Ebook640 pages14 hours
How to Cheat at Designing Security for a Windows Server 2003 Network
By Chris Ruston and Chris Peiris
Rating: 3 out of 5 stars
3/5
()
About this ebook
Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, according to bill gates, is the company's #1 priority.
While considering the security needs of your organiztion, you need to balance the human and the technical in order to create the best security design for your organization. Securing a Windows Server 2003 enterprise network is hardly a small undertaking, but it becomes quite manageable if you approach it in an organized and systematic way. This includes configuring software, services, and protocols to meet an organization’s security needs.
* The Perfect Guide if "System Administrator is NOT your primary job function
* Avoid "time drains" configuring the many different security standards built into Windows 2003
* Secure VPN and Extranet Communications
While considering the security needs of your organiztion, you need to balance the human and the technical in order to create the best security design for your organization. Securing a Windows Server 2003 enterprise network is hardly a small undertaking, but it becomes quite manageable if you approach it in an organized and systematic way. This includes configuring software, services, and protocols to meet an organization’s security needs.
* The Perfect Guide if "System Administrator is NOT your primary job function
* Avoid "time drains" configuring the many different security standards built into Windows 2003
* Secure VPN and Extranet Communications
Related to How to Cheat at Designing Security for a Windows Server 2003 Network
Related ebooks
How to Cheat at Designing Security for a Windows Server 2003 Network Rating: 2 out of 5 stars2/5How to Cheat at Managing Windows Server Update Services Rating: 0 out of 5 stars0 ratingsWireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks! Rating: 5 out of 5 stars5/5Black Hat Physical Device Security: Exploiting Hardware and Software Rating: 0 out of 5 stars0 ratingsPerfect Password: Selection, Protection, Authentication Rating: 4 out of 5 stars4/5Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services Rating: 0 out of 5 stars0 ratingsHow to Cheat at Managing Windows Small Business Server 2003: In the Land of the Blind, the One-Eyed Man is King Rating: 0 out of 5 stars0 ratingsCYA Securing Exchange Server 2003 Rating: 0 out of 5 stars0 ratingsConfiguring NetScreen Firewalls Rating: 0 out of 5 stars0 ratingsIntrusion Prevention and Active Response: Deploying Network and Host IPS Rating: 3 out of 5 stars3/5IT Ethics Handbook:: Right and Wrong for IT Professionals Rating: 0 out of 5 stars0 ratingsBiz Talk Server 2000 Developer's Guide Rating: 0 out of 5 stars0 ratingsNetwork Security Evaluation Using the NSA IEM Rating: 3 out of 5 stars3/5Practical VoIP Security Rating: 0 out of 5 stars0 ratingsConfiguring Symantec AntiVirus Enterprise Edition Rating: 0 out of 5 stars0 ratingsConfiguring Check Point NGX VPN-1/Firewall-1 Rating: 0 out of 5 stars0 ratingsSecuring IM and P2P Applications for the Enterprise Rating: 0 out of 5 stars0 ratingsCYA Securing IIS 6.0 Rating: 0 out of 5 stars0 ratingsXML Net Developers Guide Rating: 0 out of 5 stars0 ratingsSecurity Log Management: Identifying Patterns in the Chaos Rating: 3 out of 5 stars3/5How to Cheat at Managing Microsoft Operations Manager 2005 Rating: 0 out of 5 stars0 ratingsFirewall Policies and VPN Configurations Rating: 0 out of 5 stars0 ratingsHacking a Terror Network: The Silent Threat of Covert Channels Rating: 5 out of 5 stars5/5CheckPoint NG VPN 1/Firewall 1: Advanced Configuration and Troubleshooting Rating: 0 out of 5 stars0 ratingsHow to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure Rating: 0 out of 5 stars0 ratingsBuilding DMZs For Enterprise Networks Rating: 4 out of 5 stars4/5Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives Rating: 5 out of 5 stars5/5How to Cheat at Configuring ISA Server 2004 Rating: 0 out of 5 stars0 ratingsHack Proofing Your Identity In The Information Age Rating: 4 out of 5 stars4/5Nokia Network Security Solutions Handbook Rating: 0 out of 5 stars0 ratings
Computers For You
