Getting started with windows server security :: develop and implement a secure microsoft infrastructure platform using native and built-in tools /
If you are a security or Windows Server administrator wanting to learn or advance your knowledge in Microsoft security and secure your Windows Server infrastructure effectively, this book is for you.
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , , , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, England ; Mumbai [India] :
Packt Publishing,
2015.
|
Schriftenreihe: | Professional Expertise Distilled
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | If you are a security or Windows Server administrator wanting to learn or advance your knowledge in Microsoft security and secure your Windows Server infrastructure effectively, this book is for you. |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource (240 pages) : illustrations |
ISBN: | 9781784390259 1784390259 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn905919367 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 150316t20152015enka o 001 0 eng d | ||
040 | |a E7B |b eng |e rda |e pn |c E7B |d OCLCO |d N$T |d TEFOD |d OCLCF |d TEFOD |d OCLCQ |d OCLCO |d AZK |d OCLCQ |d CNNOR |d D6H |d OCLCQ |d STF |d OCLCA |d OCLCQ |d OCLCO |d G3B |d VT2 |d RDF |d OCLCO |d OCLCQ |d QGK |d OCLCO | ||
019 | |a 961594438 |a 1259219285 | ||
020 | |a 9781784390259 |q (electronic bk.) | ||
020 | |a 1784390259 |q (electronic bk.) | ||
020 | |z 9781784398729 | ||
035 | |a (OCoLC)905919367 |z (OCoLC)961594438 |z (OCoLC)1259219285 | ||
037 | |a 2C7DCE72-F3D5-464B-B059-790D40A24DDB |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.76.O63 |b .S583 2015eb | |
072 | 7 | |a COM |x 088020 |2 bisacsh | |
072 | 7 | |a COM |x 046060 |2 bisacsh | |
072 | 7 | |a COM |x 046050 |2 bisacsh | |
072 | 7 | |a COM |x 046020 |2 bisacsh | |
072 | 7 | |a COM |x 046040 |2 bisacsh | |
082 | 7 | |a 005.4469 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Sivarajan, Santhosh, |e author. | |
245 | 1 | 0 | |a Getting started with windows server security : |b develop and implement a secure microsoft infrastructure platform using native and built-in tools / |c Santhosh Sivarajan ; commissioning editor Kunal Parikh ; acquisition editor Rebecca Youe ; copy editors Shivangi Chaturvedi, Adithi Shetty. |
264 | 1 | |a Birmingham, England ; |a Mumbai [India] : |b Packt Publishing, |c 2015. | |
264 | 4 | |c ©2015 | |
300 | |a 1 online resource (240 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
490 | 0 | |a Professional Expertise Distilled | |
500 | |a Includes index. | ||
588 | 0 | |a Online resource; title from PDF title page (ebrary, viewed March 14, 2015). | |
505 | 0 | |a Cover; Copyright; Credits; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Operating System and Baseline Security; Microsoft Windows Server; Baseline and security; Security Configuration Wizard; Translating your policy into a technical policy; Creating a policy template; Policy review and validation; Policy implementation; Analyzing the result and troubleshooting; A backup or rollback plan; Summary; Chapter 2: Native MS Security Tools and Configuration; Microsoft SCM; Installing Microsoft SCM; Administering Microsoft SCM | |
505 | 8 | |a Creating and implementing security policiesExporting GPO from Active Directory; Importing GPO into SCM; Merging imported GPO with the SCM baseline policy; Exporting the SCM baseline policy; Importing a policy into Active Directory; Maintaining and monitoring the integrity of a baseline policy; Microsoft ASA; Application control and management; AppLocker; Creating a policy; Auditing a policy; Implementing the policy; AppLocker and PowerShell; Summary; Chapter 3: Server Roles and Protocols; Server types and roles; Managing servers using Server Manager; Monitoring and securing server roles | |
505 | 8 | |a Creating a server role baseline reportAnalyzing production servers; Server Message Block; Configuring and implementing SMB; Identifying the client and server operating system; Verifying the current SMB configuration; Enabling or disabling the SMB encryption; Verifying SMB communication; Summary; Chapter 4: Application Security; File or data server; Applying baseline security; The access mechanism; Data protection; Removing unwanted shares; Data encryption using BitLocker encryption; Encrypting data volume; Managing BitLocker volume; Print server; Applying baseline security | |
