search for books and compare prices
Tables of Contents for McSa/McSe
Chapter/Section Title
Page #
Page Count
Introduction
xxi
 
Assessment Test
xxxv
 
Configuring, Deploying, and Troubleshooting Security Templates
1
42
Group Policies and Windows 2000 Server
2
5
Configuring Group Policies
3
2
Applying Group Policies
5
1
Modifying Group Policy Inheritance
6
1
Working with Security Templates
7
5
Default Security Templates
10
1
Incremental Templates
11
1
Configuring Templates
12
15
Account Policies
12
2
Audit Policies
14
4
User Rights Assignment
18
2
Security Options
20
1
System Services
21
1
Registry and File System Permissions
22
3
Restricted Groups
25
1
Event Logs
26
1
Deploying Security Templates
27
4
Using Group Policies to Deploy Templates
27
2
Using Scripts to Deploy Templates
29
2
Troubleshooting Security Templates
31
2
Troubleshooting Group Policy--Applied Templates
32
1
Troubleshooting after Upgrading Operating Systems
33
1
Troubleshooting Mixed Client Environments
33
1
Summary
33
1
Exam Essentials
34
1
Key Terms
34
1
Review Questions
35
5
Answers to Review Questions
40
3
Configuring Security Based on Computer Roles
43
36
SQL Server Security
44
5
Security Features in SQL Server 2000
45
1
Windows 2000 Security and SQL Server
45
4
Exchange 2000 Server Security
49
1
Securing the SMTP Service
49
1
Securing Outlook Web Access
50
1
Securing Outlook Web Access, URLScan, and IISLockdown
50
1
Securing Public Folder Information
50
1
Windows 2000 Domain Controller Security
50
6
Using Digital Signatures for Communication
51
1
Securing DNS Updates
52
1
Restricting Anonymous Access
52
2
Enabling NTLMv2 for Legacy Clients
54
1
Hardening the TCP/IP Stack
54
1
Disable Auto Generation of 8.3 Filenames
55
1
Disable LmHash Creation
55
1
Securing Built-in Accounts
55
1
IIS Server Security
56
9
IP Address/DNS Restrictions
61
1
Disabling the IIS Anonymous Account
61
1
The URLScan Tool
61
4
Securing Mobile Communications and Internet Authentication Service (IAS) Server
65
2
Applying Security to Client Operating Systems
67
2
Unix Clients
67
1
NetWare Clients
68
1
Macintosh Clients
69
1
Summary
69
1
Exam Essentials
70
1
Key Terms
70
1
Review Questions
71
5
Answers to Review Questions
76
3
Installing, Managing, and Troubleshooting Hotfixes and Service Packs
79
44
Determining the Current Status of Hotfixes and Service Packs
80
1
Installing Service Packs and Hotfixes
81
31
Using the MBSA Tool
84
8
Slipstreaming
92
4
Managing Service Packs and Hotfixes
96
15
Troubleshooting the Deployment of Service Packs and Hotfixes
111
1
Summary
112
1
Exam Essentials
113
1
Key Terms
114
1
Review Questions
115
5
Answers to Review Questions
120
3
Configuring IPSec and SMB Signing
123
38
Understanding IPSec
124
21
Configuring and Administering IPSec Authentication
127
11
Configuring the Appropriate IPSec Protocol and Encryption Levels
138
1
Deploying and Managing IPSec Certificates
139
2
Renewing Certificates
141
1
Securing Communication between Server Types with IPSec
142
1
Troubleshooting IPSec
143
2
Domain Controllers and SMB Signing
145
6
SMB Commands
146
1
Configuring SMB
147
1
The Common Internet File System (CIFS)
147
1
Enabling SMB Signing
148
3
Summary
151
1
Exam Essentials
151
1
Key Terms
152
1
Review Questions
153
5
Answers to Review Questions
158
3
Implementing Security for Wireless Networks
161
40
Configuring Public and Private Wireless LANs
162
9
Configuring a Public Wireless LAN
163
2
Configuring a Private Wireless LAN
165
3
Configuring Windows CE as a Wireless Client
168
1
Wireless Components
169
2
Configuring Secure Wireless Network Settings
171
14
Dynamic Host Configuration Protocol (DHCP)
172
1
Service Set Identifier (SSID)
172
3
SSID Security Concerns
175
1
Configuring Wireless Encryption Levels with WEP
176
3
MAC Filtering
179
2
Configuring Wireless Encryption Levels Using 802.1x
181
3
EAP Authentication Methods
184
1
Problems and Attacks Specific to Wireless Networks
185
3
Rogue APs
185
1
War Driving
186
1
War Chalking
186
1
Radio Interference
187
1
WEP Attacks
187
1
The Next Steps
188
3
Implementing VPNs to Protect Wireless Networks
189
1
Combining VPN and 802.1x
190
1
Wireless Security Moving Forward
190
1
Summary
191
1
Exam Essentials
191
1
Key Terms
192
1
Review Questions
193
6
Answers to Review Questions
199
2
Deploying, Managing, and Configuring SSL Certificates
201
54
An SSL Primer
202
2
Obtaining Public and Private Certificates
204
15
Obtaining Public Certificates
205
8
Obtaining and Renewing a Private Certificate
213
6
Configuring SSL to Secure Communications Channels
219
25
Using SSL to Secure a Client Machine to Web Server Traffic
219
3
