Ebook640 pages14 hours
How to Cheat at Designing Security for a Windows Server 2003 Network
By Chris Peiris and Chris Ruston
Rating: 2 out of 5 stars
2/5
()
About this ebook
Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, according to bill gates, is the company's #1 priority.
While considering the security needs of your organiztion, you need to balance the human and the technical in order to create the best security design for your organization. Securing a Windows Server 2003 enterprise network is hardly a small undertaking, but it becomes quite manageable if you approach it in an organized and systematic way. This includes configuring software, services, and protocols to meet an organization’s security needs.
* The Perfect Guide if "System Administrator is NOT your primary job function
* Avoid "time drains" configuring the many different security standards built into Windows 2003
* Secure VPN and Extranet Communications
While considering the security needs of your organiztion, you need to balance the human and the technical in order to create the best security design for your organization. Securing a Windows Server 2003 enterprise network is hardly a small undertaking, but it becomes quite manageable if you approach it in an organized and systematic way. This includes configuring software, services, and protocols to meet an organization’s security needs.
* The Perfect Guide if "System Administrator is NOT your primary job function
* Avoid "time drains" configuring the many different security standards built into Windows 2003
* Secure VPN and Extranet Communications
Read more from Chris Peiris
Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks Rating: 0 out of 5 stars0 ratingsCYA Securing IIS 6.0 Rating: 0 out of 5 stars0 ratingsHow to Cheat at Designing Security for a Windows Server 2003 Network Rating: 3 out of 5 stars3/5
Related to How to Cheat at Designing Security for a Windows Server 2003 Network
Titles in the series (9)
How to Cheat at Managing Windows Server Update Services Rating: 0 out of 5 stars0 ratingsHow to Cheat at IT Project Management Rating: 0 out of 5 stars0 ratingsHow to Cheat at Designing Security for a Windows Server 2003 Network Rating: 2 out of 5 stars2/5How to Cheat at Administering Office Communications Server 2007 Rating: 0 out of 5 stars0 ratingsHow to Cheat at Microsoft Vista Administration Rating: 0 out of 5 stars0 ratingsHow to Cheat at Managing Microsoft Operations Manager 2005 Rating: 0 out of 5 stars0 ratingsHow to Cheat at Securing Your Network Rating: 0 out of 5 stars0 ratingsHow to Cheat at Managing Windows Small Business Server 2003: In the Land of the Blind, the One-Eyed Man is King Rating: 0 out of 5 stars0 ratingsHow to Cheat at Configuring VmWare ESX Server Rating: 0 out of 5 stars0 ratings
Related ebooks
How to Cheat at Managing Windows Server Update Services Rating: 0 out of 5 stars0 ratingsWireless Hacking: Projects for Wi-Fi Enthusiasts: Cut the cord and discover the world of wireless hacks! Rating: 5 out of 5 stars5/5Black Hat Physical Device Security: Exploiting Hardware and Software Rating: 0 out of 5 stars0 ratingsPerfect Password: Selection, Protection, Authentication Rating: 4 out of 5 stars4/5Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services Rating: 0 out of 5 stars0 ratingsHow to Cheat at Managing Windows Small Business Server 2003: In the Land of the Blind, the One-Eyed Man is King Rating: 0 out of 5 stars0 ratingsCYA Securing Exchange Server 2003 Rating: 0 out of 5 stars0 ratingsConfiguring NetScreen Firewalls Rating: 0 out of 5 stars0 ratingsIntrusion Prevention and Active Response: Deploying Network and Host IPS Rating: 3 out of 5 stars3/5IT Ethics Handbook:: Right and Wrong for IT Professionals Rating: 0 out of 5 stars0 ratingsBiz Talk Server 2000 Developer's Guide Rating: 0 out of 5 stars0 ratingsNetwork Security Evaluation Using the NSA IEM Rating: 3 out of 5 stars3/5Practical VoIP Security Rating: 0 out of 5 stars0 ratingsConfiguring Symantec AntiVirus Enterprise Edition Rating: 0 out of 5 stars0 ratingsConfiguring Check Point NGX VPN-1/Firewall-1 Rating: 0 out of 5 stars0 ratingsSecuring IM and P2P Applications for the Enterprise Rating: 0 out of 5 stars0 ratingsXML Net Developers Guide Rating: 0 out of 5 stars0 ratingsCYA Securing IIS 6.0 Rating: 0 out of 5 stars0 ratingsSecurity Log Management: Identifying Patterns in the Chaos Rating: 3 out of 5 stars3/5How to Cheat at Managing Microsoft Operations Manager 2005 Rating: 0 out of 5 stars0 ratingsFirewall Policies and VPN Configurations Rating: 0 out of 5 stars0 ratingsCheckPoint