505 | 8 | |a The print server role securityPrint server access mechanisms; The printer driver security and installation; Print server and share permissions; Hyper-V servers; Applying baseline security; Securing the access mechanism; Guard protection; Enabling the guard protection; Encrypting Hyper-V host servers; Internet Information Services; Applying baseline security; Securing web server components; Securing the access mechanisms; Adding dynamic IP restrictions; Summary; Chapter 5: Network Service Security; Baseline policies; Installing RODCs; Configuring RODCs; Domain Name System | |
505 | 8 | |a Applying a DNS baseline policyEnabling Scavenging on a DNS server; Enabling Scavenging on a DNS zone; Securing DNS dynamic updates; Cache poisoning attacks; Dynamic Host Configuration Protocol; Applying a DHCP baseline policy; Controlling and segregating IP address allocation; Configuring PBA; Securing DHCP administration; IP address and DNS management and monitoring; Service accounts; Group Managed Service Accounts; Creating a KDS root key; Creating Group Managed Service Accounts; Installing Group Managed Service Accounts; Configuring Group Managed Service Accounts | |
520 | |a If you are a security or Windows Server administrator wanting to learn or advance your knowledge in Microsoft security and secure your Windows Server infrastructure effectively, this book is for you. | ||
546 | |a English. | ||
630 | 0 | 0 | |a Microsoft Windows (Computer file) |
630 | 0 | 7 | |a Microsoft Windows (Computer file) |2 fast |
650 | 0 | |a Virtual computer systems. |0 http://id.loc.gov/authorities/subjects/sh85143804 | |
650 | 0 | |a Data recovery (Computer science) |0 http://id.loc.gov/authorities/subjects/sh88005793 | |
650 | 6 | |a Systèmes virtuels (Informatique) | |
650 | 6 | |a Récupération des données (Informatique) | |
650 | 7 | |a COMPUTERS |x System Administration |x Windows Administration. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Operating Systems |x DOS. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Operating Systems |x Windows Server & NT. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Operating Systems |x Macintosh. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Operating Systems |x Windows Workstation. |2 bisacsh | |
650 | 7 | |a Data recovery (Computer science) |2 fast | |
650 | 7 | |a Virtual computer systems |2 fast | |
700 | 1 | |a Parikh, Kunal, |e editor. | |
700 | 1 | |a Youe, Rebecca, |e editor. | |
700 | 1 | |a Chaturvedi, Shivangi, |e editor. | |
700 | 1 | |a Shetty, Adithi, |e editor. | |
776 | 0 | 8 | |i Print version: |a Sivarajan, Santhosh. |t Getting started with windows server security : develop and implement a secure microsoft infrastructure platform using native and built-in tools. |d Birmingham, England ; Mumbai, [India] : Packt Publishing, ©2015 |h iv, 221 pages |k Professional Expertise Distilled |z 9781784398729 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=960451 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a ebrary |b EBRY |n ebr11026019 | ||
938 | |a EBSCOhost |b EBSC |n 960451 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn905919367 |
---|---|
_version_ | 1816882308513267712 |
adam_text | |
any_adam_object | |
author | Sivarajan, Santhosh |
author2 | Parikh, Kunal Youe, Rebecca Chaturvedi, Shivangi Shetty, Adithi |
author2_role | edt edt edt edt |
author2_variant | k p kp r y ry s c sc a s as |
author_facet | Sivarajan, Santhosh Parikh, Kunal Youe, Rebecca Chaturvedi, Shivangi Shetty, Adithi |
author_role | aut |
author_sort | Sivarajan, Santhosh |
author_variant | s s ss |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.76.O63 .S583 2015eb |
callnumber-search | QA76.76.O63 .S583 2015eb |
callnumber-sort | QA 276.76 O63 S583 42015EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Cover; Copyright; Credits; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Operating System and Baseline Security; Microsoft Windows Server; Baseline and security; Security Configuration Wizard; Translating your policy into a technical policy; Creating a policy template; Policy review and validation; Policy implementation; Analyzing the result and troubleshooting; A backup or rollback plan; Summary; Chapter 2: Native MS Security Tools and Configuration; Microsoft SCM; Installing Microsoft SCM; Administering Microsoft SCM Creating and implementing security policiesExporting GPO from Active Directory; Importing GPO into SCM; Merging imported GPO with the SCM baseline policy; Exporting the SCM baseline policy; Importing a policy into Active Directory; Maintaining and monitoring the integrity of a baseline policy; Microsoft ASA; Application control and management; AppLocker; Creating a policy; Auditing a policy; Implementing the