Mastering ChatGPT: 21 Prompts Templates for Effortless Writing Rating: 5 out of 5 stars5/5SQL QuickStart Guide: The Simplified Beginner's Guide to Managing, Analyzing, and Manipulating Data With SQL Rating: 4 out of 5 stars4/5How to Create Cpn Numbers the Right way: A Step by Step Guide to Creating cpn Numbers Legally Rating: 4 out of 5 stars4/5Creating Online Courses with ChatGPT | A Step-by-Step Guide with Prompt Templates Rating: 4 out of 5 stars4/5Deep Search: How to Explore the Internet More Effectively Rating: 5 out of 5 stars5/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5CompTIA IT Fundamentals (ITF+) Study Guide: Exam FC0-U61 Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Practice Questions Rating: 2 out of 5 stars2/5The ChatGPT Millionaire Handbook: Make Money Online With the Power of AI Technology Rating: 0 out of 5 stars0 ratingsNetwork+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Ultimate Guide to Mastering Command Blocks!: Minecraft Keys to Unlocking Secret Commands Rating: 5 out of 5 stars5/5Procreate for Beginners: Introduction to Procreate for Drawing and Illustrating on the iPad Rating: 0 out of 5 stars0 ratingsPractical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5ChatGPT Ultimate User Guide - How to Make Money Online Faster and More Precise Using AI Technology Rating: 0 out of 5 stars0 ratingsAP Computer Science Principles Premium, 2024: 6 Practice Tests + Comprehensive Review + Online Practice Rating: 0 out of 5 stars0 ratingsChildhood Unplugged: Practical Advice to Get Kids Off Screens and Find Balance Rating: 0 out of 5 stars0 ratingsThe Professional Voiceover Handbook: Voiceover training, #1 Rating: 5 out of 5 stars5/5Dark Aeon: Transhumanism and the War Against Humanity Rating: 5 out of 5 stars5/5Elon Musk Rating: 4 out of 5 stars4/5Master Builder Roblox: The Essential Guide Rating: 4 out of 5 stars4/5101 Awesome Builds: Minecraft® Secrets from the World's Greatest Crafters Rating: 4 out of 5 stars4/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5
Reviews for How to Cheat at Designing Security for a Windows Server 2003 Network
Rating: 2.8333333333333335 out of 5 stars
3/5
3 ratings1 review
- Rating: 2 out of 5 stars2/5To be fair, there's a great deal of detailed security-related information presented in this book. Unfortunately, there are several problems with the book that keep it from being useful for most Windows Server admins. First, it is poorly organized. There is little logical flow to the order in which topics are introduced. For example, often the details of a feature are discussed before the general overview of the feature is presented, or without an explanation of where the feature fits in with the overall security topic being discussed. Transitions between topics are also lacking -- the book sometimes reads like a random list of features, each with a one- or two-paragraph explanation, but without any effort to tie them together and explain to the reader in a clear, concise way how they work together. Needless to say, this is very confusing for the reader, and seriously detracts from the usefulness of the information. The other problem is target audience: is this book for relative beginners, part-time admins (as the jacket copy suggests), or experienced enterprise admins? Much of the information presented goes well above and beyond what a typical small- to medium-sized business IT admin would need or want. For example, do part-time sys admins really need or want 5 pages of detailed discussion (including diagrams) of the packet structures of the various IPSec modes? Or do they need a half-page summary of the various modes, their advantages/disadvantages, and recommended best-practices for their use in a real-world setting? Here's another example: the chapter that discusses how to manage permissions for shared folders includes a chart that shows how access tokens and ACLs work, literally breaking it down TO THE BINARY LEVEL (1s and 0s)! Why on earth would any sys admin ever need to know this? The best analogy I can think of is, imagine you need someone to show you how to put gasoline in your car, and instead they launch into an explanation of the molecular structure of petroleum... Windows includes graphical interfaces for assigning permissions to resources and users, editing security policies, and viewing the effective permissions that result for a given user or group. What the reader needs, of course, is an explanation of what the various permissions mean, and how to use them. Perhaps worst of all, despite all the detail, the key issues of core Windows Server 2003 security aren't clearly identified and covered in a way that non-security expert admins can quickly grasp and make use of to secure their networks. With all the focus on technical detail, the authors seem to have forgotten to explain the basics. (I'm tempted to make a bad pun here about not describing the domain forest due to all the detail about the trees...) Bottom line: This is not the book for part-time admins, or admins of smaller networks who need a quick lesson in securing their Windows 2003 servers. For readers looking for what the back cover of this book promises, the Windows Server 2003 Network training kit book from Microsoft is a much better choice.
Book preview
How to Cheat at Designing Security for a Windows Server 2003 Network - Chris Ruston
Enjoying the preview?
Page 1 of 1