
Analyzing Business Requirements |
|
|
413 | (1) |
|
Analyzing Technical Requirements |
|
|
414 | (1) |
|
Analyzing Security Requirements |
|
|
415 | (1) |
|
Designing a Windows 2000 Security Solution |
|
|
415 | (1) |
|
Designing a Security Solution for Access Between Networks |
|
|
416 | (1) |
|
Designing Security for Communication Channels |
|
|
417 | (2) |
Glossary |
|
419 | (8) |
Index |
|
427 | |