policy; AppLocker and PowerShell; Summary; Chapter 3: Server Roles and Protocols; Server types and roles; Managing servers using Server Manager; Monitoring and securing server roles Creating a server role baseline reportAnalyzing production servers; Server Message Block; Configuring and implementing SMB; Identifying the client and server operating system; Verifying the current SMB configuration; Enabling or disabling the SMB encryption; Verifying SMB communication; Summary; Chapter 4: Application Security; File or data server; Applying baseline security; The access mechanism; Data protection; Removing unwanted shares; Data encryption using BitLocker encryption; Encrypting data volume; Managing BitLocker volume; Print server; Applying baseline security The print server role securityPrint server access mechanisms; The printer driver security and installation; Print server and share permissions; Hyper-V servers; Applying baseline security; Securing the access mechanism; Guard protection; Enabling the guard protection; Encrypting Hyper-V host servers; Internet Information Services; Applying baseline security; Securing web server components; Securing the access mechanisms; Adding dynamic IP restrictions; Summary; Chapter 5: Network Service Security; Baseline policies; Installing RODCs; Configuring RODCs; Domain Name System Applying a DNS baseline policyEnabling Scavenging on a DNS server; Enabling Scavenging on a DNS zone; Securing DNS dynamic updates; Cache poisoning attacks; Dynamic Host Configuration Protocol; Applying a DHCP baseline policy; Controlling and segregating IP address allocation; Configuring PBA; Securing DHCP administration; IP address and DNS management and monitoring; Service accounts; Group Managed Service Accounts; Creating a KDS root key; Creating Group Managed Service Accounts; Installing Group Managed Service Accounts; Configuring Group Managed Service Accounts |
ctrlnum | (OCoLC)905919367 |
dewey-full | 005.4469 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.4469 |
dewey-search | 005.4469 |
dewey-sort | 15.4469 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06680cam a2200781 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn905919367</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">150316t20152015enka o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">E7B</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">E7B</subfield><subfield code="d">OCLCO</subfield><subfield code="d">N$T</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCF</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AZK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">CNNOR</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">STF</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">G3B</subfield><subfield code="d">VT2</subfield><subfield code="d">RDF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">QGK</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">961594438</subfield><subfield code="a">1259219285</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781784390259</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1784390259</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781784398729</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)905919367</subfield><subfield code="z">(OCoLC)961594438</subfield><subfield code="z">(OCoLC)1259219285</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">2C7DCE72-F3D5-464B-B059-790D40A24DDB</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.76.O63</subfield><subfield code="b">.S583 2015eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">088020</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">046060</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">046050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">046020</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">046040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.4469</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sivarajan, Santhosh,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Getting started with windows server security :</subfield><subfield code="b">develop and implement a secure microsoft infrastructure platform using native and built-in tools /</subfield><subfield code="c">Santhosh Sivarajan ; commissioning editor Kunal Parikh ; acquisition editor Rebecca Youe ; copy editors Shivangi Chaturvedi, Adithi Shetty.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, England ;</subfield><subfield code="a">Mumbai [India] :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2015.