did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780782143324

MCSA/MCSE: Windows® Server 2003 Network Security Administration Study Guide: Exam 70-299

by ;
  • ISBN13:

    9780782143324

  • ISBN10:

    0782143326

  • Edition: CD
  • Format: Paperback
  • Copyright: 2004-08-01
  • Publisher: Sybex
  • Purchase Benefits
List Price: $49.99

Summary

Here's the book you need to prepare for the Implementing and Administering Security in a Microsoft Windows Server 2003 Network exam (70-299). This Study Guide was developed to meet the exacting requirements of today's certification candidates. In addition to the consistent and accessible instructional approach that earned Sybex the "Best Study Guide" designation in the 2003 CertCities Readers Choice Awards, this book provides: Clear and concise information on administering a secure Windows Server 2003 network Practical examples and insights drawn from real-world experience Leading-edge exam preparation software, including a testing engine and electronic flashcards for your Palm You'll also find authoritative coverage of key exam topics, including: Implementing, Managing, and Troubleshooting Security Policies Implementing, Managing, and Troubleshooting Patch Management Infrastructure Implementing, Managing, and Troubleshooting Security for Network Communications Planning, Configuring, and Troubleshooting Authentication, Authorization, and PKI Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Author Biography

Bill English, MCSE, MCT, is President of Networknowledge, a training and consulting firm located in Minnesota. He has written numerous books, including the Administrator's Guide to SharePoint Portal Server 2001. Russ Kaufmann, MCSE, MCT, has over 11 years' IT experience, most recently with the Root Group as a Microsoft Practice Manager.

