Windows Server 2003 Environment Chapter 14

Windows Server 2003 Environment Chapter 14 - 70-290: MCSE...

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 EnvironmentChapter 14:Windows Server 2003 Security Features70-290: MCSE Guide to Managing a Microsoft Wind2ObjectivesIdentify the various elements and techniques that can be used to secure a Windows Server 2003 systemUse Security Configuration and Analysis tools to configure and review security settingsAudit access to resources and review Security log settings70-290: MCSE Guide to Managing a Microsoft Wind3Securing Your Windows 2003 SystemFive broad categories of security-related features:AuthenticationAccess controlEncryptionSecurity policiesService packs and hot fixes70-290: MCSE Guide to Managing a Microsoft Wind4AuthenticationMost basic level is requiring a user id and password to log on to some systemIn a domain environment, authentication is centralized on the network while in a workgroup environment, authentication is local In a domain environment, a single authentication can provide access to multiple domains and forestsAdditional authentication methods can apply to other services (e.g., IIS)70-290: MCSE Guide to Managing a Microsoft Wind5Access ControlAccess control is used to secure resources such as files, folders, and printersCommon types of access control are NTSF and shared folder permissions, printer permissions, Active Directory object permissionsThe principle of least privilege implies that users should only have the access that they really need70-290: MCSE Guide to Managing a Microsoft Wind6Encryption Confidential files can be encrypted using the Encrypting File System (EFS) for local files stored on NTFS volumesEFS uses a combination of public and private keys The IPSec protocol can encrypt the contents of packets sent across a TCP/IP networkThere are two IPSec modes: transport and tunnelIPSec is used to make it difficult for hackers to intercept sensitive network data 70-290: MCSE Guide to Managing a Microsoft Wind7Security PoliciesSecurity policy settings can be configured from the Local Security Policy and Group Policy Object Editor MMC snap-insSecurity policies control a range of security settingsWindows Server 2003 includes tools that analyze policy settings compared to pre-configured security templatesSecurity Configuration and Analysis MMC snap-inCommand-line SECEDIT utility70-290: MCSE Guide to Managing a Microsoft Wind8Service Packs and Hot FixesMany critical updates and patches are related to security issuesHot fixes address a specific identified issueA service pack is a cumulative collection of hot fixes and updatesService packs and hot fixes can be downloaded and installed from MicrosoftSoftware Update Services can assist in automating and managing the distribution of updates70-290: MCSE Guide to Managing a Microsoft Wind9Using Security Configuration Manager ToolsWindows Server 2003 provides tools specifically designed to help configure and manage security...
View Full Document

This note was uploaded on 01/18/2010 for the course CET 2722 taught by Professor Richarda.matias during the Spring '08 term at Valencia.

Page1 / 48

Windows Server 2003 Environment Chapter 14 - 70-290: MCSE...

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online