Introduction | p. xix |
Self-Assessment | p. xxv |
Implementing and Managing Security Policies | p. 1 |
Managing Security Mechanisms in Windows Server 2003 | p. 2 |
Planning Security Group Scope | p. 2 |
Planning Nested Group Structure | p. 3 |
Configuring Windows Server 2003 Security Mechanisms | p. 5 |
Planning and Deploying Security Templates | p. 14 |
Planning the Deployment of Security Templates | p. 15 |
Deploying Security Templates by Using Active Directory-Based GPOs | p. 16 |
Deploying Security Templates Using Command-Line Tools and Scripting | p. 18 |
Configuring Extra Security Based on Server Roles | p. 20 |
SQL Server Computer | p. 21 |
Exchange Server Computer | p. 21 |
Domain Controller | p. 22 |
Internet Authentication Service (IAS) Server | p. 23 |
Internet Information Services (IIS) Server | p. 24 |
Planning Security for the DHCP and DNS Infrastructure Services | p. 25 |
Configuring Extra Security Based on Client Roles | p. 26 |
Planning and Configuring Security Settings | p. 27 |
Planning Network Zones for Computer Roles | p. 28 |
Planning and Configuring Software Restriction Policies | p. 29 |
Planning and Configuring Auditing and Logging Computer Roles | p. 31 |
Windows Events | p. 31 |
Internet Information Services (IIS) | p. 31 |
Firewall Log Files | p. 32 |
Netlogon | p. 32 |
Remote Access Service (RAS) Log Files | p. 33 |
Analyzing Security Configuration | p. 33 |
Using Microsoft Baseline Security Analyzer (MBSA) | p. 33 |
Using the MBSA Command-Line Tool | p. 33 |
Using Security Configuration and Analysis | p. 34 |
Exam Prep Questions | p. 36 |
Implementing, Managing, and Troubleshooting Patch Management Infrastructure | p. 41 |
Planning, Evaluating, and Testing the Deployment of Service Packs and Hotfixes | p. 42 |
Evaluating the Applicability of Service Packs and Hotfixes | p. 43 |
Testing the Compatibility of Service Packs and Hotfixes for Existing Applications | p. 45 |
Planning Patch Deployment Environments for Both the Pilot and Production Phases | p. 47 |
Planning the Batch Deployment of Multiple Hotfixes | p. 49 |
Planning Rollback Strategy | p. 50 |
Using MBSA to Assess the Current Status of Service Packs and Hotfixes | p. 51 |
Deploying Service Packs and Hotfixes | p. 58 |
Troubleshooting Patch Management Infrastructure | p. 66 |
Exam Prep Questions | p. 69 |
Implementing and Managing Security for Network Communications | p. 75 |
Planning an IPSec Deployment | p. 76 |
Deciding Which IPSec Mode to Use | p. 76 |
Planning Authentication Methods for IPSec | p. 78 |
Security Authentication with IPSec | p. 80 |
Testing the Functionality of Existing Applications and Services | p. 82 |
Configuring IPSec Policies | p. 83 |
Transport Mode | p. 84 |
Tunnel Mode | p. 85 |
IPSec Policy Rules | p. 87 |
Deploying and Managing IPSec Policies | p. 90 |
Deploying IPSec Using Local Policy Objects | p. 91 |
Deploying IPSec Using Group Policy Objects | p. 92 |
Deploying IPSec Using Commands and Scripts | p. 92 |
Deploying IPSec Certificates | p. 93 |
Exam Prep Questions | p. 95 |
Planning and Configuring Authentication and Authorization for Remote Access Users | p. 101 |
Deploying, Managing, and Configuring SSL Certificates | p. 102 |
Configuration of the Web Server for SSL Certificates | p. 103 |
Configuration of the Client for SSL Certificates | p. 105 |
Configuring Security and Authentication for Remote Access Users | p. 106 |
Password Authentication Protocol (PAP) | p. 106 |
Challenge Handshake Authentication Protocol (CHAP) | p. 107 |
Microsoft Challenge Handshake Authentication Protocol (MS-CHAP) | p. 107 |
MS-CHAPv2 | p. 108 |
Extensible Authentication Protocol (EAP) | p. 108 |
Multifactor Authentication | p. 109 |
Configuring and Troubleshooting Virtual Private Network (VPN) Protocols | p. 110 |
Internet Service Providers (ISPs) | p. 111 |
Client Operating Systems | p. 111 |
Network Address Translation (NAT) Devices | p. 112 |
Routing and Remote Access Servers | p. 113 |
Firewalls (Servers or Devices) | p. 113 |
Managing Client Configuration for Remote Access Security | p. 114 |
Remote Access Policy | p. 114 |
Connection Manager Administration Kit (CMAK) | p. 117 |
Exam Prep Questions | p. 118 |
Planning, Configuring, and Troubleshooting PKI | p. 123 |
Public Key Infrastructure (PKI) and Certification Authority (CA) Hierarchies | p. 124 |
Certification Authority Hierarchies and Roles | p. 125 |
Installing and Configuring Root, Intermediate, and Issuing CAs | p. 126 |
Managing CAs | p. 130 |
Configuring Certificate Templates | p. 130 |
Configuring, Managing, and Troubleshooting CRLs | p. 134 |
Configuring Archival and Recovery of Keys | p. 136 |
Deploying and Revoking Certificates to Users, Computers, and CAs | p. 138 |
Backing Up and Restoring the CA | p. 142 |
Backing up and Restoring Certificate Storage | p. 143 |
Troubleshooting Authentication, Authorization, and PKI | p. 145 |
Exam Prep Questions | p. 147 |
Troubleshooting Security Policies and IPSec | p. 153 |
Troubleshooting Security Policies | p. 154 |
Troubleshooting Security Policy Inheritance | p. 154 |
Troubleshooting Security Template Problems | p. 159 |
Troubleshooting Security Templates in a Mixed Operating System Environment | p. 161 |
Troubleshooting IPSec | p. 164 |
Monitoring IPSec Policies by Using IP Security Monitor | p. 164 |
Configuring IPSec Logging | p. 167 |
Troubleshooting IPSec Across Networks | p. 169 |
Troubleshooting IPSec Certificates | p. 173 |
Exam Prep Questions | p. 175 |
Planning and Implementing Security for Wireless Networks | p. 181 |
Planning the Authentication Methods for a Wireless Network | p. 183 |
Planning the Encryption Methods for a Wireless Network | p. 185 |
Wired Equivalent Privacy (WEP) | p. 185 |
802.1x | p. 185 |
Use of IPSec with Wireless Networks | p. 186 |
Planning and Configuring Wireless Access Policies | p. 186 |
Creating a Wireless Access Policy in Group Policy | p. 187 |
Using IAS Server to Control Wireless Access | p. 189 |
Configuring SSL Certificates for Wireless Networks | p. 191 |
Certificates and Certificate Templates | p. 191 |
Configuring the IAS Server for Certificates | p. 194 |
Configuring Wireless Encryption | p. 195 |
WEP | p. 195 |
802.1x | p. 196 |
Installing and Configuring Wireless Support for Client Computers | p. 198 |
Windows XP and Windows Server 2003 | p. 198 |
Windows 2000 and Windows CE | p. 200 |
Exam Prep Questions | p. 202 |
Practice Exam #1 | p. 209 |
Answer Key to Practice Exam #1 | p. 237 |
Practice Exam #2 | p. 255 |
Answer Key to Practice Exam #2 | p. 281 |
Table of Contents provided by Rittenhouse. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.