Microsoft Windows Security Resource Kit (Paperback)
暫譯: 微軟 Windows 安全資源工具包 (平裝本)
Ben Smith, Brian Komar, Microsoft Corporation
- 出版商: MicroSoft
- 出版日期: 2003-04-12
- 定價: $1,750
- 售價: 5.0 折 $875
- 語言: 英文
- 頁數: 720
- 裝訂: Paperback
- ISBN: 8120322932
- ISBN-13: 9780735618688
-
相關分類:
kali-linux
立即出貨(限量) (庫存=7)
買這商品的人也買了...
-
Malicious Mobile Code: Virus Protection for Windows$1,411$1,337 -
C++ Primer, 3/e 中文版$980$774 -
Embedded Systems Design: An Introduction to Processes, Tools and Techniques$2,660$2,527 -
Dreamweaver MX 中文版魔法書$490$417 -
鳥哥的 Linux 私房菜$560$476 -
C++ Builder 6 完全攻略$690$587 -
Java 完美經典優質學習篇$750$638 -
ASP.NET 程式設計徹底研究$590$466 -
CCNP Practical Studies: Troubleshooting$2,220$2,109 -
ARM 原理與實作─以網路 SoC 為例$600$540 -
重構─改善既有程式的設計$720$569 -
Practical Java Programming Language Guide 中文版 (Practical Java Programming Language Guide)$560$442 -
行動 Linux─KNOPPIX 改造手冊$290$247 -
鳥哥的 Linux 私房菜-伺服器架設篇$750$638 -
詳解 JavaScript & HTML & CSS 語法辭典$490$382 -
鳥哥的 Linux 私房菜─基礎學習篇增訂版$560$476 -
CCNA Self-Study: Interconnecting Cisco Network Devices (ICND) 640-811, 640-801, 2/e$2,220$2,109 -
$399CCNP Self-Study: Building Cisco Remote Access Networks (BCRAN), 2/e (Hardcover) -
人月神話:軟體專案管理之道 (20 週年紀念版)(The Mythical Man-Month: Essays on Software Engineering, Anniversary Edition, 2/e)$480$379 -
JSP 2.0 技術手冊$750$593 -
CCNP Self-Study : Building Cisco Multilayer Switched Networks (BCMSN), 2/e$2,220$2,109 -
$399CCNP Self-Study : Building Scalable Cisco Internetworks (BSCI), 2/e -
JSP 與 Servlet 500 個應用範例技巧大全集$590$460 -
不同系統功能別資料庫設計 資料塑模入門講座$420$328 -
最新計算機概論, 3/e$560$442
相關主題
商品描述
Description:
Help maximize security for Windows-based systems, services, and networks?with tools and resources direct from Microsoft.
Get the in-depth information and tools you need to help secure Microsoft®
Windows®–based clients, servers, networks, and Internet services with expertise
from those who know the technology best—the Microsoft Security Team. These
expert authors prescribe how to plan and implement a comprehensive
security-management strategy—from identifying risks to configuring security
technologies, applying security best practices, and monitoring and responding to
security incidents. The kit also provides essential security tools, scripts, and
other on-the-job resources—all designed to help maximize data and system
security while minimizing downtime and costs.
