
Thor's Microsoft Security Bible
A Collection of Practical Security Techniques
Description
Key Features
- Named the 2011 Best Systems Administration Book by InfoSec Reviews
- Detailed technical information on security processes for all major Microsoft applications
- Unique project-based "storytelling" delivery, combining multiple security techniques and methods together for real-world solutions to security challenges in actual business use cases
- Reference-style content for access to specific application security techniques and methods
- Actual author opinion and guidance as not only HOW to go about security particular applications, but WHY to do so
Readership
Systems and Network Administrators, IT Managers, Security and Network Engineers, Database Administrators
Table of Contents
-
Chapter 1 Securely Writing Web Proxy Log Data to Structured Query Language (SQL) Server and Programmatically Monitoring Web Traffic Data in Order to Automatically Inject Allow/Deny Rules into Threat Management Gateway (TMG)
Introduction
Scope and Considerations
Implementation
Securely Logging Data to SQL
Designing the Workflow
Execution
Summary
Chapter 2 Internet Information Server (IIS) Authentication and Authorization Models, and Locking Down File Access with Encrypting File System (EFS) and Web Distributed Authoring and Versioning (Web DAV)
Introduction
RSA and AES
Building the Web Application Structure
MISSING TITLE
Security in Depth
Securing Access with WebDAV
Conclusion
Summary
Chapter 3 Analyzing and Blocking Malicious Traffic Based on Geolocation
Introduction
Research and Due Diligence
Implementing a Solution
Integrating with TMG
Summary
References
Chapter 4 Creating an Externally Accessible Authenticated Proxy in a Secure Manner
Introduction
Build It, and They Will Come
Summary
Chapter 5 The Creation and Maintenance of Low Privileged Service Users (with a focus on SQL)
Introduction
Creating and Configuring Service User Accounts
Real, Quantifiable Password Strength, and How to Measure It
Summary
References
Chapter 6 Remote Security Log Collection in a Least Privilege Environment
Introduction
Log Fetcher Architecture
Accessing WMI
Show Me The Code!
Summary
Chapter 7 Securing RDP
Introduction
General RDP Attacks and Mitigation
RDP Solutions Overview
Direct Access of Multiple RDP Hosts
RDG/TSG
RDP Host Security
RDWeb and RemoteApp
Workstation Host Considerations
Limiting Access with Source Port Access Rules
Summary
Appendix A List Of Acronyms
Appendix B Full list of Server 2008 logs via WEVTUTIL tool
Product details
- No. of pages: 336
- Language: English
- Copyright: © Syngress 2011
- Published: July 16, 2011
- Imprint: Syngress
- eBook ISBN: 9781597495738
- Hardcover ISBN: 9781597495721
About the Author
Timothy Mullen
After years working for the software giant, Thor now condemns the company for their unethical practices and evangelizes for Apple OS X and open systems and has committed his research to the betterment of users by providing guidance for users to switch from their dependency upon Windows and enjoy the superior, secure, and feature-rich experience that is OS X.
Affiliations and Expertise
Ratings and Reviews
There are currently no reviews for "Thor's Microsoft Security Bible"