Chapter 1

  • Answers will vary. One possible drawing will look similar to Figure 1-2 as a triangle with three sides of confidentiality, integrity, and availability.
  • Answers will vary. You can use the steps in the “Reducing the Attack Surface” section of this chapter. After opening the file, search for “SMTPSVC”.
  • Answers will vary. You can use the steps in the “Reducing the Attack Surface” section of this chapter. After opening the file, search for “Logon” in the Microsoft.OS.Audit section. If it lists Success="True", then successful logon events are logged. If it lists Failure="True", then unsuccessful logon events are logged.
  • Answers will vary. On Windows 2008, you can choose Start Administrative Tools  Windows Firewall With Advanced Security. ...

Get Microsoft® Windows® Security: Essentials now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.