Thor's Microsoft security bible : a collection of practical security techniques /
Thor's Microsoftʼ Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Serve...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Waltham, MA :
Syngress,
©2011.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Chapter 1. Securely Writing Web Proxy Log Data to Structured Query Language (SQL) Server and Programmatically Monitoring Web Traffic Data in Order to Automatically Inject Allow/Deny Rules into Threat Management Gateway (TMG)
- Chapter 2. Internet Information Server (IIS) Authentication and Authorization Models, and Locking Down File Access with Encrypting File System (EFS) and Web Distributed Authoring and Versioning (Web DAV)
- Chapter 3. Analyzing and Blocking Malicious Traffic Based on Geolocation
- Chapter 4. Creating an Externally Accessible Authenticated Proxy in a Secure Manner
- Chapter 5. The Creation and Maintenance of Low Privileged Service Users (with a focus on SQL)
- Chapter 6. Remote Security Log Collection in a Least Privilege Environment
- Chapter 7. Securing RDP
- Appendix A: List Of Acronyms
- Appendix B: Full list of Server 2008 logs via WEVTUTIL tool.