Securing Windows Server 2008 : Prevent Attacks from Outside and Inside Your OrganizationMaterial type: TextSeries: eBooks on DemandPublisher: Burlington : Elsevier Science, 2014Description: 1 online resource (422 p.)ISBN: 9780080569970Subject(s): Computer networks | Computer networks | Computer security | Computer security | Microsoft Windows serverGenre/Form: Electronic books.Additional physical formats: Print version:: Securing Windows Server 2008 : Prevent Attacks from Outside and Inside Your OrganizationDDC classification: 005.8 LOC classification: QA76.9.A25 S37565 2008Online resources: Click here to view this ebook.
|Item type||Current location||Call number||URL||Status||Date due||Barcode|
|Electronic Book||UT Tyler Online Online||QA76.9.A25 S37565 2008 (Browse shelf)||http://uttyler.eblib.com/patron/FullRecord.aspx?p=349676||Available||EBL349676|
Front Cover; Securing Windows Server 2008; Copyright page; Contributing Authors'; Contents; Chapter 1: Microsoft Windows Server 2008: An Overview; Introduction; Server Manager; Using Server Manager to Implement Roles; Server Core; Using Server Core and Active Directory; What Is Server Core?; Uses for Server Core; Active Directory Certificate Services; Configuring a Certificate Authority; Certificate Authorities; Standard vs. Enterprise; Root vs. Subordinate Certificate Authorities; Certificate Requests; Request a Certificate from a Web Server; Certificate Practice Statement; Key Recovery
Active Directory Domain ServicesWhat Is New in the AD DS Installation?; Summary; Solutions Fast Track; Server Manager; Server Core; Active Directory Certificate Services; Active Directory Domain Services; Frequently Asked Questions; Chapter 2: Microsoft Windows Server 2008: PKI-Related Additions; Introduction; What Is PKI?; The Function of the PKI; Components of PKI; How PKI Works; PKCS Standards; Public Key Functionality; Digital Signatures; Authentication; Secret Key Agreement via Public Key; Bulk Data Encryption without Prior Shared Secrets; Digital Certificates; User Certificates
Machine CertificatesApplication Certificates; Working with Certificate Services; Backing Up Certificate Services; Restoring Certificate Services; Assigning Roles; Enrollments; Revocation; Working with Templates; General Properties; Request Handling; Cryptography; Subject Name; Issuance Requirements; Security; Types of Templates; User Certificate Types; Computer Certificate Types; Other Certificate Types; Custom Certificate Templates; Creating a Custom Template; Securing Permissions; Versioning; Key Recovery Agent; Summary; Solutions Fast Track; What Is PKI?; Digital Certificates
Working with Certificate ServicesWorking with Templates; Creating a Custom Template; Frequently Asked Questions; Chapter 3: Microsoft Windows Server 2008: Active Directory Domain; Introduction; Configuring Audit Policies; Logon Events; Directory Service Access; Configuring Directory Service Access Auditing in Group Policy; Configuring Active Directory Object Auditing; Fine-Grain Password and Account Lockout Policies; Configuring a Fine-Grain Password Policy; Applying Users and Groups to a PSO with Active Directory Users and Computers; Read-Only Domain Controllers (RODCs); Introduction to RODC
An RODC's Purpose in LifeRODC Features; Configuring RODC; Removing an RODC; Digital Rights Management Service; Summary; Solutions Fast Track; Configuring Audit Policies; Fine-Grain Password and Account Lockout Policies; Read-Only Domain Controllers (RODCs); Configuring Active Directory Rights Management Services; Frequently Asked Questions; Chapter 4: Microsoft Windows Server 2008: Network Security Changes; Introduction; Network Policy Server; Configuring Policies and Settings for NAP Enforcement Methods in NPS; Network Policy and Access Services Role; NTLMv2 and Kerberos Authentication
802.1x Wired and Wireless Access
Microsoft hails the latest version of its flagship server operating system, Windows Server 2008, as ""the most secure Windows Server ever"". However, to fully achieve this lofty status, system administrators and security professionals must install, configure, monitor, log, and troubleshoot a dizzying array of new features and tools designed to keep the bad guys out and maintain the integrity of their network servers. This is no small task considering the market saturation of Windows Server and the rate at which it is attacked by malicious hackers. According to IDC, Windows Server runs 38% of a
Description based upon print version of record.