Acknowledgements |
|
xv | |
Introduction |
|
xvii | |
|
Part I Windows Security Fundamentals |
|
|
|
Subjects, Users, and Other Actors |
|
|
3 | (14) |
|
The Subject/Object/Action-Tuple |
|
|
3 | (1) |
|
Types of Security Principals |
|
|
4 | (8) |
|
|
4 | (3) |
|
|
7 | (1) |
|
|
7 | (3) |
|
Abstract Concepts (Log-on Groups) |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
12 | (4) |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
Authenticators and Authentication Protocols |
|
|
17 | (38) |
|
Something You Know, Something You Have |
|
|
17 | (2) |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
Understanding Authenticator Storage |
|
|
19 | (10) |
|
|
21 | (2) |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
25 | (2) |
|
|
27 | (2) |
|
|
29 | (8) |
|
|
29 | (1) |
|
Challenge-Response Protocols |
|
|
30 | (7) |
|
Smart Card Authentication |
|
|
37 | (1) |
|
Smart Cards and Passwords |
|
|
38 | (1) |
|
|
38 | (8) |
|
|
38 | (4) |
|
Using the Captured Information |
|
|
42 | (2) |
|
Protecting Your Passwords |
|
|
44 | (2) |
|
|
46 | (8) |
|
|
46 | (1) |
|
|
46 | (1) |
|
Stop Thinking About Words |
|
|
47 | (1) |
|
|
47 | (2) |
|
Fine-Grained Password Policies |
|
|
49 | (5) |
|
|
54 | (1) |
|
|
54 | (1) |
|
Objects: The Stuff You Want |
|
|
55 | (36) |
|
Access Control Terminology |
|
|
55 | (24) |
|
|
56 | (1) |
|
|
56 | (2) |
|
|
58 | (1) |
|
Access Control List Entry |
|
|
59 | (2) |
|
|
61 | (5) |
|
Relationship Between Access Control Structures |
|
|
66 | (1) |
|
|
66 | (4) |
|
|
70 | (2) |
|
|
72 | (2) |
|
|
74 | (1) |
|
|
75 | (1) |
|
Security Descriptor Definition Language |
|
|
75 | (4) |
|
Tools to Manage Permissions |
|
|
79 | (2) |
|
|
79 | (2) |
|
|
81 | (1) |
|
|
81 | (1) |
|
Major Access Control Changes in Windows Server 2008 |
|
|
81 | (2) |
|
Trustedlnstaller Permissions |
|
|
81 | (1) |
|
|
82 | (1) |
|
File System Name Space Changes |
|
|
82 | (1) |
|
Power User Permissions Removed |
|
|
82 | (1) |
|
Owner_Right and Owner Rights |
|
|
82 | (1) |
|
User Rights and Privileges |
|
|
83 | (5) |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
89 | (2) |
|
Understanding User Account Control (UAC) |
|
|
91 | (24) |
|
What Is User Account Control? |
|
|
92 | (1) |
|
How Token Filtering Works |
|
|
92 | (2) |
|
|
94 | (14) |
|
UAC Elevation User Experience |
|
|
94 | (4) |
|
Application Information Service |
|
|
98 | (1) |
|
File and Registry Virtualization |
|
|
98 | (2) |
|
Manifests and Requested Execution Levels |
|
|
100 | (1) |
|
Installer Detection Technology |
|
|
101 | (1) |
|
User Interface Privilege Isolation |
|
|
102 | (1) |
|
Secure Desktop Elevation Prompts |
|
|
102 | (1) |
|
|
103 | (1) |
|
UAC Remote Administrative Restrictions |
|
|
103 | (1) |
|
Mapping Network Drives When Running in Admin Approval Mode |
|
|
104 | (2) |
|
Application Elevations Blocked at Logon |
|
|
106 | (1) |
|
Configuring Pre-Windows Vista Applications for Compatibility with UAC |
|
|
107 | (1) |
|
UAC Group Policy Settings |
|
|
108 | (3) |
|
UAC Policy Settings Found Under Security Options |