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (240 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Professional Expertise Distilled</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from PDF title page (ebrary, viewed March 14, 2015).</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Copyright; Credits; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Operating System and Baseline Security; Microsoft Windows Server; Baseline and security; Security Configuration Wizard; Translating your policy into a technical policy; Creating a policy template; Policy review and validation; Policy implementation; Analyzing the result and troubleshooting; A backup or rollback plan; Summary; Chapter 2: Native MS Security Tools and Configuration; Microsoft SCM; Installing Microsoft SCM; Administering Microsoft SCM</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Creating and implementing security policiesExporting GPO from Active Directory; Importing GPO into SCM; Merging imported GPO with the SCM baseline policy; Exporting the SCM baseline policy; Importing a policy into Active Directory; Maintaining and monitoring the integrity of a baseline policy; Microsoft ASA; Application control and management; AppLocker; Creating a policy; Auditing a policy; Implementing the policy; AppLocker and PowerShell; Summary; Chapter 3: Server Roles and Protocols; Server types and roles; Managing servers using Server Manager; Monitoring and securing server roles</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Creating a server role baseline reportAnalyzing production servers; Server Message Block; Configuring and implementing SMB; Identifying the client and server operating system; Verifying the current SMB configuration; Enabling or disabling the SMB encryption; Verifying SMB communication; Summary; Chapter 4: Application Security; File or data server; Applying baseline security; The access mechanism; Data protection; Removing unwanted shares; Data encryption using BitLocker encryption; Encrypting data volume; Managing BitLocker volume; Print server; Applying baseline security</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The print server role securityPrint server access mechanisms; The printer driver security and installation; Print server and share permissions; Hyper-V servers; Applying baseline security; Securing the access mechanism; Guard protection; Enabling the guard protection; Encrypting Hyper-V host servers; Internet Information Services; Applying baseline security; Securing web server components; Securing the access mechanisms; Adding dynamic IP restrictions; Summary; Chapter 5: Network Service Security; Baseline policies; Installing RODCs; Configuring RODCs; Domain Name System</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Applying a DNS baseline policyEnabling Scavenging on a DNS server; Enabling Scavenging on a DNS zone; Securing DNS dynamic updates; Cache poisoning attacks; Dynamic Host Configuration Protocol; Applying a DHCP baseline policy; Controlling and segregating IP address allocation; Configuring PBA; Securing DHCP administration; IP address and DNS management and monitoring; Service accounts; Group Managed Service Accounts; Creating a KDS root key; Creating Group Managed Service Accounts; Installing Group Managed Service Accounts; Configuring Group Managed Service Accounts</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">If you are a security or Windows Server administrator wanting to learn or advance your knowledge in Microsoft security and secure your Windows Server infrastructure effectively, this book is for you.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Microsoft Windows (Computer file)</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Microsoft Windows (Computer file)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Virtual computer systems.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85143804</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data recovery (Computer science)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh88005793</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Systèmes virtuels (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Récupération des données (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">System Administration</subfield><subfield code="x">Windows Administration.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Operating Systems</subfield><subfield code="x">DOS.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Operating Systems</subfield><subfield code="x">Windows Server & NT.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Operating Systems</subfield><subfield code="x">Macintosh.