Loading…

Thor's Microsoft security bible : a collection of practical security techniques /

Thor's Microsoft� Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every l...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Main Author: Mullen, Timothy M.
Format: Electronic eBook
Language:Inglés
Published: Waltham, MA : Syngress, �2011.
Subjects:
Online Access:Texto completo
Table of Contents:
  • Chapter 1. Securely Writing Web Proxy Log Data to Structured Query Language (SQL) Server and Programmatically Monitoring Web Traffic Data in Order to Automatically Inject Allow/Deny Rules into Threat Management Gateway (TMG)
  • Chapter 2. Internet Information Server (IIS) Authentication and Authorization Models, and Locking Down File Access with Encrypting File System (EFS) and Web Distributed Authoring and Versioning (Web DAV)
  • Chapter 3. Analyzing and Blocking Malicious Traffic Based on Geolocation
  • Chapter 4. Creating an Externally Accessible Authenticated Proxy in a Secure Manner
  • Chapter 5. The Creation and Maintenance of Low Privileged Service Users (with a focus on SQL)
  • Chapter 6. Remote Security Log Collection in a Least Privilege Environment
  • Chapter 7. Securing RDP
  • Appendix A: List Of Acronyms
  • Appendix B: Full list of Server 2008 logs via WEVTUTIL tool.