Ebook326 pages6 hours
Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization
Rating: 0 out of 5 stars
()
About this ebook
Microsoft hails the latest version of its flagship server operating system, Windows Server 2008, as "the most secure Windows Server ever". However, to fully achieve this lofty status, system administrators and security professionals must install, configure, monitor, log, and troubleshoot a dizzying array of new features and tools designed to keep the bad guys out and maintain the integrity of their network servers. This is no small task considering the market saturation of Windows Server and the rate at which it is attacked by malicious hackers. According to IDC, Windows Server runs 38% of all network servers. This market prominence also places Windows Server at the top of the SANS top 20 Security Attach Targets. The first five attack targets listed in the SANS top 20 for operating systems are related to Windows Server. This doesn't mean that Windows is inherently less secure than other operating systems; it's simply a numbers game. More machines running Windows Server. More targets for attackers to hack.
As a result of being at the top of the "most used" and "most hacked" lists, Microsoft has released a truly powerful suite of security tools for system administrators to deploy with Windows Server 2008. This book is the comprehensive guide needed by system administrators and security professionals to master seemingly overwhelming arsenal of new security tools including:
1. Network Access Protection, which gives administrators the power to isolate computers that don't comply with established security policies. The ability to enforce security requirements is a powerful means of protecting the network.
2. Enhanced solutions for intelligent rules and policies creation to increase control and protection over networking functions, allowing administrators to have a policy-driven network.
3. Protection of data to ensure it can only be accessed by users with the correct security context, and to make it available when hardware failures occur.
4. Protection against malicious software with User Account Control with a new authentication architecture.
5. Increased control over your user settings with Expanded Group Policy.
...to name just a handful of the new security features. In short, Windows Server 2008 contains by far the most powerful and complex suite of security tools ever released in a Microsoft Server product. Securing Windows Server 2008 provides system administrators and security professionals with the knowledge they need to harness this power.
* Describes new technologies and features in Windows Server 2008, such as improvements to networking and remote access features, centralized server role management, and an improved file system.
* Outlines steps for installing only the necessary components and subsystems of Windows Server 2008 in your environment. No GUI needed.
* Describes Windows Server 2008?s security innovations, such as Network Access Protection, Federated Rights Management, and Read-Only Domain Controller
* Includes coverage of monitoring, securing, and troubleshooting Windows Server 2008
* Covers Microsoft's Hyper-V virtualization technology, which is offered as an add-on to four of the eight versions of Windows Server 2008 and as a stand-alone product
As a result of being at the top of the "most used" and "most hacked" lists, Microsoft has released a truly powerful suite of security tools for system administrators to deploy with Windows Server 2008. This book is the comprehensive guide needed by system administrators and security professionals to master seemingly overwhelming arsenal of new security tools including:
1. Network Access Protection, which gives administrators the power to isolate computers that don't comply with established security policies. The ability to enforce security requirements is a powerful means of protecting the network.
2. Enhanced solutions for intelligent rules and policies creation to increase control and protection over networking functions, allowing administrators to have a policy-driven network.
3. Protection of data to ensure it can only be accessed by users with the correct security context, and to make it available when hardware failures occur.
4. Protection against malicious software with User Account Control with a new authentication architecture.
5. Increased control over your user settings with Expanded Group Policy.
...to name just a handful of the new security features. In short, Windows Server 2008 contains by far the most powerful and complex suite of security tools ever released in a Microsoft Server product. Securing Windows Server 2008 provides system administrators and security professionals with the knowledge they need to harness this power.
* Describes new technologies and features in Windows Server 2008, such as improvements to networking and remote access features, centralized server role management, and an improved file system.
* Outlines steps for installing only the necessary components and subsystems of Windows Server 2008 in your environment. No GUI needed.