• Gain a framework for
understanding security threats and vulnerabilities and applying countermeasures
• Help protect servers, desktops, and laptops by configuring permissions,
security templates, TCP/IP settings, and application-level security
•
Implement security enhancements for domain controllers, Microsoft Internet
Information Services 5.0, Windows Terminal Services, and DNS, DHCP, WINS, RAS,
VPN, and certificate servers
• Help secure Active Directory® objects,
attributes, domains, and forests; use Group Policy; manage user accounts and
passwords
• Develop an auditing strategy and incident response team
•
Utilize security assessment tools, detect and respond to internal and external
security incidents, and recover services
• Create a process for deploying and
managing security updates
•Help establish your enterprise privacy
strategy
CD-ROM features:
50+ tools and scripts from the Microsoft
Security Team and the Microsoft Windows Resource Kits, including:
•
Subinacl.exe—view and help maintain security on files, registry keys, and
services from the command line or in batch files
• Ntrights.exe—set user
rights from the command line or in batch files
• EventcombMT.exe—collect and
search event logs from multiple computers through a GUI
• Scripts for
configuring security
Plus, a fully searchable eBook
Table of Contents:
| Foreword | xix |
| Acknowledgments | xxi |
| Introduction | xxiii |
| PART I APPLYING KEY PRINCIPLES OF SECURITY | |
| 1 Key Principles of Security | 3 |
| Understanding Risk Management | 3 |
| Learning to Manage Risk | 4 |
| Risk Management Strategies | 6 |
| Understanding Security | 8 |
| Granting the Least Privilege Required | 8 |
| Defending Each Network Layer | 8 |
| Reducing the Attack Surface | 8 |
| Avoiding Assumptions | 8 |
| Protecting, Detecting, and Responding | 9 |
| Securing by Design, Default, and Deployment | 9 |
| The 10 Immutable Laws of Security | 9 |
| The 10 Immutable Laws of Security Administration | 11 |
| 2 Understanding Your Enemy | 15 |
| Knowing Yourself | 16 |
| Accurately Assessing Your Own Skills | 16 |
| Possessing Detailed Documentation of Your Network | 16 |
| Understanding the Level of Organizational Support You Receive | 17 |
| Identifying Your Attacker | 17 |
| Understanding External Attackers | 19 |
| Understanding Internal Attackers | 20 |
| What Motivates Attackers? | 21 |
| Notoriety, Acceptance, and Ego | 22 |
| Financial Gain | 23 |
| Challenge | 24 |
| Activism | 25 |
| Revenge | 25 |
| Espionage | 25 |
| Information Warfare | 26 |
| Why Defending Networks Is Difficult | 27 |
| Attackers Have Unlimited Resources | 27 |
| Attackers Need to Master Only One Attack | 27 |
| Defenders Cannot Take the Offensive | 27 |
| Defenders Must Serve Business Goals | 28 |
| Defenders Must Win All the Time | 29 |
| PART II SECURING ACTIVE DIRECTORY | |
| 3 Securing User Accounts and Passwords | 33 |
| Securing Accounts | 33 |
| Understanding Security Identifiers | 34 |
| Understanding Access Tokens | 36 |
| Configuring Account Security Options | 38 |
| Securing Administrative Accounts | 40 |
| Implementing Password Security | 43 |
| Granting Rights and Permissions Using Groups | 49 |
| User Rights and Permissions | 50 |
| Group Types and Scope | 55 |
| Implementing Role-Based Security in Windows 2000 | 64 |
| Securing Passwords | 67 |
| Understanding Authentication | 67 |
| Storing Secrets in Windows | 77 |
| Best Practices | 80 |
| Additional Information | 81 |
| 4 Securing Active Directory Objects and Attributes | 83 |
| Understanding the Active Directory Schema | 83 |
| Attributes | 84 |
| Classes | 84 |
| Configuring DACLs to Secure Active Directory Objects | 86 |
| What Are DACLs? | 87 |
| How DACLs Work | 90 |
| Securing Active Directory Objects and Attributes | 91 |
| Configuring Default DACLs on Objects and Attributes | 91 |
| Securing Objects After Being Created | 93 |
| Configuring DACLs from the Command Line | 94 |
| Best Practices | 96 |
| Additional Information | 97 |
| 5 Implementing Group Policy | 99 |
