Ebook640 pages14 hours
How to Cheat at Designing Security for a Windows Server 2003 Network
By Chris Ruston and Chris Peiris
Rating: 3 out of 5 stars
3/5
()
About this ebook
Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, according to bill gates, is the company's #1 priority.
While considering the security needs of your organiztion, you need to balance the human and the technical in order to create the best security design for your organization. Securing a Windows Server 2003 enterprise network is hardly a small undertaking, but it becomes quite manageable if you approach it in an organized and systematic way. This includes configuring software, services, and protocols to meet an organization’s security needs.
* The Perfect Guide if "System Administrator is NOT your primary job function
* Avoid "time drains" configuring the many different security standards built into Windows 2003
* Secure VPN and Extranet Communications
While considering the security needs of your organiztion, you need to balance the human and the technical in order to create the best security design for your organization. Securing a Windows Server 2003 enterprise network is hardly a small undertaking, but it becomes quite manageable if you approach it in an organized and systematic way. This includes configuring software, services, and protocols to meet an organization’s security needs.
* The Perfect Guide if "System Administrator is NOT your primary job function
* Avoid "time drains" configuring the many different security standards built into Windows 2003
* Secure VPN and Extranet Communications
Related to How to Cheat at Designing Security for a Windows Server 2003 Network
Related ebooks
How to Cheat at Designing Security for a Windows Server 2003 Network Rating: 2 out of 5 stars2/5How to Cheat at Managing Windows Server Update Services Rating: 0 out of 5 stars0 ratingsWireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks! Rating: 5 out of 5 stars5/5Black Hat Physical Device Security: Exploiting Hardware and Software: Exploiting Hardware and Software Rating: 4 out of 5 stars4/5Perfect Password: Selection, Protection, Authentication Rating: 4 out of 5 stars4/5Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services Rating: 0 out of 5 stars0 ratingsHow to Cheat at Managing Windows Small Business Server 2003: In the Land of the Blind, the One-Eyed Man is King Rating: 0 out of 5 stars0 ratingsCYA Securing Exchange Server 2003 Rating: 0 out of 5 stars0 ratingsConfiguring NetScreen Firewalls Rating: 0 out of 5 stars0 ratingsIntrusion Prevention and Active Response: Deploying Network and Host IPS Rating: 3 out of 5 stars3/5IT Ethics Handbook:: Right and Wrong for IT Professionals Rating: 0 out of 5 stars0 ratingsBiz Talk Server 2000 Developer's Guide Rating: 0 out of 5 stars0 ratingsNetwork Security Evaluation Using the NSA IEM Rating: 3 out of 5 stars3/5Practical VoIP Security Rating: 0 out of 5 stars0 ratingsConfiguring Symantec AntiVirus Enterprise Edition Rating: 0 out of 5 stars0 ratingsConfiguring Check Point NGX VPN-1/Firewall-1 Rating: 3 out of 5 stars3/5Securing IM and P2P Applications for the Enterprise Rating: 0 out of 5 stars0 ratingsXML Net Developers Guide Rating: 0 out of 5 stars0 ratingsCYA Securing IIS 6.0 Rating: 0 out of 5 stars0 ratingsSecurity Log Management: Identifying Patterns in the Chaos Rating: 3 out of 5 stars3/5How to Cheat at Managing Microsoft Operations Manager 2005 Rating: 0 out of 5 stars0 ratingsFirewall Policies and VPN Configurations Rating: 0 out of 5 stars0 ratingsHacking a Terror Network: The Silent Threat of Covert Channels Rating: 5 out of 5 stars5/5CheckPoint NG VPN 1/Firewall 1: Advanced Configuration and Troubleshooting Rating: 0 out of 5 stars0 ratingsHow to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure Rating: 0 out of 5 stars0 ratingsBuilding DMZs For Enterprise Networks Rating: 4 out of 5 stars4/5Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives Rating: 5 out of 5 stars5/5Hack Proofing Your Identity In The Information Age Rating: 4 out of 5 stars4/5How to Cheat at Configuring ISA Server 2004 Rating: 0 out of 5 stars0 ratingsNokia Network Security Solutions Handbook Rating: 0 out of 5 stars0 ratings
Computers For You
