Cargando…

Thor's Microsoft security bible : a collection of practical security techniques /

Thor's Microsoftʼ Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Serve...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Mullen, Timothy M.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Syngress, ©2011.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Chapter 1. Securely Writing Web Proxy Log Data to Structured Query Language (SQL) Server and Programmatically Monitoring Web Traffic Data in Order to Automatically Inject Allow/Deny Rules into Threat Management Gateway (TMG)
  • Chapter 2. Internet Information Server (IIS) Authentication and Authorization Models, and Locking Down File Access with Encrypting File System (EFS) and Web Distributed Authoring and Versioning (Web DAV)
  • Chapter 3. Analyzing and Blocking Malicious Traffic Based on Geolocation
  • Chapter 4. Creating an Externally Accessible Authenticated Proxy in a Secure Manner
  • Chapter 5. The Creation and Maintenance of Low Privileged Service Users (with a focus on SQL)
  • Chapter 6. Remote Security Log Collection in a Least Privilege Environment
  • Chapter 7. Securing RDP
  • Appendix A: List Of Acronyms
  • Appendix B: Full list of Server 2008 logs via WEVTUTIL tool.