| Understanding Group Policy | 99 |
| Computer-Related Group Policies | 100 |
| User-Related Group Policies | 102 |
| Using Group Policy Containers | 104 |
| Processing Group Policy Objects | 106 |
| Initial Group Policy Application | 106 |
| Group Policy Refresh | 107 |
| On-Demand Processing | 107 |
| Altering Group Policy Application | 108 |
| Block Inheritance | 108 |
| No Override | 109 |
| Group Policy Object Filtering | 109 |
| Loopback Mode Processing | 110 |
| Managing Group Policy | 111 |
| Default Group Policy Permissions | 111 |
| Delegating Group Policy Management | 112 |
| Best Practices | 113 |
| Additional Information | 113 |
| 6 Designing Active Directory Forests and Domains for Security | 115 |
| Autonomy and Isolation in Active Directory | 115 |
| Designing Forests for Active Directory Security | 116 |
| Enterprise Administration Boundaries and Isolation of Authority | 117 |
| Default Permissions and Schema Control | 117 |
| Global Catalog Boundaries | 118 |
| Domain Trust Requirements | 118 |
| Domain Controller Isolation | 119 |
| Protection of the Forest Root Domain | 119 |
| Designing Domains for Active Directory Security | 121 |
| Designing DNS for Active Directory Security | 123 |
| Single Namespace | 125 |
| Delegated Namespace | 125 |
| Internal Namespace | 125 |
| Segmented Namespace | 125 |
| Designing the Delegation of Authority | 126 |
| Best Practices | 128 |
| Additional Information | 130 |
| PART III SECURING THE CORE OPERATING SYSTEM | |
| 7 Securing Permissions | 135 |
| Securing File and Folder Permissions | 135 |
| How DACLs Work | 140 |
| Assigning DACLs at Creation | 141 |
| How DACLs Are Handled When Files and Folders Are Copied or Moved | 142 |
| Command-Line Tools | 143 |
| Default File and Folder Permissions | 148 |
| Securing Files and Folder Access by Using Share Permissions | 155 |
| Using the Encrypting File System | 156 |
| How EFS Works | 157 |
| EFS Command-Line Tools | 159 |
| Additional EFS Features in Windows XP | 162 |
| Introduction to Designing a Data Recovery Agent Policy | 165 |
| Securing Registry Permissions | 166 |
| Configuring Registry Permissions | 168 |
| Best Practices | 169 |
| Additional Information | 169 |
| 8 Securing Services | 173 |
| Managing Service Permissions | 173 |
| Configuring the Startup Value for a Service | 175 |
| Stopping, Starting, Pausing, and Resuming Services | 176 |
| Configuring the Security Context of Services | 177 |
| Configuring the DACL for the Service | 178 |
| Default Services in Windows 2000 and Windows XP | 180 |
| Best Practices | 202 |
| Additional Information | 203 |
| 9 Implementing TCP/IP Security | 205 |
| Securing TCP/IP | 205 |
| Understanding Internet Layer Protocols | 206 |
| Understanding Transport Layer Protocols | 209 |
| Common Threats to TCP/IP | 212 |
| Configuring TCP/IP Security in Windows 2000 and Windows XP | 215 |
| Using IPSec | 225 |
| Securing Data Transmission with IPSec Protocols | 226 |
| Choosing Between IPSec Modes | 229 |
| Selecting an IPSec Authentication Method | 230 |
| Creating IPSec Policies | 231 |
| How IPSec Works | 235 |
| Monitoring IPSec | 238 |
| Best Practices | 240 |
| Additional Information | 241 |
| 10 Securing Microsoft Internet Explorer 6 and Microsoft Office XP | 243 |
| Security Settings in Internet Explorer 6 | 243 |
| Privacy Settings | 243 |
| Security Zones | 247 |
| Configuring Privacy and Security Settings in Internet Explorer 6 | 262 |
| Security Settings in Office XP | 263 |
| Configuring ActiveX and Macros Security | 263 |
| Configuring Security for Outlook 2002 | 266 |
| Best Practices | 267 |
| Additional Information | 267 |
| 11 Configuring Security Templates | 269 |
| Using Security Template Settings | 269 |
| Account Policies | 270 |
| Local Policies | 273 |
| Event Log | 288 |
| Restricted Groups | 289 |
| System Services | 289 |
| Registry | 290 |
| File System | 290 |
| Public Key Policies | 290 |
| IP Security Policies | 291 |
| How Security Templates Work | 291 |
