Table of Contents

  1. Introduction
    1. Technical Requirements
    2. Organisational Structure
    3. Information Security
    4. Configure Your Server
    5. Manage Your Server
  2. Planning a Secure Baseline Installation
    1. New Features
    2. Graphical Tools
    3. Default Security Settings
    4. New Security Features
    5. Security Threats
    6. Planning Baseline Security
    7. Security Policy Template Categories
    8. Security Templates
    9. Default Security Templates
    10. Secure Templates
    11. Backward Compatible Security Templates
    12. Miscellaneous Security Templates
    13. Managing Security Templates
    14. Enforcing Default Security Settings
    15. Physical Security
    16. Hotfixes and Service Packs
    17. Antivirus Protection
    18. Insecure Services and Accounts
    19. Password Security
    20. File Systems
    21. Analysing Security using Security Configuration and Analysis
  3. Planning Security for Servers with Specific Roles
    1. Server Roles
    2. Configuring Roles
    3. Domain Controllers (Authentication Servers)
    4. Active Directory
    5. Flexible Single Master Operations
    6. PDC Emulator
    7. RID Master
    8. Domain Naming Master
    9. Schema Master
    10. Securing Domain Controllers
    11. File and Print Servers
    12. Printer Permissions
    13. DHCP Servers
    14. Name Resolution
    15. Web Servers
    16. Internet Information Services (IIS)
    17. Firewalls
    18. Tri-homed Firewalls
    19. Wireless Access Points
    20. Database Servers
    21. Mail Servers
    22. Application Servers and Terminal Servers
    23. Certificate Authorities
  4. Configuring Security
    1. Customising a Predefined Security Template
    2. Creating a New Security Template
  5. Evaluating and Selecting an Operating System
    1. Security Features
    2. Identifying the Minimum Configuration