Cargando…

Getting started with windows server security : develop and implement a secure microsoft infrastructure platform using native and built-in tools /

If you are a security or Windows Server administrator wanting to learn or advance your knowledge in Microsoft security and secure your Windows Server infrastructure effectively, this book is for you.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Sivarajan, Santhosh (Autor)
Otros Autores: Parikh, Kunal (Editor ), Youe, Rebecca (Editor ), Chaturvedi, Shivangi (Editor ), Shetty, Adithi (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, England ; Mumbai [India] : Packt Publishing, 2015.
Colección:Professional Expertise Distilled
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover; Copyright; Credits; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Operating System and Baseline Security; Microsoft Windows Server; Baseline and security; Security Configuration Wizard; Translating your policy into a technical policy; Creating a policy template; Policy review and validation; Policy implementation; Analyzing the result and troubleshooting; A backup or rollback plan; Summary; Chapter 2: Native MS Security Tools and Configuration; Microsoft SCM; Installing Microsoft SCM; Administering Microsoft SCM
  • Creating and implementing security policiesExporting GPO from Active Directory; Importing GPO into SCM; Merging imported GPO with the SCM baseline policy; Exporting the SCM baseline policy; Importing a policy into Active Directory; Maintaining and monitoring the integrity of a baseline policy; Microsoft ASA; Application control and management; AppLocker; Creating a policy; Auditing a policy; Implementing the policy; AppLocker and PowerShell; Summary; Chapter 3: Server Roles and Protocols; Server types and roles; Managing servers using Server Manager; Monitoring and securing server roles
  • Creating a server role baseline reportAnalyzing production servers; Server Message Block; Configuring and implementing SMB; Identifying the client and server operating system; Verifying the current SMB configuration; Enabling or disabling the SMB encryption; Verifying SMB communication; Summary; Chapter 4: Application Security; File or data server; Applying baseline security; The access mechanism; Data protection; Removing unwanted shares; Data encryption using BitLocker encryption; Encrypting data volume; Managing BitLocker volume; Print server; Applying baseline security
  • The print server role securityPrint server access mechanisms; The printer driver security and installation; Print server and share permissions; Hyper-V servers; Applying baseline security; Securing the access mechanism; Guard protection; Enabling the guard protection; Encrypting Hyper-V host servers; Internet Information Services; Applying baseline security; Securing web server components; Securing the access mechanisms; Adding dynamic IP restrictions; Summary; Chapter 5: Network Service Security; Baseline policies; Installing RODCs; Configuring RODCs; Domain Name System
  • Applying a DNS baseline policyEnabling Scavenging on a DNS server; Enabling Scavenging on a DNS zone; Securing DNS dynamic updates; Cache poisoning attacks; Dynamic Host Configuration Protocol; Applying a DHCP baseline policy; Controlling and segregating IP address allocation; Configuring PBA; Securing DHCP administration; IP address and DNS management and monitoring; Service accounts; Group Managed Service Accounts; Creating a KDS root key; Creating Group Managed Service Accounts; Installing Group Managed Service Accounts; Configuring Group Managed Service Accounts