|
|
108 | (2) |
|
|
110 | (1) |
|
What's New in UAC in Windows Server 2008 and Windows Vista SP1 |
|
|
111 | (1) |
|
New Group Policy Setting: UlAccess Applications to Prompt for Elevation without Using the Secure Desktop |
|
|
112 | (1) |
|
UAC Prompt Reduction When Performing File Operations in Windows Explorer |
|
|
112 | (1) |
|
More Than 40 Additional UAC-Related Application Compatibility Shims |
|
|
112 | (1) |
|
|
112 | (1) |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
Firewall and Network Access Protection |
|
|
115 | (36) |
|
Windows Filtering Platform |
|
|
116 | (2) |
|
Windows Firewall with Advanced Security |
|
|
118 | (12) |
|
Improvements in the Windows Firewall |
|
|
118 | (4) |
|
Managing the Windows Firewall |
|
|
122 | (8) |
|
Routing and Remote Access Services |
|
|
130 | (3) |
|
|
131 | (2) |
|
Internet Protocol Security |
|
|
133 | (6) |
|
|
133 | (3) |
|
New Capabilities in Windows Server 2008 |
|
|
136 | (3) |
|
Network Access Protection |
|
|
139 | (11) |
|
|
140 | (3) |
|
|
143 | (3) |
|
|
146 | (4) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
151 | (32) |
|
|
151 | (10) |
|
|
152 | (1) |
|
|
152 | (2) |
|
|
154 | (1) |
|
|
155 | (6) |
|
Windows Server 2008 Services by Role |
|
|
161 | (1) |
|
|
161 | (4) |
|
|
161 | (2) |
|
Common Service Attack Vectors |
|
|
163 | (2) |
|
|
165 | (13) |
|
|
165 | (5) |
|
|
170 | (2) |
|
|
172 | (2) |
|
Restricted Network Access |
|
|
174 | (2) |
|
|
176 | (1) |
|
Mandatory Integrity Levels |
|
|
176 | (1) |
|
Data Execution Prevention |
|
|
176 | (1) |
|
|
177 | (1) |
|
|
178 | (4) |
|
|
178 | (1) |
|
Minimize Running Services |
|
|
178 | (1) |
|
Apply a Least-Privilege Model to Remaining Services |
|
|
179 | (1) |
|
Keep Your Updates Up To Date |
|
|
179 | (1) |
|
Creating and Using Custom Service Accounts |
|
|
180 | (1) |
|
Use Windows Firewall and IPsec for Network Isolation |
|
|
181 | (1) |
|
Auditing Service Failures |
|
|
181 | (1) |
|
Develop and Use Secure Services |
|
|
182 | (1) |
|
|
182 | (1) |
|
|
182 | (1) |
|
|
183 | (30) |
|
What Is New in Windows Server 2008 |
|
|
183 | (1) |
|
|
184 | (10) |
|
|
184 | (1) |
|
Active Directory-Based GPOs |
|
|
185 | (5) |
|
|
190 | (4) |
|
What Is New in Group Policy |
|
|
194 | (14) |
|
|
194 | (1) |
|
ADMX Templates and the Central Store |
|
|
194 | (3) |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
199 | (2) |
|
New Security Policy Management Support |
|
|
201 | (3) |
|
Windows Firewall with Advanced Security |
|
|
204 | (2) |
|
Wired and Wireless Network Policy |
|
|
206 | (2) |
|
Managing Security Settings |
|
|
208 | (4) |
|
|
212 | (1) |
|
|
212 | (1) |
|
|
213 | (28) |
|
|
213 | (1) |
|
How Windows Auditing Works |
|
|
214 | (2) |
|
|
216 | (8) |
|
|
221 | (3) |
|
Developing a Good Audit Policy |
|
|
224 | (2) |
|
New Events in Windows Server 2008 |
|
|
226 | (4) |
|
Using the Built-in Tools to Analyze Events |
|
|
230 | (7) |
|
|
231 | (5) |
|
|
236 | (1) |
|
|
237 | (4) |
|
Part II Implementing Identity and Access (IDA) Control Using Active Directory |