Table of Contents

Introduction xxi
Assessment Test xxxiv
Configuring, Deploying, and Troubleshooting Security Templates
1(44)
Group Policy Objects and Windows 2003 Server
3(6)
Configuring Group Policies
4(3)
Applying Group Policies
7(1)
Modifying Group Policy Inheritance
8(1)
Working with Security Templates
9(5)
Default Security Templates
12(1)
Incremental Templates
13(1)
Configuring Templates
14(15)
Account Policies
14(2)
.pol Files
16(1)
Audit Policies
16(5)
User Rights Assignment
21(1)
Security Options
22(1)
System Services
23(1)
Registry and File System Permissions
24(2)
Restricted Groups
26(2)
Event Logs
28(1)
Deploying Security Templates
29(4)
Using Group Policies to Deploy Templates
29(2)
Using Scripts to Deploy Templates
31(2)
Troubleshooting Security Templates
33(2)
Troubleshooting Group Policy-Applied Templates
34(1)
Troubleshooting after Upgrading Operating Systems
35(1)
Troubleshooting Mixed Client Environments
35(1)
Summary
35(1)
Exam Essentials
36(1)
Review Questions
37(5)
Answers to Review Questions
42(3)
Configuring Security Based on Computer Roles
45(42)
SQL Server Security
46(5)
Security Features in SQL Server 2000
47(1)
Windows Security and SQL Server
48(3)
Exchange Server Security
51(2)
Securing the SMTP Service
51(1)
Securing Outlook Web Access
52(1)
Securing Outlook Web Access URLScan, and IIS Lockdown
53(1)
Securing Public Folder Information
53(1)
Windows Domain Controller Security
53(6)
Using Digital Signatures for Communication
54(1)
Securing DNS Updates
55(1)
Restricting Anonymous Access
55(2)
Enabling NTLMv2 for Legacy Clients
57(1)
Hardening the TCP/IP Stack
57(1)
Disabling Auto Generation of 8.3 Filenames
58(1)
Disabling LM Hash Creation
58(1)
Securing Built-in Accounts
58(1)
Infrastructure Security
59(3)
DHCP
60(1)
DNS
61(1)
IIS 5 Server Security
62(8)
IP Address/DNS Restrictions
66(1)
Disabling the IIS Anonymous Account
67(1)
The URLScan Tool
67(3)
IIS 6 Server Security
70(1)
Securing Mobile Communications and Internet Authentication Service (IAS) Server
71(2)
Applying Security to Client Operating Systems
73(3)
Unix Clients
73(1)
NetWare Clients
74(1)
Macintosh Clients
75(1)
Summary
76(1)
Exam Essentials
76(2)
Review Questions
78(5)
Answers to Review Questions
83(4)
Installing, Managing, & Troubleshooting Hotfixes & Service Packs
87(44)
Determining the Current Status of Hotfixes and Service Packs
88(1)
Installing Service Packs and Hotfixes
89(32)
Using the MBSA Tool
92(9)
Slipstreaming
101(4)
Managing Service Packs and Hotfixes
105(14)
Troubleshooting the Deployment of Service Packs and Hotfixes
119(2)
Summary
121(1)
Exam Essentials
122(1)
Review Questions
123(5)
Answers to Review Questions
128(3)
Configuring IPSec and SMB Signing
131(44)
Understanding IPSec
133(25)
Configuring and Administering IPSec Authentication
136(13)
Configuring the Appropriate IPSec Protocol and Encryption Levels
149(2)
Deploying and Managing IPSec Certificates
151(2)
Renewing Certificates
153(1)
Securing Communication between Server Types with IPSec
153(1)
Troubleshooting IPSec
154(4)
Domain Controllers and SMB Signing
158(6)
SMB Commands
159(1)
Configuring SMB
160(1)
The Common Internet File System (CIFS)
160(1)
Enabling SMB Signing
160(4)
Network Analyzers
164(1)
Summary
165(1)
Exam Essentials
166(1)
Review Questions
167(5)
Answers to Review Questions
172(3)
Implementing Security for Wireless Networks
175(42)
Configuring Public and Private Wireless LANs
176(9)
Configuring a Public Wireless LAN
177(2)
Configuring a Private Wireless LAN
179(3)
Configuring Windows CE as a Wireless Client
182(1)
Wireless Components
182(3)
Configuring Secure Wireless Network Settings
185(16)
Dynamic Host Configuration Protocol (DHCP)
185(1)
Service Set Identifier (SSID)
186(3)
SSID Security Concerns
189(1)
Configuring Wireless Encryption Levels with WEP
190(4)
Wi-Fi Protected Access (WPA)
194(1)
MAC Filtering
195(2)
Configuring Wireless Encryption Levels Using 802.1x
197(3)
EAP Authentication Methods
200(1)
Problems and Attacks Specific to Wireless Networks
201(3)
Rogue APs
201(1)
War Driving
202(1)
War Chalking
202(1)
Radio Interference
203(1)
WEP Attacks
203(1)
The Next Steps
204(3)
Implementing VPNs to Protect Wireless Networks
205(1)
Combining VPN and 802.1x
206(1)
Wireless Security Moving Forward
206(1)
Summary
207(1)
Exam Essentials
208(1)
Review Questions
209(6)
Answers to Review Questions
215(2)
Deploying, Managing, and Configuring SSL Certificates
217(54)
An SSL Primer
219(2)
Obtaining Public and Private Certificates
221(15)
Obtaining Public Certificates
221(9)
Obtaining and Renewing a Private Certificate
230(6)
Configuring SSL to Secure Communications Channels
236(25)
Using SSL to Secure a Client Machine to Web Server Traffic
236(3)
Using SSL to Secure Web Server to SQL Server Traffic
