Microsoft Windows Security Fundamentals (eBook)
832 Seiten
Elsevier Science (Verlag)
978-0-08-049188-2 (ISBN)
Since its release in 2003 the Microsoft Exchange server has had two important updates, SP1 and SP2. SP1, allows users to increase their security, reliability and simplify the administration of the program. Within SP1, Microsoft has implemented R2 which improves identity and access management across security-related boundaries. R2 also improves branch office server management and increases the efficiency of storage setup and management. The second update, SP2 minimizes spam, pop-ups and unwanted downloads. These two updated have added an enormous amount of programming security to the server software.
* Covers all SP1 and SP2 updates
* Details strategies for patch management
* Provides key techniques to maintain security application upgrades and updates
This is the first of two books serving as an expanded and up-dated version of Windows Server 2003 Security Infrastructures for Windows 2003 Server R2 and SP1 & SP2. The authors choose to encompass this material within two books in order to illustrate the intricacies of the different paths used to secure MS Windows server networks. Since its release in 2003 the Microsoft Exchange server has had two important updates, SP1 and SP2. SP1, allows users to increase their security, reliability and simplify the administration of the program. Within SP1, Microsoft has implemented R2 which improves identity and access management across security-related boundaries. R2 also improves branch office server management and increases the efficiency of storage setup and management. The second update, SP2 minimizes spam, pop-ups and unwanted downloads. These two updated have added an enormous amount of programming security to the server software.* Covers all SP1 and SP2 updates* Details strategies for patch management* Provides key techniques to maintain security application upgrades and updates
Front Cover 1
Microsoft® Windows Security Fundamentals 4
Copyright Page 5
Contents 8
Foreword by Tony Redmond 16
Foreword by Mark Mortimore 18
Foreword by Steven Adler 22
Preface 24
Acknowledgments 28
Part I: Introduction 30
Chapter 1. The Challenge of Trusted Security Infrastructures 32
1.1 Introduction 32
1.2 Positioning Trusted Security Infrastructures 34
1.3 The Fundamental Role of Trust 37
1.4 Trusted Security Infrastructure Roles 37
1.5 The Next Step: Federation 52
1.6 Identity Management and Trusted Security Infrastructures 56
1.7 Microsoft and the Challenge of Trusted Security Infrastructures 60
1.8 Conclusion 64
Chapter 2. Windows Security Authorities and Principals 66
2.1 Security Authorities 66
2.2 Security Principals 82
Chapter 3. Windows Trust Relationships 138
3.1 Defining Trust Relationships 138
3.2 Trust Properties, Types, and Features 140
3.3 Restricting Trusts 151
3.4 Working with Trusts 168
3.5 Trust Relationships: Under the Hood 179
3.6 Trusts and Secure Channels 183
3.7 Trusts and Firewalls 190
Chapter 4. Aspects of Windows Client Security 194
4.1 Client Security Overview 194
4.2 Least Privilege 195
4.3 Windows XP Service Pack 2 Security Enhancements 207
4.4 Browser Security 215
4.5 Malicious Mobile Code Protection 234
4.6 Leveraging Trusted Platform Module Security Functions 244
4.7 Important Windows Vista and IE 7.0 Client Security Features 257
Part II: Authentication 260
Chapter 5. Introducing Windows Authentication 262
5.1 Authentication Basics 262
5.2 Windows Authentication Basics 267
5.3 Logon Rights 284
5.4 NTLM-Based Authentication 290
5.5 Anonymous Access 300
5.6 Credential Caching 306
5.7 Limiting Concurrent Logon Sessions 310
5.8 General Authentication Troubleshooting 321
5.9 What’s in the Other Authentication Chapters? 330
Chapter 6. Kerberos 332
6.1 Introducing Kerberos 332
6.2 Kerberos: The Basic Protocol 336
6.3 Logging on to Windows Using Kerberos 356
6.4 Advanced Kerberos Topics 374
6.5 Kerberos Configuration 419
6.6 Kerberos Troubleshooting 423
6.7 Kerberos Interoperability 425
Chapter 7. IIS Authentication 438
7.1 Secure by Default in IIS 6.0 438
7.2 Introducing IIS Authentication 440
7.3 HTTP Authentication 443
7.4 Integrated Windows Authentication 455
7.5 Passport-Based Authentication 457
7.6 Certificate-Based Authentication 474
7.7 IIS Authentication Method Comparison 504
Chapter 8. UNIX/Linux and Windows Authentication Integration 506
8.1 Comparing Windows and UNIX/Linux Authentication 507
8.2 Interoperability Enabling Technologies 508
8.3 UNIX/Linux Security-Related Concepts 513
8.4 Windows and UNIX/Linux Account Management and Authentication Integration Approaches 527
8.5 Summary 561
Chapter 9. Single Sign-On 562
9.1 SSO: Pros and Cons 562
9.2 Web versus Enterprise SSO 563
9.3 SSO Architectures 564
9.4 Extending SSO 579
9.5 Microsoft SSO Technologies 582
9.6 Conclusion 608
Part III: Authorization 610
Chapter 10. Windows Server 2003 Authorization 612
10.1 Authorization Basics 612
10.2 The Windows Authorization Model 613
10.3 Authorization Intermediaries 619
10.4 Windows 2000 Authorization Changes 653
10.5 Windows Server 2003 Authorization Changes 688
10.6 Authorization Tools 719
Chapter 11. Active Directory Delegation 722
11.1 Introduction 722
11.2 General AD Delegation Guidelines 734
11.3 Setting up Administrative Delegation 748
11.4 Hiding Objects in AD 761
11.5 Third-Party AD Delegation Tools 800
Index 802
Erscheint lt. Verlag | 8.4.2011 |
---|---|
Sprache | englisch |
Themenwelt | Informatik ► Betriebssysteme / Server ► Windows |
Informatik ► Betriebssysteme / Server ► Windows Server | |
Mathematik / Informatik ► Informatik ► Datenbanken | |
Informatik ► Netzwerke ► Sicherheit / Firewall | |
Informatik ► Office Programme ► Outlook | |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-08-049188-X / 008049188X |
ISBN-13 | 978-0-08-049188-2 / 9780080491882 |
Haben Sie eine Frage zum Produkt? |
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich