About the Author |
|
xi | |
About the Technical Reviewer |
|
xiii | |
Acknowledgments |
|
xv | |
Introduction |
|
xvii | |
|
Some Words About Hardening |
|
|
1 | (10) |
|
|
2 | (2) |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
|
Some General Hardening Suggestions |
|
|
5 | (4) |
|
|
6 | (1) |
|
Hardware and Network Considerations |
|
|
7 | (2) |
|
|
9 | (2) |
|
|
11 | (24) |
|
Windows NT System Policy Editor |
|
|
11 | (8) |
|
Customizing and Applying Policies to Multiple Computers |
|
|
12 | (1) |
|
Resolving Conflicts Between Multiple Policies |
|
|
13 | (1) |
|
Recommended User Policy Settings |
|
|
14 | (5) |
|
|
19 | (1) |
|
|
19 | (3) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
Protecting the File System |
|
|
23 | (2) |
|
Locking Down Local Directories |
|
|
23 | (1) |
|
|
24 | (1) |
|
Guarding Against Internet Threats |
|
|
25 | (2) |
|
Windows NT Port Filtering |
|
|
25 | (1) |
|
Protecting Against Viruses |
|
|
26 | (1) |
|
Assigning Rights to Users |
|
|
27 | (3) |
|
Granting and Revoking User Rights |
|
|
27 | (3) |
|
Remote Access Server Configuration |
|
|
30 | (1) |
|
Selecting Appropriate Communications Protocols and Methods |
|
|
30 | (1) |
|
Security Implications of Domains |
|
|
31 | (1) |
|
|
32 | (3) |
|
|
35 | (14) |
|
|
35 | (3) |
|
The ``Slipstreaming'' Process |
|
|
36 | (1) |
|
Critical Updates and Security Hotfixes |
|
|
37 | (1) |
|
Managing Critical Updates Across Multiple Computers |
|
|
37 | (1) |
|
|
38 | (3) |
|
Creating a Custom Security Template |
|
|
40 | (1) |
|
Recommended Security Policy Settings |
|
|
41 | (5) |
|
|
42 | (1) |
|
|
43 | (3) |
|
Other Security Considerations |
|
|
46 | (2) |
|
Windows Component Selection and Installation |
|
|
46 | (1) |
|
Tightening Running Services |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
49 | (22) |
|
Implementing the Built-In Windows XP Firewall |
|
|
49 | (4) |
|
|
50 | (1) |
|
Configuring Through Group Policy |
|
|
51 | (1) |
|
The Internet Connection Firewall in XP Gold and Service Pack 1 |
|
|
51 | (2) |
|
Disabling Unnecessary Services |
|
|
53 | (10) |
|
Providing a Secure Configuration for Services |
|
|
62 | (1) |
|
Microsoft Baseline Security Analyzer Patch Check and Security Tests |
|
|
63 | (1) |
|
Installing Microsoft Baseline Security Analyzer |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
65 | (1) |
|
Hardening Default Accounts |
|
|
65 | (2) |
|
Use Runas for Administrative Work |
|
|
66 | (1) |
|
Disable Infrared Transfers |
|
|
67 | (1) |
|
Using Forensic Analysis Techniques |
|
|
67 | (2) |
|
|
69 | (2) |
|
Windows Server 2003 Security |
|
|
71 | (14) |
|
Enhancements to Security in Service Pack 1 |
|
|
71 | (1) |
|
The Security Configuration Wizard |
|
|
72 | (10) |
|
|
73 | (1) |
|
Creating a Security Policy with the SCW |
|
|
73 | (7) |
|
|
80 | (1) |
|
|
80 | (1) |
|
Using SCW from the Command Line |
|
|
81 | (1) |
|
|
82 | (3) |
|
Deploying Enterprise Security Policies |
|
|
85 | (14) |
|
System Policies, Group Policies, and Interaction |
|
|
85 | (4) |
|
Mixing Policies and Operating Systems |
|
|
87 | (2) |
|
Security and the Group Policy Framework |
|
|
89 | (5) |
|
Organized Layout of Policies |
|
|
90 | (2) |
|
Policy Application Precedence |
|
|
92 | (1) |
|
Creating Security Configuration Files |
|
|
92 | (2) |
|
|
94 | (1) |
|
Default Domain Controller Security Policies |
|
|
94 | (1) |
|
Troubleshooting Group Policy |
|
|
95 | (1) |
|
|
96 | (3) |
|
|
99 | (20) |
|
About Windows Server Update Services |
|
|
99 | (18) |
|
Comparing Windows Server Update Services to Systems Management Server |
|
|
100 | (1) |
|
Using Windows Server Update Services: On the Server Side |
|
|
101 | (13) |
|
Using WSUS: On the Client Side |
|
|
114 | (3) |
|
|
117 | (2) |
|
Network Access Quarantine Control |
|
|
119 | (18) |
|
How Network Access Quarantine Works |
|
|
120 | (2) |
|
A Step-by-Step Overview of Network Access Quarantine Control |
|
|
120 | (2) |
|
|
122 | (13) |
|
Creating Quarantined Resources |
|
|
122 | (1) |
|
Writing the Baseline Script |
|
|
123 | (2) |
|
Installing the Listening Components |
|
|
125 | (2) |
|
Creating a Quarantined Connection Profile |
|
|
127 | (2) |
|
Distributing the Profile to Remote Users |
|
|
129 | (1) |
|
Configuring the Quarantine Policy |
|
|
130 | (5) |
|
|
135 | (2) |
|
Internet Information Services Security |
|
|
137 | (12) |
|
|
138 | (1) |
|
|
138 | (2) |
|
|
139 | (1) |
|
Using Network-Based Hotfix Installation |
|
|
139 | (1) |
|
Securing Files, Folders, and Scripts |
|
|
140 | (2) |
|
The Microsoft Indexing Service |
|
|
142 | (2) |
|
|
144 | (1) |
|
Administrative and Default Pages |
|
|
145 | (1) |
|
The Ins and Outs of Internet Services Application Programming Interface |
|
|
146 | (1) |
|
Looking at Apache as an Alternative |
|
|
146 | (1) |
|
|
147 | (2) |
|
Exchange Server 2003 Security |
|
|
149 | (14) |
|
|
149 | (2) |
|
Security Policy Modifications |
|
|
151 | (1) |
|
For Exchange Server Machines |
|
|
151 | (1) |
|
For Domain Controller Machines |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
153 | (1) |
|
Protecting Against Address Spoofing |
|
|
154 | (2) |
|
Protecting Against Denial-of-Service Attacks |
|
|
156 | (2) |
|
|
158 | (2) |
|
|
160 | (1) |
|
|
161 | (2) |
|
Security Auditing and Event Logs |
|
|
163 | (10) |
|
For Windows 2000, XP, and Server 2003 |
|
|
163 | (4) |
|
Recommended Items to Audit |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
167 | (2) |
|
Recommended Items to Audit |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
170 | (3) |
|
APPENDIX Quick-Reference Checklists |
|
|
173 | (12) |
|
Some Words About Hardening |
|
|
173 | (1) |
|
|
174 | (2) |
|
|
176 | (1) |
|
|
177 | (1) |
|
Windows Server 2003 Security |
|
|
178 | (1) |
|
Deploying Enterprise Security Policies |
|
|
179 | (1) |
|
|
180 | (1) |
|
Network Access Quarantine Control |
|
|
180 | (1) |
|
Internet Information Services Security |
|
|
181 | (1) |
|
Exchange Server 2003 Security |
|
|
181 | (2) |
|
Security Auditing and Event Logs |
|
|
183 | (2) |
Index |
|
185 | |