|
|
|
Designing Active Directory Domain Services for Security |
|
|
241 | (24) |
|
|
241 | (2) |
|
The New Active Directory Domain Services Installation Wizard |
|
|
243 | (2) |
|
Read-Only Domain Controllers |
|
|
245 | (6) |
|
|
246 | (1) |
|
RODC Filtered Attribute Set |
|
|
246 | (1) |
|
Unidirectional Replication |
|
|
247 | (1) |
|
|
247 | (2) |
|
|
249 | (1) |
|
Staged installation for Read-Only Domain Controllers |
|
|
250 | (1) |
|
Restartable Active Directory Domain Services |
|
|
251 | (1) |
|
Active Directory Database Mounting Tool |
|
|
252 | (2) |
|
|
254 | (4) |
|
|
255 | (3) |
|
Active Directory Lightweight Directory Services Overview |
|
|
258 | (3) |
|
New Features in Windows Server 2008 for AD LDS |
|
|
261 | (1) |
|
Active Directory Federation Services Overview |
|
|
261 | (3) |
|
|
262 | (1) |
|
What Is New in Windows Server 2008? |
|
|
263 | (1) |
|
|
264 | (1) |
|
|
264 | (1) |
|
Implementing Active Directory Certificate Services |
|
|
265 | (20) |
|
What Is New in Windows Server 2008 PKI |
|
|
266 | (1) |
|
Threats to Certificate Services and Mitigation Options |
|
|
267 | (10) |
|
Compromise of a CA's Key Pair |
|
|
267 | (1) |
|
Preventing Revocation Checking |
|
|
268 | (3) |
|
Attempts to Modify the CA Configuration |
|
|
271 | (1) |
|
Attempts to Modify Certificate Templates |
|
|
272 | (1) |
|
Addition of Nontrusted CAs to the Trusted Root CA Store |
|
|
273 | (1) |
|
Enrollment Agents Issuing Unauthorized Certificates |
|
|
274 | (1) |
|
Compromise of a CA by a Single Administrator |
|
|
275 | (2) |
|
Unauthorized Recovery of a User's Private Key from the CA Database |
|
|
277 | (1) |
|
Securing Certificate Services |
|
|
277 | (2) |
|
Implementing Physical Security Measures |
|
|
278 | (1) |
|
|
279 | (1) |
|
|
280 | (1) |
|
|
280 | (5) |
|
Part III Common Security Scenarios |
|
|
|
|
285 | (28) |
|
|
286 | (8) |
|
Default Roles and Features |
|
|
287 | (7) |
|
Your Server Before the Roles |
|
|
294 | (1) |
|
Default Service Footprint |
|
|
294 | (1) |
|
|
294 | (4) |
|
Roles Supported by Server Core |
|
|
296 | (1) |
|
Features Supported by Server Core |
|
|
297 | (1) |
|
What Is Not Included in Server Core |
|
|
297 | (1) |
|
Tools to Manage Server Roles |
|
|
298 | (4) |
|
Initial Configuration Tasks |
|
|
299 | (1) |
|
Add Roles and Add Features Wizards |
|
|
299 | (1) |
|
|
300 | (2) |
|
The Security Configuration Wizard |
|
|
302 | (9) |
|
|
311 | (1) |
|
|
312 | (1) |
|
|
313 | (28) |
|
The Four Phases of Patch Management |
|
|
313 | (7) |
|
|
314 | (1) |
|
|
315 | (3) |
|
Phase 3: Evaluate and Plan |
|
|
318 | (1) |
|
|
319 | (1) |
|
The Anatomy of a Security Update |
|
|
320 | (2) |
|
Supported Command-Line Parameters |
|
|
321 | (1) |
|
Integrating MSU Files into a Windows Image File |
|
|
321 | (1) |
|
Tools for Your Patch Management Arsenal |
|
|
322 | (17) |
|
Microsoft Download Center |
|
|
322 | (1) |
|
|
322 | (1) |
|
Windows Update and Microsoft Update |
|
|
323 | (1) |
|
Windows Automatic Updating |
|
|
324 | (2) |
|
Microsoft Baseline Security Analyzer |
