Muutke küpsiste eelistusi

Hardening Windows 2nd ed. [Pehme köide]

  • Formaat: Paperback / softback, 216 pages, kõrgus x laius: 235x178 mm, kaal: 454 g, 216 p., 1 Paperback / softback
  • Ilmumisaeg: 02-Nov-2005
  • Kirjastus: APress
  • ISBN-10: 1590595394
  • ISBN-13: 9781590595398
Teised raamatud teemal:
  • Pehme köide
  • Hind: 31,09 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 36,58 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 216 pages, kõrgus x laius: 235x178 mm, kaal: 454 g, 216 p., 1 Paperback / softback
  • Ilmumisaeg: 02-Nov-2005
  • Kirjastus: APress
  • ISBN-10: 1590595394
  • ISBN-13: 9781590595398
Teised raamatud teemal:
Hardening is the process of protecting a system against unknown threats. System administrators harden against that which they think could be a threat. Administrators know the Internet is a hostile environment. Although they can't tell, for example, that a hacker will attempt to gain access to the SQL server next Tuesday, they can bet money there'll be an attempt soon and should "batten down the hatches" in anticipation.



Hardening Windows, Second Edition is the definitive "counterintelligence" guide to performing preventative security measures for the Windows operating system. This second edition covers the release of Windows XP Service Pack 2 and its new security features, including the Windows Firewall and the Security Center. It also covers Windows Server 2003 Service Pack 1, Windows Server R2's new Security Configuration Wizard, Windows NT, Windows 2000, branch-office security features, and new setup options. A new chapter has been added on Windows Software Update Services. All chapters have been updated to reflect reader feedback from the first edition. Topics covered include system and group policies, Network Access Quarantine Control, auditing and event logs, IIS, and Exchange.
About the Author xi
About the Technical Reviewer xiii
Acknowledgments xv
Introduction xvii
Some Words About Hardening
1(10)
What Is Security?
2(2)
The Security Dilemma
3(1)
Enemies of Security
4(1)
What Windows Is Lacking
4(1)
Some General Hardening Suggestions
5(4)
Software Considerations
6(1)
Hardware and Network Considerations
7(2)
Checkpoints
9(2)
Windows NT Security
11(24)
Windows NT System Policy Editor
11(8)
Customizing and Applying Policies to Multiple Computers
12(1)
Resolving Conflicts Between Multiple Policies
13(1)
Recommended User Policy Settings
14(5)
Extending Policies
19(1)
Passwords
19(3)
Password Policies
20(1)
Password Cracking
21(1)
Protecting User Accounts
22(1)
Registry Procedures
22(1)
Protecting the File System
23(2)
Locking Down Local Directories
23(1)
Search Paths
24(1)
Guarding Against Internet Threats
25(2)
Windows NT Port Filtering
25(1)
Protecting Against Viruses
26(1)
Assigning Rights to Users
27(3)
Granting and Revoking User Rights
27(3)
Remote Access Server Configuration
30(1)
Selecting Appropriate Communications Protocols and Methods
30(1)
Security Implications of Domains
31(1)
Checkpoints
32(3)
Windows 2000 Security
35(14)
System Updates
35(3)
The ``Slipstreaming'' Process
36(1)
Critical Updates and Security Hotfixes
37(1)
Managing Critical Updates Across Multiple Computers
37(1)
Security Templates
38(3)
Creating a Custom Security Template
40(1)
Recommended Security Policy Settings
41(5)
User Accounts
42(1)
Local Options
43(3)
Other Security Considerations
46(2)
Windows Component Selection and Installation
46(1)
Tightening Running Services
47(1)
Checkpoints
48(1)
Windows XP Security
49(22)
Implementing the Built-In Windows XP Firewall
49(4)
Profiles
50(1)
Configuring Through Group Policy
51(1)
The Internet Connection Firewall in XP Gold and Service Pack 1
51(2)
Disabling Unnecessary Services
53(10)
Providing a Secure Configuration for Services
62(1)
Microsoft Baseline Security Analyzer Patch Check and Security Tests
63(1)
Installing Microsoft Baseline Security Analyzer
