{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Windows Server 2003 Environment Chapter 14

Windows Server 2003 Environment Chapter 14 - 70-290 MCSE...

Info icon This preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 14: Windows Server 2003 Security Features
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
70-290: MCSE Guide to Managing a Microsoft Wind 2 Objectives Identify the various elements and techniques that can be used to secure a Windows Server 2003 system Use Security Configuration and Analysis tools to configure and review security settings Audit access to resources and review Security log settings
Image of page 2
70-290: MCSE Guide to Managing a Microsoft Wind 3 Securing Your Windows 2003 System Five broad categories of security-related features: Authentication Access control Encryption Security policies Service packs and hot fixes
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
70-290: MCSE Guide to Managing a Microsoft Wind 4 Authentication Most basic level is requiring a user id and password to log on to some system In a domain environment, authentication is centralized on the network while in a workgroup environment, authentication is local In a domain environment, a single authentication can provide access to multiple domains and forests Additional authentication methods can apply to other services (e.g., IIS)
Image of page 4
70-290: MCSE Guide to Managing a Microsoft Wind 5 Access Control Access control is used to secure resources such as files, folders, and printers Common types of access control are NTSF and shared folder permissions, printer permissions, Active Directory object permissions The “principle of least privilege” implies that users should only have the access that they really need
Image of page 5

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
70-290: MCSE Guide to Managing a Microsoft Wind 6 Encryption Confidential files can be encrypted using the Encrypting File System (EFS) for local files stored on NTFS volumes EFS uses a combination of public and private keys The IPSec protocol can encrypt the contents of packets sent across a TCP/IP network There are two IPSec modes: transport and tunnel IPSec is used to make it difficult for hackers to intercept sensitive network data
Image of page 6
70-290: MCSE Guide to Managing a Microsoft Wind 7 Security Policies Security policy settings can be configured from the Local Security Policy and Group Policy Object Editor MMC snap-ins Security policies control a range of security settings Windows Server 2003 includes tools that analyze policy settings compared to pre-configured security templates Security Configuration and Analysis MMC snap-in Command-line SECEDIT utility
Image of page 7

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
70-290: MCSE Guide to Managing a Microsoft Wind 8 Service Packs and Hot Fixes Many critical updates and patches are related to security issues Hot fixes address a specific identified issue A service pack is a cumulative collection of hot fixes and updates Service packs and hot fixes can be downloaded and installed from Microsoft Software Update Services can assist in automating and managing the distribution of updates
Image of page 8
70-290: MCSE Guide to Managing a Microsoft Wind 9 Using Security Configuration Manager Tools Windows Server 2003 provides tools specifically
Image of page 9

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern