Description |
1 online resource (1 volume) : illustrations |
Series |
Professional expertise distilled |
|
Professional expertise distilled
|
Contents |
Cover; Copyright; Credits; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Operating System and Baseline Security; Microsoft Windows Server; Baseline and security; Security Configuration Wizard; Translating your policy into a technical policy; Creating a policy template; Policy review and validation; Policy implementation; Analyzing the result and troubleshooting; A backup or rollback plan; Summary; Chapter 2: Native MS Security Tools and Configuration; Microsoft SCM; Installing Microsoft SCM; Administering Microsoft SCM |
|
Creating and implementing security policiesExporting GPO from Active Directory; Importing GPO into SCM; Merging imported GPO with the SCM baseline policy; Exporting the SCM baseline policy; Importing a policy into Active Directory; Maintaining and monitoring the integrity of a baseline policy; Microsoft ASA; Application control and management; AppLocker; Creating a policy; Auditing a policy; Implementing the policy; AppLocker and PowerShell; Summary; Chapter 3: Server Roles and Protocols; Server types and roles; Managing servers using Server Manager; Monitoring and securing server roles |
|
Creating a server role baseline reportAnalyzing production servers; Server Message Block; Configuring and implementing SMB; Identifying the client and server operating system; Verifying the current SMB configuration; Enabling or disabling the SMB encryption; Verifying SMB communication; Summary; Chapter 4: Application Security; File or data server; Applying baseline security; The access mechanism; Data protection; Removing unwanted shares; Data encryption using BitLocker encryption; Encrypting data volume; Managing BitLocker volume; Print server; Applying baseline security |
|
The print server role securityPrint server access mechanisms; The printer driver security and installation; Print server and share permissions; Hyper-V servers; Applying baseline security; Securing the access mechanism; Guard protection; Enabling the guard protection; Encrypting Hyper-V host servers; Internet Information Services; Applying baseline security; Securing web server components; Securing the access mechanisms; Adding dynamic IP restrictions; Summary; Chapter 5: Network Service Security; Baseline policies; Installing RODCs; Configuring RODCs; Domain Name System |
|
Applying a DNS baseline policyEnabling Scavenging on a DNS server; Enabling Scavenging on a DNS zone; Securing DNS dynamic updates; Cache poisoning attacks; Dynamic Host Configuration Protocol; Applying a DHCP baseline policy; Controlling and segregating IP address allocation; Configuring PBA; Securing DHCP administration; IP address and DNS management and monitoring; Service accounts; Group Managed Service Accounts; Creating a KDS root key; Creating Group Managed Service Accounts; Installing Group Managed Service Accounts; Configuring Group Managed Service Accounts |
Summary |
If you are a security or Windows Server administrator wanting to learn or advance your knowledge in Microsoft security and secure your Windows Server infrastructure effectively, this book is for you |
Notes |
Includes index |
|
Online resource; title from cover page (Safari, viewed March 24, 2015) |
SUBJECT |
Microsoft Windows server. http://id.loc.gov/authorities/names/n99003751
|
|
Microsoft Windows server. fast (OCoLC)fst01391015 |
Subject |
Client/server computing -- Security measures
|
|
Computer networks -- Security measures.
|
|
Computer security
|
|
COMPUTERS -- Security -- General.
|
|
COMPUTERS -- Security -- Viruses & Malware.
|
|
Computer networks -- Security measures.
|
|
Computer security.
|
Form |
Electronic book
|
ISBN |
9781784390259 |
|
1784390259 |
|
1784398721 |
|
9781784398729 |
|