You are previewing Securing Windows Server 2008.
O'Reilly logo
Securing Windows Server 2008

Book Description

Microsoft hails the latest version of its flagship server operating system, Windows Server 2008, as "the most secure Windows Server ever". However, to fully achieve this lofty status, system administrators and security professionals must install, configure, monitor, log, and troubleshoot a dizzying array of new features and tools designed to keep the bad guys out and maintain the integrity of their network servers. This is no small task considering the market saturation of Windows Server and the rate at which it is attacked by malicious hackers. According to IDC, Windows Server runs 38% of all network servers. This market prominence also places Windows Server at the top of the SANS top 20 Security Attach Targets. The first five attack targets listed in the SANS top 20 for operating systems are related to Windows Server. This doesn't mean that Windows is inherently less secure than other operating systems; it's simply a numbers game. More machines running Windows Server. More targets for attackers to hack.
As a result of being at the top of the "most used" and "most hacked" lists, Microsoft has released a truly powerful suite of security tools for system administrators to deploy with Windows Server 2008. This book is the comprehensive guide needed by system administrators and security professionals to master seemingly overwhelming arsenal of new security tools including:
1. Network Access Protection, which gives administrators the power to isolate computers that don't comply with established security policies. The ability to enforce security requirements is a powerful means of protecting the network.
2. Enhanced solutions for intelligent rules and policies creation to increase control and protection over networking functions, allowing administrators to have a policy-driven network.
3. Protection of data to ensure it can only be accessed by users with the correct security context, and to make it available when hardware failures occur.
4. Protection against malicious software with User Account Control with a new authentication architecture.
5. Increased control over your user settings with Expanded Group Policy.
...to name just a handful of the new security features. In short, Windows Server 2008 contains by far the most powerful and complex suite of security tools ever released in a Microsoft Server product. Securing Windows Server 2008 provides system administrators and security professionals with the knowledge they need to harness this power.


* Describes new technologies and features in Windows Server 2008, such as improvements to networking and remote access features, centralized server role management, and an improved file system.
* Outlines steps for installing only the necessary components and subsystems of Windows Server 2008 in your environment. No GUI needed.
* Describes Windows Server 2008?s security innovations, such as Network Access Protection, Federated Rights Management, and Read-Only Domain Controller
* Includes coverage of monitoring, securing, and troubleshooting Windows Server 2008
* Covers Microsoft's Hyper-V virtualization technology, which is offered as an add-on to four of the eight versions of Windows Server 2008 and as a stand-alone product

Table of Contents

  1. Copyright
  2. Brief Table of Contents
  3. Table of Contents
  4. List of Figures
  5. List of Tables
  6. Contributing Authors
  7. Chapter 1. Microsoft Windows Server 2008
    1. Introduction
    2. Server Manager
    3. Server Core
    4. Active Directory Certificate Services
    5. Active Directory Domain Services
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  8. Chapter 2. Microsoft Windows Server 2008
    1. Introduction
    2. What Is PKI?
    3. Digital Certificates
    4. Working with Certificate Services
    5. Working with Templates
    6. Creating a Custom Template
    7. Summary
    8. Solutions Fast Track
    9. Working with Templates
    10. Creating a Custom Template
    11. Frequently Asked Questions
  9. Chapter 3. Microsoft Windows Server 2008
    1. Introduction
    2. Configuring Audit Policies
    3. Fine-Grain Password and Account Lockout Policies
    4. Read-Only Domain Controllers (RODCs)
    5. Digital Rights Management Service
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  10. Chapter 4. Microsoft Windows Server 2008
    1. Introduction
    2. Network Policy Server
    3. Network Policy and Access Services Role
    4. 802.1x Wired and Wireless Access
    5. Configuring Wireless Access
    6. Summary
    7. Solutions Fast Track
    8. Frequently Asked Questions
  11. Chapter 5. Microsoft Windows Server 2008
    1. Introduction
    2. BitLocker
    3. Active Directory Rights Management Services
    4. Authorization
    5. Summary
    6. Solutions Fast Track
    7. Frequently Asked Questions
  12. Chapter 6. Microsoft Windows Server 2008
    1. Introduction
    2. Not Your Father's TCP/IP Stack
    3. Using the Network and Sharing Center
    4. Using Network Map
    5. Managing Wired Connections
    6. Managing Wireless Connections
    7. Changing from a Private to a Public Network Location
    8. Summary
    9. Solutions Fast Track
    10. Frequently Asked Questions
  13. Chapter 7. Microsoft Windows Server 2008
    1. Introduction
    2. Server Core Features
    3. Server Core Components
    4. Server Core Best Practices
    5. Server Core Administration
    6. Administrating Server Core
    7. Installing Active Directory Domain Services on Server Core
    8. Summary
    9. Solutions Fast Track
    10. Frequently Asked Questions
  14. Chapter 8. Configuring Windows Server Hyper-V and Virtual Machines
    1. Introduction
    2. Configuring Virtual Machines
    3. Installing Hyper-V and Creating Virtual Machines
    4. Migrating from Physical to Virtual Machines
    5. Backing Up Virtual Machines
    6. Virtual Server Optimization
    7. Summary
    8. Solutions Fast Track
    9. Frequently Asked Questions
  15. Chapter 9. Microsoft Windows Server 2008
    1. Introduction
    2. Terminal Services RemoteApp
    3. Terminal Services Gateway
    4. Terminal Services Web Access
    5. Summary
    6. Solutions Fast Track
    7. Frequently Asked Questions
  16. Index
    1. SYMBOL
    2. A
    3. B
    4. C
    5. D
    6. E
    7. F
    8. G
    9. H
    10. I
    11. K
    12. L
    13. M
    14. N
    15. O
    16. P
    17. R
    18. S
    19. T
    20. U
    21. V
    22. W
    23. X