| Applying Security Templates to a Local Computer | 291 |
| Applying Security Templates by Using Group Policy | 295 |
| Default Security Templates | 296 |
| Creating Custom Security Templates | 298 |
| Adding Registry Entries to Security Options | 298 |
| Adding Services, Registry Values, and Files to Security Templates | 301 |
| Best Practices | 301 |
| Additional Information | 302 |
| 12 Auditing Microsoft Windows Security Events | 305 |
| Determining Which Events to Audit | 306 |
| Managing the Event Viewer | 307 |
| Determining the Storage Location | 308 |
| Determining the Maximum Log File Size | 308 |
| Configuring the Overwrite Behavior | 308 |
| Configuring Audit Policies | 310 |
| Auditing Account Logon Events | 310 |
| Auditing Account Management Events | 315 |
| Auditing Directory Service Access | 317 |
| Auditing Logon Events | 318 |
| Auditing Object Access | 320 |
| Auditing Policy Change | 322 |
| Auditing Privilege Use | 323 |
| Auditing Process Tracking | 324 |
| Auditing System Events | 325 |
| How to Enable Audit Policies | 326 |
| Monitoring Audited Events | 328 |
| Using the Event Viewer | 328 |
| Using Custom Scripts | 329 |
| Using Event Comb | 329 |
| Best Practices | 333 |
| Additional Information | 334 |
| 13 Securing Mobile Computers | 335 |
| Understanding Mobile Computers | 335 |
| Increase in the Possibility of Being Lost or Stolen | 335 |
| Difficulty in Applying Security Updates | 337 |
| Exposure to Untrusted Networks | 338 |
| Eavesdropping on Wireless Connectivity | 338 |
| Implementing Additional Security for Laptop Computers | 339 |
| Hardware Protection | 339 |
| Boot Protection | 341 |
| Data Protection | 343 |
| User Education | 345 |
| Securing Wireless Networking in Windows XP | 346 |
| Using Wireless Zero Configuration in Windows XP | 346 |
| Configuring Security for 802.11 Wireless Network Connectivity | 347 |
| Configuring 802.11 Security with 802.1x | 350 |
| Best Practices | 352 |
| Additional Information | 352 |
| PART IV SECURING COMMON SERVICES | |
| 14 Implementing Security for Domain Controllers | 357 |
| Threats to Domain Controllers | 357 |
| Modification of Active Directory Objects | 358 |
| Password Attacks | 358 |
| Denial-of-Service Attacks | 358 |
| Replication Prevention Attacks | 358 |
| Exploitation of Known Vulnerabilities | 359 |
| Implementing Security on Domain Controllers | 359 |
| Providing Physical Security | 359 |
| Increasing the Security of Stored Passwords | 360 |
| Eliminating Nonessential Services | 361 |
| Applying Security Settings by Using Group Policy | 363 |
| Protecting Against the Failure of a Domain Controller | 363 |
| Implementing Syskey | 364 |
| Securing Built-In Accounts and Groups | 364 |
| Enabling Auditing | 366 |
| Securing Active Directory Communications | 366 |
| Best Practices | 369 |
| Additional Information | 370 |
| 15 Implementing Security for DNS Servers | 373 |
| Threats to DNS Servers | 374 |
| Modification of DNS Records | 375 |
| Zone Transfer of DNS Data by an Unauthorized Server | 375 |
| Exposure of Internal IP Addressing Schemes | 375 |
| Denial-of-Service Attacks Against DNS Services | 376 |
| Securing DNS Servers | 376 |
| Implementing Active Directory-Integrated Zones | 376 |
| Implementing Separate Internal and External DNS Name Servers | 377 |
| Restricting Zone Transfers | 378 |
| Implementing IPSec Between DNS Clients and DNS Servers | 379 |
| Restricting DNS Traffic at the Firewall | 380 |
| Limiting Management of DNS | 381 |
| Protecting the DNS Cache | 381 |
| Best Practices | 381 |
| Additional Information | 382 |
| 16 Implementing Security for Terminal Services | 385 |
| Threats to Terminal Services | 386 |
| Grants Excess Permissions for Users | 386 |
| Allows Bypass of Firewall Security | 386 |
| Uses a Well-Known Port | 387 |
| Requires the Log On Locally User Right | 387 |
| Provides an Attacker with a Full Windows Desktop | 387 |
| Securing Terminal Services | 387 |
| Choosing the Correct Terminal Services Mode | 388 |
