Securing Windows NT/2000 Servers for the Internet -  Stefan Norberg

Securing Windows NT/2000 Servers for the Internet

A Checklist for System Administrators
Buch
216 Seiten
2000
O'Reilly Media (Verlag)
978-1-56592-768-1 (ISBN)
26,90 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Whilst Windows NT and 2000 systems have emerged as viable platforms for Internet servers, securing Windows for Internet use is a complex task. This guide simplifies the task by paring down installation and configuration instructions into a series of security checklists.
Windows NT and Windows 2000 systems have emerged as viable platforms for Internet servers. More and more organizations entrust the full spectrum of business activities - including e-commerce - to Windows. Unfortunately, the typical Windows NT/2000 installation makes a Windows server an easy target for attacks, and configuring Windows for secure Internet use is a complex task. "Securing Windows NT/2000 Servers for the Internet" suggests a two-part strategy to accomplish the task: "Hardening" any Windows server that could potentially be exposed to attacks from the Internet, so the exposed system (known as a "bastion host") is as secure as it can be; and providing extra security protection for exposed systems by installing an additional network (known as a "perimeter network") that separates the Internet from an organization's internal networks. The text provides a guide that pares down installation and configuration instructions into a series of checklists aimed at Windows administrators.
Topics include: introduction - Windows NT/2000 security threats, architecture of the Windows NT/2000 operating system and typical perimeter networks; how to build a Windows NT bastion host; configuring Windows and network services, encrypting the password database, editing the registry, setting system policy characteristics, performing TCP/IP configuration, configuring administrative tools, and setting necessary permissions; differences between Windows NT and Windows 2000 security including IPSec (IP Security Protocol) configuration.; secure remote administration - SSH, OpenSSH, TCP Wrappers, the Virtual Network Console, and the new Windows 2000 Terminal Services; and Windows NT/2000 backup, recovery, auditing, and monitoring - event logs, the audit policy, time synchronization with NTP (Network Time Protocol), remote logging, integrity checking, and intrusion detection.

Stefan Norberg is an independent network security consultant based in Stockholm, Sweden. Before becoming an independent contractor, he worked for Hewlett-Packard Consulting, where he built everything from large firewalls to highly available Unix clusters. During the last couple of years, he has spent most of his time designing and implementing Internet firewalls using building blocks like Cisco IOS, HP-UX, Linux, and Windows NT/2000. Every now and then, he enjoys teaching Windows NT/2000 classes. Stefan is an MCSE+Internet and Microsoft Certified Trainer. When he finds spare time, Stefan enjoys spending it with his wife Marianne and daughter Matilda.

Part 1 Windows NT/2000 Security: Internet Threats; Building a Secure Site on the Internet; The Windows NT/2000 Architectures; Windows NT/2000 in the Perimeter Network; Cryptography Basics. Part 2 Building a Windows NT Bastion Host: Installation; Using the Security Configuration Editor; Basic Configuration; Advanced Configuration; Setting System Policies; TCP/IP Configuration; Configuring Administrative Tools and Utilities; Setting Permissions. Part 3 Building a Windows 2000 Bastion Host: Differences Between the Systems; IPSec in Windows 2000; Part 4 Setting Up Secure Remote Administration: Symantec pcAnywhere; Windows 2000 Terminal Services; Open Source (SSH, Cygwin, TCP Wrappers, and VNC). Part 5 Backing Up and Restoring Your Bastion Host: Defining Your Backup Policy; Backup Methods; Types of Backups; Backup Software. Part 6 Auditing and Monitoring Your Perimeter Network: System Auditing in Windows; Time Synchronization Using NTP; Remote Logging and Log Management; Integrity Checking; Network-Based Intrusion Detection Systems. Part 7 Maintaining Your Perimeter Network: Setting Up Policies and Procedures; Performing Third-Party Audits; Staying Informed. Appendices: Well-Known Ports Used by Windows NT/2000; Security-Related Knowledge Base Articles; Build Instructions for OpenSSH on Cygwin.

Erscheint lt. Verlag 26.12.2000
Verlagsort Sebastopol
Sprache englisch
Einbandart kartoniert
Themenwelt Informatik Betriebssysteme / Server Windows Server
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Mathematik / Informatik Informatik Web / Internet
ISBN-10 1-56592-768-0 / 1565927680
ISBN-13 978-1-56592-768-1 / 9781565927681
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das umfassende Handbuch für Administratoren

von Markus Widl

Buch | Hardcover (2022)
Rheinwerk (Verlag)
69,90