|
|
326 | (4) |
|
Windows Server Update Services |
|
|
330 | (8) |
|
System Center Essentials 2007 |
|
|
338 | (1) |
|
|
339 | (1) |
|
|
340 | (1) |
|
|
341 | (28) |
|
Introduction to Security Dependencies |
|
|
344 | (4) |
|
|
345 | (1) |
|
Unacceptable Dependencies |
|
|
345 | (2) |
|
Dependency Analysis of an Attack |
|
|
347 | (1) |
|
|
348 | (5) |
|
|
349 | (1) |
|
Access-Based Dependencies |
|
|
349 | (3) |
|
Administrative Dependencies |
|
|
352 | (1) |
|
Service Account Dependencies |
|
|
352 | (1) |
|
|
352 | (1) |
|
|
353 | (13) |
|
Step 1: Create a Classification Scheme |
|
|
354 | (3) |
|
Steps 2 and 3: Network Threat Modeling |
|
|
357 | (3) |
|
Step 4: Analyze, Rinse, and Repeat as Needed |
|
|
360 | (1) |
|
Step 5: Design the Isolation Strategy |
|
|
361 | (2) |
|
Step 6: Derive Operational Strategy |
|
|
363 | (1) |
|
Step 7: Implement Restrictions |
|
|
363 | (3) |
|
|
366 | (1) |
|
|
367 | (2) |
|
Securing the Branch Office |
|
|
369 | (22) |
|
An Introduction to Branch Office Issues |
|
|
369 | (4) |
|
Why Do Branch Offices Matter? |
|
|
370 | (1) |
|
What Is Different in a Branch Office? |
|
|
370 | (1) |
|
|
371 | (2) |
|
Windows Server 2008 in the Branch Office |
|
|
373 | (16) |
|
|
373 | (3) |
|
Security Features for the Branch Office |
|
|
376 | (13) |
|
|
389 | (1) |
|
|
390 | (1) |
|
|
390 | (1) |
|
Small Business Considerations |
|
|
391 | (40) |
|
Running Servers on a Shoestring |
|
|
392 | (3) |
|
Choosing the Right Platforms and Roles |
|
|
393 | (2) |
|
Servers Designed for Small Firms |
|
|
395 | (6) |
|
Windows Server 2008 Web Edition |
|
|
395 | (1) |
|
Windows Server Code Name ``Cougar'' |
|
|
395 | (4) |
|
Windows Essential Business Server |
|
|
399 | (1) |
|
|
400 | (1) |
|
|
400 | (1) |
|
Violating All the Principles with Multi-Role Servers |
|
|
401 | (8) |
|
|
402 | (1) |
|
|
402 | (1) |
|
|
403 | (2) |
|
|
405 | (1) |
|
Supportability and Updating |
|
|
406 | (1) |
|
|
407 | (2) |
|
Best Practices for Small Businesses |
|
|
409 | (19) |
|
Following Hardening Guidance |
|
|
409 | (4) |
|
|
413 | (2) |
|
|
415 | (2) |
|
|
417 | (1) |
|
Monitoring and Management Add-ons |
|
|
418 | (2) |
|
The Server's Role in Desktop Control and Management |
|
|
420 | (3) |
|
Recommendations for Additional Server Settings and Configurations |
|
|
423 | (5) |
|
|
428 | (1) |
|
|
428 | (3) |
|
Securing Server Applications |
|
|
431 | (32) |
|
|
431 | (2) |
|
IIS 7: A Security Pedigree |
|
|
433 | (1) |
|
|
433 | (3) |
|
|
434 | (2) |
|
|
436 | (3) |
|
|
436 | (2) |
|
|
438 | (1) |
|
|
439 | (1) |
|
Simple Path-Based Security |
|
|
439 | (5) |
|
Defining and Restricting the Physical Path |
|
|
440 | (3) |
|
Default Document or Directory Browsing? |
|
|
443 | (1) |
|
Authentication and Authorization |
|
|
444 | (16) |
|
|
445 | (1) |
|
|
446 | (1) |
|
Client Certificate Mapping |
|
|
447 | (3) |
|
|
450 | (1) |
|
|
451 | (1) |
|
|
451 | (1) |
|
|
452 | (1) |
|
|
453 | (2) |
|
Further Security Considerations for IIS |
|
|
455 | (5) |
|
|
460 | (1) |
|
|
461 | (2) |
Index |
|
463 | |