The Mega Box: The Ultimate Guide to the Best Free Resources on the Internet Rating: 4 out of 5 stars4/5Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5Procreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 0 out of 5 stars0 ratingsStorytelling with Data: Let's Practice! Rating: 4 out of 5 stars4/5Quantum Computing For Dummies Rating: 0 out of 5 stars0 ratingsThe ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 0 out of 5 stars0 ratingsTor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5AWS Certified Cloud Practitioner All-in-One Exam Guide (Exam CLF-C01) Rating: 5 out of 5 stars5/5SQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5CompTIA Security+ Get Certified Get Ahead: SY0-701 Study Guide Rating: 5 out of 5 stars5/5Deep Search: How to Explore the Internet More Effectively Rating: 5 out of 5 stars5/5Artificial Intelligence: The Complete Beginner’s Guide to the Future of A.I. Rating: 4 out of 5 stars4/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5101 Awesome Builds: Minecraft® Secrets from the World's Greatest Crafters Rating: 4 out of 5 stars4/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Learning the Chess Openings Rating: 5 out of 5 stars5/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5AP® Computer Science Principles Crash Course Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Practice Questions Rating: 2 out of 5 stars2/5Elon Musk Rating: 4 out of 5 stars4/5Ultimate Guide to Mastering Command Blocks!: Minecraft Keys to Unlocking Secret Commands Rating: 5 out of 5 stars5/5User Friendly: How the Hidden Rules of Design Are Changing the Way We Live, Work, and Play Rating: 4 out of 5 stars4/5CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsThe Professional Voiceover Handbook: Voiceover training, #1 Rating: 5 out of 5 stars5/5
Reviews for How to Cheat at Designing Security for a Windows Server 2003 Network
Rating: 2.8333333333333335 out of 5 stars
3/5
3 ratings1 review
- Rating: 2 out of 5 stars2/5To be fair, there's a great deal of detailed security-related information presented in this book. Unfortunately, there are several problems with the book that keep it from being useful for most Windows Server admins. First, it is poorly organized. There is little logical flow to the order in which topics are introduced. For example, often the details of a feature are discussed before the general overview of the feature is presented, or without an explanation of where the feature fits in with the overall security topic being discussed. Transitions between topics are also lacking -- the book sometimes reads like a random list of features, each with a one- or two-paragraph explanation, but without any effort to tie them together and explain to the reader in a clear, concise way how they work together. Needless to say, this is very confusing for the reader, and seriously detracts from the usefulness of the information. The other problem is target audience: is this book for relative beginners, part-time admins (as the jacket copy suggests), or experienced enterprise admins? Much of the information presented goes well above and beyond what a typical small- to medium-sized business IT admin would need or want. For example, do part-time sys admins really need or want 5 pages of detailed discussion (including diagrams) of the packet structures of the various IPSec modes? Or do they need a half-page summary of the various modes, their advantages/disadvantages, and recommended best-practices for their use in a real-world setting? Here's another example: the chapter that discusses how to manage permissions for shared folders includes a chart that shows how access tokens and ACLs work, literally breaking it down TO THE BINARY LEVEL (1s and 0s)! Why on earth would any sys admin ever need to know this? The best analogy I can think of is, imagine you need someone to show you how to put gasoline in your car, and instead they launch into an explanation of the molecular structure of petroleum... Windows includes graphical interfaces for assigning permissions to resources and users, editing security policies, and viewing the effective permissions that result for a given user or group. What the reader needs, of course, is an explanation of what the various permissions mean, and how to use them. Perhaps worst of all, despite all the detail, the key issues of core Windows Server 2003 security aren't clearly identified and covered in a way that non-security expert admins can quickly grasp and make use of to secure their networks. With all the focus on technical detail, the authors seem to have forgotten to explain the basics. (I'm tempted to make a bad pun here about not describing the domain forest due to all the detail about the trees...) Bottom line: This is not the book for part-time admins, or admins of smaller networks who need a quick lesson in securing their Windows 2003 servers. For readers looking for what the back cover of this book promises, the Windows Server 2003 Network training kit book from Microsoft is a much better choice.
Book preview
How to Cheat at Designing Security for a Windows Server 2003 Network - Chris Ruston
Enjoying the preview?
Page 1 of 1