* Describes Windows Server 2008?s security innovations, such as Network Access Protection, Federated Rights Management, and Read-Only Domain Controller
* Includes coverage of monitoring, securing, and troubleshooting Windows Server 2008
* Covers Microsoft's Hyper-V virtualization technology, which is offered as an add-on to four of the eight versions of Windows Server 2008 and as a stand-alone product
Read more from Aaron Tiensivu
Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization Rating: 0 out of 5 stars0 ratingsVirtualization with Microsoft Virtual Server 2005 Rating: 0 out of 5 stars0 ratings
Related to Securing Windows Server 2008
Related ebooks
Microsoft Windows Server 2008 R2 Administrator's Reference: The Administrator's Essential Reference Rating: 5 out of 5 stars5/5Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization Rating: 4 out of 5 stars4/5CompTIA Linux+ Certification Study Guide (2009 Exam): Exam XK0-003 Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Certification Study Guide: Exam SY0-201 3E Rating: 0 out of 5 stars0 ratingsMigrating to the Cloud: Oracle Client/Server Modernization Rating: 0 out of 5 stars0 ratingsMicrosoft SQL Server 2005: A Beginner''s Guide Rating: 0 out of 5 stars0 ratingsEleventh Hour Linux+: Exam XK0-003 Study Guide Rating: 4 out of 5 stars4/5Open Source Fuzzing Tools Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Certification Study Guide: Exam N10-004: Exam N10-004 2E Rating: 4 out of 5 stars4/5Mac OSX Developer's Guide Rating: 0 out of 5 stars0 ratingsCisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit Rating: 2 out of 5 stars2/5Eleventh Hour Security+: Exam SY0-201 Study Guide Rating: 0 out of 5 stars0 ratingsEffective Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem Rating: 0 out of 5 stars0 ratingsFritzing for Inventors: Take Your Electronics Project from Prototype to Product Rating: 0 out of 5 stars0 ratingsExcel VBA Macro Programming Rating: 0 out of 5 stars0 ratingsCSS Hacks and Filters: Making Cascading Stylesheets Work Rating: 3 out of 5 stars3/5Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals Rating: 5 out of 5 stars5/5Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts Rating: 4 out of 5 stars4/5Code Leader: Using People, Tools, and Processes to Build Successful Software Rating: 5 out of 5 stars5/5You Can Program in C++: A Programmer's Introduction Rating: 0 out of 5 stars0 ratingsSemantics in Business Systems: The Savvy Manager's Guide Rating: 3 out of 5 stars3/5The Microsoft SQL Server 2000 Performance Optimization and Tuning Handbook Rating: 0 out of 5 stars0 ratingsBreakthrough Improvement with QI Macros and Excel: Finding the Invisible Low-Hanging Fruit: Finding the Invisible Low-Hanging Fruit Rating: 0 out of 5 stars0 ratingsDeveloping Web Information Systems: From Strategy to Implementation Rating: 5 out of 5 stars5/5Securing ChatGPT: Best Practices for Protecting Sensitive Data in AI Language Models Rating: 0 out of 5 stars0 ratingsA To Z of Internet: Everything You Wanted to Know Rating: 0 out of 5 stars0 ratingsDigital Media Processing: DSP Algorithms Using C Rating: 0 out of 5 stars0 ratingsSoftware Patterns Made Easy Rating: 0 out of 5 stars0 ratingsChatGPT for Business: Strategies for Success Rating: 0 out of 5 stars0 ratings
Operating Systems For You
Excel : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Excel Programming: 1 Rating: 5 out of 5 stars5/5Make Your PC Stable and Fast: What Microsoft Forgot to Tell You Rating: 4 out of 5 stars4/5Windows 11 All-in-One For Dummies Rating: 5 out of 5 stars5/5Learn Windows PowerShell in a Month of Lunches Rating: 0 out of 5 stars0 ratingsMastering Windows PowerShell Scripting Rating: 4 out of 5 stars4/5The Windows Command Line Beginner's Guide: Second Edition Rating: 4 out of 5 stars4/5The Linux Command Line Beginner's Guide Rating: 4 out of 5 stars4/5Windows 11 For Dummies Rating: 0 out of 5 stars0 ratingsHacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security Rating: 0 out of 5 stars0 ratingsLinux for Beginners: Linux Command Line, Linux Programming and Linux Operating System Rating: 4 out of 5 stars4/5Tor Darknet Bundle: Master the Art of Invisibility Rating: 0 out of 5 stars0 ratingsLinux: Learn in 24 Hours Rating: 5 out of 5 stars5/5Essential iPhone iOS 12 Edition: The Illustrated Guide to Using iPhone Rating: 0 out of 5 stars0 ratingsUNIX For Dummies Rating: 3 out of 5 stars3/5Networking for System Administrators: IT Mastery, #5 Rating: 5 out of 5 stars5/5Pages For Seniors: A Ridiculously Simple Guide To Word Processing On Your Mac Rating: 0 out of 5 stars0 ratingsDarknet Rating: 4 out of 5 stars4/5iPhone Unlocked Rating: 0 out of 5 stars0 ratingsHacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5iPad and iPad Pro For Dummies Rating: 0 out of 5 stars0 ratingsHacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Rating: 3 out of 5 stars3/5CompTIA Linux+ Study Guide: Exam XK0-004 Rating: 0 out of 5 stars0 ratingsMacs All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsWindows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry Rating: 4 out of 5 stars4/5Raspberry Pi Cookbook for Python Programmers Rating: 0 out of 5 stars0 ratingsOneNote: The Ultimate Guide on How to Use Microsoft OneNote for Getting Things Done Rating: 1 out of 5 stars1/5The Mac Terminal Reference and Scripting Primer Rating: 4 out of 5 stars4/5
Reviews for Securing Windows Server 2008
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews
Book preview
Securing Windows Server 2008 - Aaron Tiensivu
Enjoying the preview?
Page 1 of 1