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Operating Systems</subfield><subfield code="x">Windows Workstation.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data recovery (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Virtual computer systems</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Parikh, Kunal,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Youe, Rebecca,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chaturvedi, Shivangi,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shetty, Adithi,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Sivarajan, Santhosh.</subfield><subfield code="t">Getting started with windows server security : develop and implement a secure microsoft infrastructure platform using native and built-in tools.</subfield><subfield code="d">Birmingham, England ; Mumbai, [India] : Packt Publishing, ©2015</subfield><subfield code="h">iv, 221 pages</subfield><subfield code="k">Professional Expertise Distilled</subfield><subfield code="z">9781784398729</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=960451</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr11026019</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">960451</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn905919367 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:26:33Z |
institution | BVB |
isbn | 9781784390259 1784390259 |
language | English |
oclc_num | 905919367 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (240 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Packt Publishing, |
record_format | marc |
series2 | Professional Expertise Distilled |
spelling | Sivarajan, Santhosh, author. Getting started with windows server security : develop and implement a secure microsoft infrastructure platform using native and built-in tools / Santhosh Sivarajan ; commissioning editor Kunal Parikh ; acquisition editor Rebecca Youe ; copy editors Shivangi Chaturvedi, Adithi Shetty. Birmingham, England ; Mumbai [India] : Packt Publishing, 2015. ©2015 1 online resource (240 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier data file Professional Expertise Distilled Includes index. Online resource; title from PDF title page (ebrary, viewed March 14, 2015). Cover; Copyright; Credits; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Operating System and Baseline Security; Microsoft Windows Server; Baseline and security; Security Configuration Wizard; Translating your policy into a technical policy; Creating a policy template; Policy review and validation; Policy implementation; Analyzing the result and troubleshooting; A backup or rollback plan; Summary; Chapter 2: Native MS Security Tools and Configuration; Microsoft SCM; Installing Microsoft SCM; Administering Microsoft SCM Creating and implementing security policiesExporting GPO from Active Directory; Importing GPO into SCM; Merging imported GPO with the SCM baseline policy; Exporting the SCM baseline policy; Importing a policy into Active Directory; Maintaining and monitoring the integrity of a baseline policy; Microsoft ASA; Application control and management; AppLocker; Creating a policy; Auditing a policy; Implementing the policy; AppLocker and PowerShell; Summary; Chapter 3: Server Roles and Protocols; Server types and roles; Managing servers using Server Manager; Monitoring and securing server roles Creating a server role baseline reportAnalyzing production servers; Server Message Block; Configuring and implementing SMB; Identifying the client and server operating system; Verifying the current SMB configuration; Enabling or disabling the SMB encryption; Verifying SMB communication; Summary; Chapter 4: Application Security; File or data server; Applying baseline security; The access mechanism; Data protection; Removing unwanted shares; Data encryption using BitLocker encryption; Encrypting data volume; Managing BitLocker volume; Print server; Applying baseline security The print server role securityPrint server access mechanisms; The printer driver security and installation; Print server and share permissions; Hyper-V servers; Applying baseline security; Securing the access mechanism; Guard protection; Enabling the guard protection; Encrypting Hyper-V host servers; Internet Information Services; Applying baseline security; Securing web server components; Securing the access mechanisms; Adding dynamic IP restrictions; Summary; Chapter 5: Network Service Security; Baseline policies; Installing RODCs; Configuring RODCs; Domain Name System Applying a DNS baseline policyEnabling Scavenging on a DNS