The complete, authoritative guide to protecting your Windows 2000 Network "Essential reading for your IT security organization." -Deena Joyce, Director of Information Technology and Network Security, Casino Magic Pick up a newspaper or watch the evening news and you will find a major news story involving a breech of network security. Windows 2000, as the premier network platform, has many important security features but they are difficult to configure and manage. Hack Proofing Windows 2000 Server has totally up-to-date coverage of Service Pack 2 (SP2), Kerberos and Public Key Infrastructure and also addresses newer topics such as Virtual Private Networks (VPNs), remote access and web site security. The book also has complete coverage of Internet Information Server (IIS) release 5.

Key Features

A great addition to the bestselling "Hack Proofing..." series Windows 2000 sales have surpassed those of Windows NT Critical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to grasp Unrivalled web support at

Table of Contents

Chapter 1 The Windows 2000 Server Security Migration Path Introduction Windows 2000 Server Security Why the Change Differences in Windows 2000 Server Security Authentication Limitations What Is the Same in Windows 2000 Server Upgrading and Migrating Considerations How to Begin the Process Getting Started Proper Analysis Summary Solutions Fast Track Frequently Asked Questions Chapter 2 Default Access Control Settings Introduction The Administrators Group The Users Group The Power Users Group Configuring Security during Windows 2000 Setup Default File System and Registry Permissions Default User Rights Exercise 2.1 Checking User Rights through the Microsoft Management Console Default Group Membership Pre-Windows 2000 Security Summary Solutions Fast Track Frequently Asked Questions Chapter 3 Kerberos Server Authentication Introduction Authentication in Windows 2000 Benefits of Kerberos Authentication Standards for Kerberos Authentication Extensions to the Kerberos Protocol Overview of the Kerberos Protocol Basic Concepts Subprotocols Tickets Kerberos and Windows 2000 Key Distribution Center Kerberos Policy Contents of a Microsoft Kerberos Ticket Delegation of Authentication Preauthentication Security Support Providers Credentials Cache DNS Name Resolution UDP and TCP Ports Authorization Data Kerberos Tools Summary Solutions Fast Track Frequently Asked Questions Chapter 4 Secure NetworkingUsing Windows 2000 Distributed Security Services Introduction The Way We Were:


No. of pages:
© 2001
eBook ISBN:
Print ISBN:

About the author