Getting started with windows server security : develop and implement a secure microsoft infrastructure platform using native and built-in tools /
If you are a security or Windows Server administrator wanting to learn or advance your knowledge in Microsoft security and secure your Windows Server infrastructure effectively, this book is for you.
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham, England ; Mumbai [India] :
Packt Publishing,
2015.
|
Colección: | Professional Expertise Distilled
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover; Copyright; Credits; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Operating System and Baseline Security; Microsoft Windows Server; Baseline and security; Security Configuration Wizard; Translating your policy into a technical policy; Creating a policy template; Policy review and validation; Policy implementation; Analyzing the result and troubleshooting; A backup or rollback plan; Summary; Chapter 2: Native MS Security Tools and Configuration; Microsoft SCM; Installing Microsoft SCM; Administering Microsoft SCM
- Creating and implementing security policiesExporting GPO from Active Directory; Importing GPO into SCM; Merging imported GPO with the SCM baseline policy; Exporting the SCM baseline policy; Importing a policy into Active Directory; Maintaining and monitoring the integrity of a baseline policy; Microsoft ASA; Application control and management; AppLocker; Creating a policy; Auditing a policy; Implementing the policy; AppLocker and PowerShell; Summary; Chapter 3: Server Roles and Protocols; Server types and roles; Managing servers using Server Manager; Monitoring and securing server roles
- Creating a server role baseline reportAnalyzing production servers; Server Message Block; Configuring and implementing SMB; Identifying the client and server operating system; Verifying the current SMB configuration; Enabling or disabling the SMB encryption; Verifying SMB communication; Summary; Chapter 4: Application Security; File or data server; Applying baseline security; The access mechanism; Data protection; Removing unwanted shares; Data encryption using BitLocker encryption; Encrypting data volume; Managing BitLocker volume; Print server; Applying baseline security
- The print server role securityPrint server access mechanisms; The printer driver security and installation; Print server and share permissions; Hyper-V servers; Applying baseline security; Securing the access mechanism; Guard protection; Enabling the guard protection; Encrypting Hyper-V host servers; Internet Information Services; Applying baseline security; Securing web server components; Securing the access mechanisms; Adding dynamic IP restrictions; Summary; Chapter 5: Network Service Security; Baseline policies; Installing RODCs; Configuring RODCs; Domain Name System
- Applying a DNS baseline policyEnabling Scavenging on a DNS server; Enabling Scavenging on a DNS zone; Securing DNS dynamic updates; Cache poisoning attacks; Dynamic Host Configuration Protocol; Applying a DHCP baseline policy; Controlling and segregating IP address allocation; Configuring PBA; Securing DHCP administration; IP address and DNS management and monitoring; Service accounts; Group Managed Service Accounts; Creating a KDS root key; Creating Group Managed Service Accounts; Installing Group Managed Service Accounts; Configuring Group Managed Service Accounts