server; Enabling Scavenging on a DNS zone; Securing DNS dynamic updates; Cache poisoning attacks; Dynamic Host Configuration Protocol; Applying a DHCP baseline policy; Controlling and segregating IP address allocation; Configuring PBA; Securing DHCP administration; IP address and DNS management and monitoring; Service accounts; Group Managed Service Accounts; Creating a KDS root key; Creating Group Managed Service Accounts; Installing Group Managed Service Accounts; Configuring Group Managed Service Accounts If you are a security or Windows Server administrator wanting to learn or advance your knowledge in Microsoft security and secure your Windows Server infrastructure effectively, this book is for you. English. Microsoft Windows (Computer file) Microsoft Windows (Computer file) fast Virtual computer systems. http://id.loc.gov/authorities/subjects/sh85143804 Data recovery (Computer science) http://id.loc.gov/authorities/subjects/sh88005793 Systèmes virtuels (Informatique) Récupération des données (Informatique) COMPUTERS System Administration Windows Administration. bisacsh COMPUTERS Operating Systems DOS. bisacsh COMPUTERS Operating Systems Windows Server & NT. bisacsh COMPUTERS Operating Systems Macintosh. bisacsh COMPUTERS Operating Systems Windows Workstation. bisacsh Data recovery (Computer science) fast Virtual computer systems fast Parikh, Kunal, editor. Youe, Rebecca, editor. Chaturvedi, Shivangi, editor. Shetty, Adithi, editor. Print version: Sivarajan, Santhosh. Getting started with windows server security : develop and implement a secure microsoft infrastructure platform using native and built-in tools. Birmingham, England ; Mumbai, [India] : Packt Publishing, ©2015 iv, 221 pages Professional Expertise Distilled 9781784398729 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=960451 Volltext |
spellingShingle | Sivarajan, Santhosh Getting started with windows server security : develop and implement a secure microsoft infrastructure platform using native and built-in tools / Cover; Copyright; Credits; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Operating System and Baseline Security; Microsoft Windows Server; Baseline and security; Security Configuration Wizard; Translating your policy into a technical policy; Creating a policy template; Policy review and validation; Policy implementation; Analyzing the result and troubleshooting; A backup or rollback plan; Summary; Chapter 2: Native MS Security Tools and Configuration; Microsoft SCM; Installing Microsoft SCM; Administering Microsoft SCM Creating and implementing security policiesExporting GPO from Active Directory; Importing GPO into SCM; Merging imported GPO with the SCM baseline policy; Exporting the SCM baseline policy; Importing a policy into Active Directory; Maintaining and monitoring the integrity of a baseline policy; Microsoft ASA; Application control and management; AppLocker; Creating a policy; Auditing a policy; Implementing the policy; AppLocker and PowerShell; Summary; Chapter 3: Server Roles and Protocols; Server types and roles; Managing servers using Server Manager; Monitoring and securing server roles Creating a server role baseline reportAnalyzing production servers; Server Message Block; Configuring and implementing SMB; Identifying the client and server operating system; Verifying the current SMB configuration; Enabling or disabling the SMB encryption; Verifying SMB communication; Summary; Chapter 4: Application Security; File or data server; Applying baseline security; The access mechanism; Data protection; Removing unwanted shares; Data encryption using BitLocker encryption; Encrypting data volume; Managing BitLocker volume; Print server; Applying baseline security The print server role securityPrint server access mechanisms; The printer driver security and installation; Print server and share permissions; Hyper-V servers; Applying baseline security; Securing the access mechanism; Guard protection; Enabling the guard protection; Encrypting Hyper-V host servers; Internet Information Services; Applying baseline security; Securing web server components; Securing the access mechanisms; Adding dynamic IP restrictions; Summary; Chapter 5: Network Service Security; Baseline policies; Installing RODCs; Configuring RODCs; Domain Name System Applying a DNS baseline policyEnabling Scavenging on a DNS server; Enabling Scavenging on a DNS zone; Securing DNS dynamic updates; Cache poisoning attacks; Dynamic Host Configuration Protocol; Applying a DHCP baseline policy; Controlling and segregating IP address allocation; Configuring PBA; Securing DHCP