Using SSL to Secure Web Server to SQL Server Traffic
222
4
Using SSL to Secure Client Machine to Active Directory Domain Controller Traffic
226
3
Using SSL to Secure Client Machine to E-Mail Server Traffic
229
2
Securing SMTP
231
3
Securing IMAP4
234
2
Securing POP3
236
3
Setting Up and Testing Secured IMAP4, POP3, and SMTP with Outlook Express
239
3
Securing Outlook Web Access
242
2
Summary
244
1
Exam Essentials
245
1
Key Terms
245
1
Review Questions
246
7
Answers to Review Questions
253
2
Configure, Manage, and Troubleshoot Authentication
255
46
Configuring and Troubleshooting Authentication
256
18
The LAN Authentication Protocols
257
4
The Logon Process
261
2
Troubleshooting Authentication
263
1
Configuring Authentication Protocols to Support Mixed Windows Client-Computer Environments
264
3
The Interoperability of Kerberos Authentication with Unix
267
2
Configuring Authentication in Extranet Scenarios and with Members of Nontrusted Domains
269
2
Trust Relationships
271
3
Configuring and Troubleshooting Authentication for Web Users
274
12
Anonymous Authentication
274
12
Configuring and Troubleshooting Authentication for Secure Remote Access
286
4
Multifactor Authentication with Smart Cards and EAP
290
1
Summary
291
1
Exam Essentials
292
1
Key Terms
293
1
Review Questions
294
5
Answers to Review Questions
299
2
Configuring and Troubleshooting Virtual Private Network Protocols
301
38
VPNs and Internet Service Providers
302
2
Routing and Remote Access Services (RRAS) Server
304
10
Configuring RRAS
304
3
Configuring Authentication Protocols
307
1
Troubleshooting RRAS
308
6
Configuring and Troubleshooting VPN Client Systems
314
6
Configuring Client Systems for VPNs
314
5
Troubleshooting Client Systems
319
1
Network Address Translation (NAT) and VPNs
320
1
Firewall Servers with VPNs
321
1
Managing Client Computer Configurations for Remote Access Security
322
8
Remote Access Service Policies
322
4
The Connection Manager Administration Kit
326
4
Summary
330
1
Exam Essentials
331
1
Key Terms
332
1
Review Questions
333
5
Answers to Review Questions
338
1
Installing, Configuring, and Managing Certificate Authorities
339
48
Public Key Infrastructure and Certificate Authorities
340
30
Installing and Configuring the Root CA
342
3
Configuring the Publication of CRLs
345
2
Installing and Configuring the Intermediate CA
347
6
Installing and Configuring the Issuing CA
353
7
Configuring Certificate Templates
360
1
Configuring Public Key Group Policies
361
1
Prerequisites for Using Group Policies to Distribute Certificates
362
5
Configuring Certificate Enrollment and Renewals
367
3
Managing Certificate Authorities
370
8
Viewing Certificates
370
2
Revoking Certificates
372
1
Editing Certificates
373
1
Managing CRLs
373
1
Backing Up and Restoring the CA
374
4
Summary
378
1
Exam Essentials
379
1
Key Terms
380
1
Review Questions
381
4
Answers to Review Questions
385
2
Managing Client-Computer and Server Certificates and EFS
387
44
Managing Client Certificates
388
16
Securing E-mail with Secure MIME
388
6
Securing Files and Folders with the Encrypting File System (EFS)
394
3
Importing and Exporting Certificates
397
5
Certificate Storage
402
2
Publishing Certificates through Active Directory
404
6
Publishing Certificates from a Standalone Online CA
404
2
Using Certificates in a Child Domain
406
4
Enrolling Certificates
410
4
The Certificates MMC Snap-In
410
1
Web Enrollment Pages
411
2
Auto-Enrollment
413
1
Recovering KMS-Issued Certificates
414
1
Managing and Troubleshooting EFS
415
5
Implementing EFS
415
2
EFS Encryption for Domain Members
417
1
EFS and Workgroup Members
417
1
Disabling EFS
418
1
Troubleshooting EFS
419
1
Summary
420
1
Exam Essentials
420
1
Key Terms
421
2
Review Questions
423
5
Answers to Review Questions
428
3
Configuring and Managing Auditing
431
40
Understanding Windows Events
432
25
Event Messages in Event Viewer
433
4
Implementing and Configuring Auditing
437
13
Using Event Logs
450
6
Managing Log Retention
456
1
Managing Distributed Audit Logs by Using EventComb
457
5
Summary
462
1
Exam Essentials
462
1
Key Terms
462
1
Review Questions
463
5
Answers to Review Questions
468
3
Responding to Security Incidents
471
22
Understanding Types of Attacks
475
4
Natural Disasters
475
1
Hacker Attacks
475
1
Virus Attacks
476
1
Denial of Service Attacks
477
1
Trojan Horse Attacks
478
1
Worm Attacks
478
1
Isolating and Containing the Incident
479
1
Preserving the Chain of Evidence
480
1
Implementing Countermeasures
481
2
Restoring Services
483
1
Summary
483
1
Exam Essentials
484
1
Key Terms
484
1
Review Questions
485
5
Answers to Review Questions
490
3
Glossary
493
18
Index
511