- Shows how to improve Windows desktop and server security by configuring default security before installing off-the-shelf security products
- Educates readers about the most significant security threats, building the ultimate defense, operating system hardening, application security, and automating security
- As a security consultant, the author has an impressive record-of his clients, not one who followed his recommendations has suffered a virus, worm, Trojan, or successful hacker attack in the past five years
- The companion Web site includes author-created custom security templates and group policies that will automate advice given in the book
Related collections and offers
About the Author
Table of ContentsAcknowledgments.
Part I: The Basics in Depth.
Chapter 1: Windows Attacks.
Chapter 2: Conventional and Unconventional Defenses.
Chapter 3: NTFS Permissions 101.
Part II: OS Hardening.
Chapter 4: Preventing Password Crackers.
Chapter 5: Protecting High-Risk Files.
Chapter 6: Protecting High-Risk Registry Entries.
Chapter 7: Tightening Services.
Chapter 8: Using IPSec.
Part III: Application Security.
Chapter 9: Stopping Unauthorized Execution.
Chapter 10: Securing Internet Explorer.
Chapter 11: Protecting E-mail.
Chapter 12: IIS Security.
Chapter 13: Using Encrypting File System.
Part IV: Automating Security.
Chapter 14: Group Policy Explained.
Chapter 15: Designing a Secure Active Directory Infrastructure.