| Restricting Which Users and Groups Have the Log On Locally User Right | 389 |
| Preventing Remote Control on Terminal Servers | 389 |
| Restricting Which Applications Can Be Executed | 390 |
| Implementing the Strongest Form of Encryption | 392 |
| Strengthening the Security Configuration of the Terminal Server | 393 |
| Best Practices | 393 |
| Additional Information | 394 |
| 17 Implementing Security for DHCP Servers | 397 |
| Threats to DHCP Servers | 398 |
| Unauthorized DHCP Servers | 398 |
| DHCP Servers Overwriting Valid DNS Resource Records | 399 |
| DHCP Not Taking Ownership of DNS Resource Records | 399 |
| Unauthorized DHCP Clients | 400 |
| Securing DHCP Servers | 400 |
| Keeping Default Name Registration Behavior | 401 |
| Determining Whether to Use the DNSUpdateProxy Group | 401 |
| Avoiding Installation of DHCP on Domain Controllers | 401 |
| Reviewing DHCP Database for BAD_ADDRESS Entries | 403 |
| Monitoring Membership in the DHCP Administrators Group | 403 |
| Enabling DHCP Auditing | 404 |
| Best Practices | 404 |
| Additional Information | 405 |
| 18 Implementing Security for WINS Servers | 407 |
| Threats to WINS Servers | 409 |
| Preventing Replication Between WINS Servers | 409 |
| Registration of False NetBIOS Records | 409 |
| Incorrect Registration of WINS Records | 409 |
| Modification of WINS Configuration | 410 |
| Securing WINS Servers | 410 |
| Monitor Membership in the WINS Admins Group | 410 |
| Validate WINS Replication Configuration | 410 |
| Eliminate NetBIOS Applications and Decommission Them | 411 |
| Best Practices | 411 |
| Additional Information | 412 |
| 19 Implementing Security for Routing and Remote Access | 413 |
| Remote Access Solution Components | 413 |
| Authentication Protocols | 414 |
| VPN Protocols | 415 |
| Client Software | 416 |
| Server Services and Software | 417 |
| Threats to Remote Access Solutions | 417 |
| Authentication Interception | 418 |
| Data Interception | 418 |
| Bypass of the Firewall to the Private Network | 419 |
| Nonstandardized Policy Application | 419 |
| Network Perimeter Extended to Location of Dial-In User | 420 |
| Denial of Service Caused by Password Attempts | 420 |
| Stolen Laptops with Saved Credentials | 420 |
| Securing Remote Access Servers | 421 |
| Implementing RADIUS Authentication and Accounting | 421 |
| Securing RADIUS Authentication Traffic Between the Remote Access Server and the RADIUS Server | 422 |
| Configuring a Remote Access Policy | 422 |
| Deploying Required Certificates for L2TP/IPSec | 425 |
| Restricting Which Servers Can Run RRAS | 427 |
| Implementing Remote Access Account Lockout | 428 |
| Securing Remote Access Clients | 428 |
| Configuring the CMAK Packages | 429 |
| Implementing Strong Authentication | 429 |
| Deploying Required Certificates | 429 |
| Best Practices | 430 |
| Additional Information | 431 |
| 20 Implementing Security for Certificate Services | 433 |
| Threats to Certificate Services | 433 |
| Compromise of a CA's Key Pair | 434 |
| Attacks Against Servers Hosting CRLs and CA Certificates | 434 |
| Attempts to Modify the CA Configuration | 434 |
| Attempts to Modify Certificate Template Permissions | 434 |
| Attacks that Disable CRL Checking | 434 |
| Addition of Nontrusted CAs to the Trusted Root CA Store | 435 |
| Issuance of Fraudulent Certificates | 435 |
| Publication of False Certificates to Active Directory | 435 |
| Securing Certificate Services | 435 |
| Implementing Physical Security Measures | 436 |
| Implementing Logical Security Measures | 436 |
| Modifying CRL and CA Certificate Publication Points | 437 |
| Enabling CRL Checking in All Applications | 437 |
| Managing Permissions of Certificate Templates | 437 |
| Best Practices | 438 |
| Additional Information | 438 |
| 21 Implementing Security for Microsoft IIS 5.0 | 441 |
| Implementing Windows 2000 Security | 442 |
| Minimizing Services | 442 |
| Defining User Accounts | 443 |
| Securing the File System | 444 |
| Applying Specific Registry Settings | 446 |
| Configuring IIS Security | 447 |