administration; IP address and DNS management and monitoring; Service accounts; Group Managed Service Accounts; Creating a KDS root key; Creating Group Managed Service Accounts; Installing Group Managed Service Accounts; Configuring Group Managed Service Accounts Microsoft Windows (Computer file) Microsoft Windows (Computer file) fast Virtual computer systems. http://id.loc.gov/authorities/subjects/sh85143804 Data recovery (Computer science) http://id.loc.gov/authorities/subjects/sh88005793 Systèmes virtuels (Informatique) Récupération des données (Informatique) COMPUTERS System Administration Windows Administration. bisacsh COMPUTERS Operating Systems DOS. bisacsh COMPUTERS Operating Systems Windows Server & NT. bisacsh COMPUTERS Operating Systems Macintosh. bisacsh COMPUTERS Operating Systems Windows Workstation. bisacsh Data recovery (Computer science) fast Virtual computer systems fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85143804 http://id.loc.gov/authorities/subjects/sh88005793 |
title | Getting started with windows server security : develop and implement a secure microsoft infrastructure platform using native and built-in tools / |
title_auth | Getting started with windows server security : develop and implement a secure microsoft infrastructure platform using native and built-in tools / |
title_exact_search | Getting started with windows server security : develop and implement a secure microsoft infrastructure platform using native and built-in tools / |
title_full | Getting started with windows server security : develop and implement a secure microsoft infrastructure platform using native and built-in tools / Santhosh Sivarajan ; commissioning editor Kunal Parikh ; acquisition editor Rebecca Youe ; copy editors Shivangi Chaturvedi, Adithi Shetty. |
title_fullStr | Getting started with windows server security : develop and implement a secure microsoft infrastructure platform using native and built-in tools / Santhosh Sivarajan ; commissioning editor Kunal Parikh ; acquisition editor Rebecca Youe ; copy editors Shivangi Chaturvedi, Adithi Shetty. |
title_full_unstemmed | Getting started with windows server security : develop and implement a secure microsoft infrastructure platform using native and built-in tools / Santhosh Sivarajan ; commissioning editor Kunal Parikh ; acquisition editor Rebecca Youe ; copy editors Shivangi Chaturvedi, Adithi Shetty. |
title_short | Getting started with windows server security : |
title_sort | getting started with windows server security develop and implement a secure microsoft infrastructure platform using native and built in tools |
title_sub | develop and implement a secure microsoft infrastructure platform using native and built-in tools / |
topic | Microsoft Windows (Computer file) Microsoft Windows (Computer file) fast Virtual computer systems. http://id.loc.gov/authorities/subjects/sh85143804 Data recovery (Computer science) http://id.loc.gov/authorities/subjects/sh88005793 Systèmes virtuels (Informatique) Récupération des données (Informatique) COMPUTERS System Administration Windows Administration. bisacsh COMPUTERS Operating Systems DOS. bisacsh COMPUTERS Operating Systems Windows Server & NT. bisacsh COMPUTERS Operating Systems Macintosh. bisacsh COMPUTERS Operating Systems Windows Workstation. bisacsh Data recovery (Computer science) fast Virtual computer systems fast |
topic_facet | Microsoft Windows (Computer file) Virtual computer systems. Data recovery (Computer science) Systèmes virtuels (Informatique) Récupération des données (Informatique) COMPUTERS System Administration Windows Administration. COMPUTERS Operating Systems DOS. COMPUTERS Operating Systems Windows Server & NT. COMPUTERS Operating Systems Macintosh. COMPUTERS Operating Systems Windows Workstation. Virtual computer systems |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=960451 |
work_keys_str_mv | AT sivarajansanthosh gettingstartedwithwindowsserversecuritydevelopandimplementasecuremicrosoftinfrastructureplatformusingnativeandbuiltintools AT parikhkunal gettingstartedwithwindowsserversecuritydevelopandimplementasecuremicrosoftinfrastructureplatformusingnativeandbuiltintools AT youerebecca gettingstartedwithwindowsserversecuritydevelopandimplementasecuremicrosoftinfrastructureplatformusingnativeandbuiltintools AT chaturvedishivangi gettingstartedwithwindowsserversecuritydevelopandimplementasecuremicrosoftinfrastructureplatformusingnativeandbuiltintools AT shettyadithi gettingstartedwithwindowsserversecuritydevelopandimplementasecuremicrosoftinfrastructureplatformusingnativeandbuiltintools |