Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

How to Cheat at Designing Security for a Windows Server 2003 Network
How to Cheat at Designing Security for a Windows Server 2003 Network
How to Cheat at Designing Security for a Windows Server 2003 Network
Ebook640 pages14 hours

How to Cheat at Designing Security for a Windows Server 2003 Network

Rating: 3 out of 5 stars

3/5

()

Read preview

About this ebook

Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, according to bill gates, is the company's #1 priority.

While considering the security needs of your organiztion, you need to balance the human and the technical in order to create the best security design for your organization. Securing a Windows Server 2003 enterprise network is hardly a small undertaking, but it becomes quite manageable if you approach it in an organized and systematic way. This includes configuring software, services, and protocols to meet an organization’s security needs.

* The Perfect Guide if "System Administrator is NOT your primary job function

* Avoid "time drains" configuring the many different security standards built into Windows 2003

* Secure VPN and Extranet Communications
LanguageEnglish
Release dateDec 15, 2005
ISBN9780080488967
How to Cheat at Designing Security for a Windows Server 2003 Network

Related to How to Cheat at Designing Security for a Windows Server 2003 Network

Related ebooks

Computers For You

View More

Related articles

Reviews for How to Cheat at Designing Security for a Windows Server 2003 Network

Rating: 2.8333333333333335 out of 5 stars
3/5

3 ratings1 review

What did you think?

Tap to rate

Review must be at least 10 words

  • Rating: 2 out of 5 stars
    2/5
    To be fair, there's a great deal of detailed security-related information presented in this book. Unfortunately, there are several problems with the book that keep it from being useful for most Windows Server admins. First, it is poorly organized. There is little logical flow to the order in which topics are introduced. For example, often the details of a feature are discussed before the general overview of the feature is presented, or without an explanation of where the feature fits in with the overall security topic being discussed. Transitions between topics are also lacking -- the book sometimes reads like a random list of features, each with a one- or two-paragraph explanation, but without any effort to tie them together and explain to the reader in a clear, concise way how they work together. Needless to say, this is very confusing for the reader, and seriously detracts from the usefulness of the information. The other problem is target audience: is this book for relative beginners, part-time admins (as the jacket copy suggests), or experienced enterprise admins? Much of the information presented goes well above and beyond what a typical small- to medium-sized business IT admin would need or want. For example, do part-time sys admins really need or want 5 pages of detailed discussion (including diagrams) of the packet structures of the various IPSec modes? Or do they need a half-page summary of the various modes, their advantages/disadvantages, and recommended best-practices for their use in a real-world setting? Here's another example: the chapter that discusses how to manage permissions for shared folders includes a chart that shows how access tokens and ACLs work, literally breaking it down TO THE BINARY LEVEL (1s and 0s)! Why on earth would any sys admin ever need to know this? The best analogy I can think of is, imagine you need someone to show you how to put gasoline in your car, and instead they launch into an explanation of the molecular structure of petroleum... Windows includes graphical interfaces for assigning permissions to resources and users, editing security policies, and viewing the effective permissions that result for a given user or group. What the reader needs, of course, is an explanation of what the various permissions mean, and how to use them. Perhaps worst of all, despite all the detail, the key issues of core Windows Server 2003 security aren't clearly identified and covered in a way that non-security expert admins can quickly grasp and make use of to secure their networks. With all the focus on technical detail, the authors seem to have forgotten to explain the basics. (I'm tempted to make a bad pun here about not describing the domain forest due to all the detail about the trees...) Bottom line: This is not the book for part-time admins, or admins of smaller networks who need a quick lesson in securing their Windows 2003 servers. For readers looking for what the back cover of this book promises, the Windows Server 2003 Network training kit book from Microsoft is a much better choice.

Book preview

How to Cheat at Designing Security for a Windows Server 2003 Network - Chris Ruston

Enjoying the preview?
Page 1 of 1