63(1)
Penetration Tests
63(1)
File System Security
64(1)
Disable Automated Logins
65(1)
Hardening Default Accounts
65(2)
Use Runas for Administrative Work
66(1)
Disable Infrared Transfers
67(1)
Using Forensic Analysis Techniques
67(2)
Checkpoints
69(2)
Windows Server 2003 Security
71(14)
Enhancements to Security in Service Pack 1
71(1)
The Security Configuration Wizard
72(10)
Installing the SCW
73(1)
Creating a Security Policy with the SCW
73(7)
The Rollback Feature
80(1)
SCW Best Practices
80(1)
Using SCW from the Command Line
81(1)
Checkpoints
82(3)
Deploying Enterprise Security Policies
85(14)
System Policies, Group Policies, and Interaction
85(4)
Mixing Policies and Operating Systems
87(2)
Security and the Group Policy Framework
89(5)
Organized Layout of Policies
90(2)
Policy Application Precedence
92(1)
Creating Security Configuration Files
92(2)
Default Domain Policy
94(1)
Default Domain Controller Security Policies
94(1)
Troubleshooting Group Policy
95(1)
Checkpoints
96(3)
Patch Management
99(20)
About Windows Server Update Services
99(18)
Comparing Windows Server Update Services to Systems Management Server
100(1)
Using Windows Server Update Services: On the Server Side
101(13)
Using WSUS: On the Client Side
114(3)
Checkpoints
117(2)
Network Access Quarantine Control
119(18)
How Network Access Quarantine Works
120(2)
A Step-by-Step Overview of Network Access Quarantine Control
120(2)
Deploying NAQC
122(13)
Creating Quarantined Resources
122(1)
Writing the Baseline Script
123(2)
Installing the Listening Components
125(2)
Creating a Quarantined Connection Profile
127(2)
Distributing the Profile to Remote Users
129(1)
Configuring the Quarantine Policy
130(5)
Checkpoints
135(2)
Internet Information Services Security
137(12)
Completely Disable IIS
138(1)
Keeping IIS Updated
138(2)
Using Windows Update
139(1)
Using Network-Based Hotfix Installation
139(1)
Securing Files, Folders, and Scripts
140(2)
The Microsoft Indexing Service
142(2)
TCP/IP Port Evaluation
144(1)
Administrative and Default Pages
145(1)
The Ins and Outs of Internet Services Application Programming Interface
146(1)
Looking at Apache as an Alternative
146(1)
Checkpoints
147(2)
Exchange Server 2003 Security
149(14)
Installation Security
149(2)
Security Policy Modifications
151(1)
For Exchange Server Machines
151(1)
For Domain Controller Machines
151(1)
Service Security
152(1)
Patch Management
153(1)
Protecting Against Address Spoofing
154(2)
Protecting Against Denial-of-Service Attacks
156(2)
Restricting SMTP Access
158(2)
Controlling Access
160(1)
Checkpoints
161(2)
Security Auditing and Event Logs
163(10)
For Windows 2000, XP, and Server 2003
163(4)
Recommended Items to Audit
165(1)
Event Logs
165(1)
The Event Viewer
166(1)
For Windows NT 4.0
167(2)
Recommended Items to Audit
168(1)
The Event Log
169(1)
Filtering Events
169(1)
What Might Be Missing
170(1)
Checkpoints
170(3)
APPENDIX Quick-Reference Checklists
173(12)
Some Words About Hardening
173(1)
Windows NT Security
174(2)
Windows 2000 Security
176(1)
Windows XP Security
177(1)
Windows Server 2003 Security
178(1)
Deploying Enterprise Security Policies
179(1)
Patch Management
180(1)
Network Access Quarantine Control
180(1)
Internet Information Services Security
181(1)
Exchange Server 2003 Security
181(2)
Security Auditing and Event Logs
183(2)
Index 185


Jonathan Hassell is an author, consultant, and speaker on a variety of IT topics. His published works include RADIUS, Hardening Windows, Using Microsoft Windows Small Business Server 2003, and Learning Windows Server 2003. His work appears regularly in such periodicals as Windows IT Pro, PC Pro, and TechNet Magazine. Jonathan also speaks worldwide on topics ranging from networking and security to Windows administration. He is currently an editor for Apress, which specializes in books for programmers and IT professionals.