NG VPN 1/Firewall 1: Advanced Configuration and Troubleshooting Rating: 0 out of 5 stars0 ratingsHacking a Terror Network: The Silent Threat of Covert Channels Rating: 5 out of 5 stars5/5How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure Rating: 0 out of 5 stars0 ratingsBuilding DMZs For Enterprise Networks Rating: 4 out of 5 stars4/5Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives Rating: 5 out of 5 stars5/5Hack Proofing Your Identity In The Information Age Rating: 4 out of 5 stars4/5How to Cheat at Configuring ISA Server 2004 Rating: 0 out of 5 stars0 ratingsNokia Network Security Solutions Handbook Rating: 0 out of 5 stars0 ratingsSyngress IT Security Project Management Handbook Rating: 0 out of 5 stars0 ratings
Security For You
How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsSocial Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHacking For Dummies Rating: 4 out of 5 stars4/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5CISSP Study Guide Rating: 4 out of 5 stars4/5Cybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratingsGame Console Hacking: Xbox, PlayStation, Nintendo, Game Boy, Atari and Sega Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratings
Reviews for How to Cheat at Designing Security for a Windows Server 2003 Network
Rating: 1.75 out of 5 stars
2/5
2 ratings1 review
- Rating: 2 out of 5 stars2/5To be fair, there's a great deal of detailed security-related information presented in this book. Unfortunately, there are several problems with the book that keep it from being useful for most Windows Server admins. First, it is poorly organized. There is little logical flow to the order in which topics are introduced. For example, often the details of a feature are discussed before the general overview of the feature is presented, or without an explanation of where the feature fits in with the overall security topic being discussed. Transitions between topics are also lacking -- the book sometimes reads like a random list of features, each with a one- or two-paragraph explanation, but without any effort to tie them together and explain to the reader in a clear, concise way how they work together. Needless to say, this is very confusing for the reader, and seriously detracts from the usefulness of the information. The other problem is target audience: is this book for relative beginners, part-time admins (as the jacket copy suggests), or experienced enterprise admins? Much of the information presented goes well above and beyond what a typical small- to medium-sized business IT admin would need or want. For example, do part-time sys admins really need or want 5 pages of detailed discussion (including diagrams) of the packet structures of the various IPSec modes? Or do they need a half-page summary of the various modes, their advantages/disadvantages, and recommended best-practices for their use in a real-world setting? Here's another example: the chapter that discusses how to manage permissions for shared folders includes a chart that shows how access tokens and ACLs work, literally breaking it down TO THE BINARY LEVEL (1s and 0s)! Why on earth would any sys admin ever need to know this? The best analogy I can think of is, imagine you need someone to show you how to put gasoline in your car, and instead they launch into an explanation of the molecular structure of petroleum... Windows includes graphical interfaces for assigning permissions to resources and users, editing security policies, and viewing the effective permissions that result for a given user or group. What the reader needs, of course, is an explanation of what the various permissions mean, and how to use them. Perhaps worst of all, despite all the detail, the key issues of core Windows Server 2003 security aren't clearly identified and covered in a way that non-security expert admins can quickly grasp and make use of to secure their networks. With all the focus on technical detail, the authors seem to have forgotten to explain the basics. (I'm tempted to make a bad pun here about not describing the domain forest due to all the detail about the trees...) Bottom line: This is not the book for part-time admins, or admins of smaller networks who need a quick lesson in securing their Windows 2003 servers. For readers looking for what the back cover of this book promises, the Windows Server 2003 Network training kit book from Microsoft is a much better choice.
Book preview
How to Cheat at Designing Security for a Windows Server 2003 Network - Chris Peiris
Enjoying the preview?
Page 1 of 1