239(4)
Using SSL to Secure Client Machine to Active Directory Domain Controller Traffic
243(3)
Using SSL to Secure Client Machine to E-Mail Server Traffic
246(3)
Securing SMTP
249(2)
Securing IMAP4
251(3)
Securing POP3
254(2)
Setting Up and Testing Secured IMAP4, POP3, and SMTP with Outlook Express
256(3)
Securing Outlook Web Access
259(2)
Summary
261(1)
Exam Essentials
262(1)
Review Questions
263(6)
Answers to Review Questions
269(2)
Configuring, Managing, and Troubleshooting Authentication
271(50)
Configuring and Troubleshooting Authentication
272(19)
The LAN Authentication Protocols
273(4)
The Logon Process
277(3)
Troubleshooting Authentication
280(1)
Configuring Authentication Protocols to Support Mixed Windows Client-Computer Environments
281(3)
The Interoperability of Kerberos Authentication with Unix
284(2)
Configuring Authentication in Extranet Scenarios and with Members of Nontrusted Domains
286(2)
Trust Relationships
288(3)
Configuring and Troubleshooting Authentication for Web Users
291(15)
Anonymous Authentication
292(14)
Configuring and Troubleshooting Authentication for Secure Remote Access
306(4)
Multifactor Authentication with Smart Cards and EAP
310(1)
Summary
311(1)
Exam Essentials
311(2)
Review Questions
313(5)
Answers to Review Questions
318(3)
Configuring and Troubleshooting Virtual Private Network Protocols
321(36)
VPNs and Internet Service Providers
322(2)
Routing and Remote Access Services (RRAS) Server
324(9)
Configuring RRAS
324(3)
Configuring Authentication Protocols
327(1)
Troubleshooting RRAS
327(6)
Configuring and Troubleshooting VPN Client Systems
333(6)
Configuring Client Systems for VPNs
333(5)
Troubleshooting Client Systems
338(1)
Network Address Translation (NAT) and VPNs
339(1)
Firewall Servers with VPNs
340(1)
Managing Client Computer Configurations for Remote Access Security
341(8)
Remote Access Policies
341(4)
The Connection Manager Administration Kit
345(4)
Summary
349(1)
Exam Essentials
350(1)
Review Questions
351(5)
Answers to Review Questions
356(1)
Installing, Configuring, and Managing Certificate Authorities
357(50)
Public Key Infrastructure and Certificate Authorities
358(32)
Installing and Configuring the Root CA
361(3)
Configuring the Publication of CRLs
364(2)
Installing and Configuring the Intermediate CA
366(6)
Installing and Configuring the Issuing CA
372(7)
Configuring Certificate Templates
379(2)
Configuring Public Key Group Policies
381(1)
Prerequisites for Using Group Policies to Distribute Certificates
381(5)
Configuring Certificate Enrollment and Renewals
386(4)
Managing Certificate Authorities
390(8)
Viewing Certificates
391(1)
Revoking Certificates
392(1)
Editing Certificates
393(1)
Managing CRLs
394(1)
Backing Up and Restoring the CA
395(3)
Summary
398(1)
Exam Essentials
399(2)
Review Questions
401(4)
Answers to Review Questions
405(2)
Managing Client-Computer and Server Certificates and EFS
407(42)
Managing Client Certificates
408(17)
Securing E-mail with Secure MIME
408(7)
Securing Files and Folders with the Encrypting File System (EFS)
415(3)
Importing and Exporting Certificates
418(5)
Certificate Storage
423(2)
Publishing Certificates through Active Directory
425(5)
Publishing Certificates from a Stand-Alone Online CA
425(2)
Using Certificates in a Child Domain
427(3)
Enrolling Certificates
430(4)
The Certificates MMC Snap-In
430(1)
Web Enrollment Pages
431(2)
Auto-Enrollment
433(1)
Managing and Troubleshooting EFS
434(5)
Implementing EFS
434(1)
EFS Encryption for Domain Members
435(1)
EFS and Workgroup Members
436(1)
Disabling EFS
437(1)
Troubleshooting EFS
438(1)
Summary
439(1)
Exam Essentials
439(2)
Review Questions
441(5)
Answers to Review Questions
446(3)
Configuring & Managing Groups, Permissions, Rights, & Auditing
449(46)
Windows Server 2003 Security Groups
450(2)
Group Nesting
451(1)
Understanding Windows Events
452(29)
Event Messages in Event Viewer
452(5)
Implementing and Configuring Auditing
457(13)
Configuring Access Control Lists
470(1)
User Rights
471(3)
Using Event Logs
474(6)
Managing Log Retention
480(1)
Managing Distributed Audit Logs
481(5)
Summary
486(1)
Exam Essentials
486(2)
Review Questions
488(5)
Answers to Review Questions
493(2)
Appendix A Responding to Security Incidents
495(38)
How to Recognize a Security Incident
496(2)
Planning Your Response
498(3)
Understanding the Types of Attacks
501(5)
Natural Disasters
501(1)
Hacker Attacks
501(1)
Virus Attacks
502(2)
Spyware
504(1)
Denial of Service Attacks
504(1)
Trojan Horse Attacks
505(1)
Worm Attacks
505(1)
Isolating and Containing the Incident
506(1)
Preserving the Chain of Evidence
507(1)
Implementing Countermeasures
508(2)
Restoring Services
510(1)
Summary
510(23)
Index 533

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program