Windows Server 2012 Security from End to Edge and Beyond

1st Edition

Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

Authors:

  • Thomas W Shinder
  • Yuri Diogenes
  • Debra Littlejohn Shinder
  • Description

    Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book is a single source for learning how to secure Windows 8 in many systems, including core, endpoint, and anywhere access.

    Authors Tom Shinder and Yuri Diogenes, both Microsoft employees, bring you insider knowledge of the Windows 8 platform, discussing how to deploy Windows security technologies effectively in both the traditional datacenter and in new cloud-based solutions. With this book, you will understand the conceptual underpinnings of Windows 8 security and how to deploy these features in a test lab and in pilot and production environments.

    The book's revolutionary "Test Lab Guide" approach lets you test every subject in a predefined test lab environment. This, combined with conceptual and deployment guidance, enables you to understand the technologies and move from lab to production faster than ever before. Critical material is also presented in key concepts and scenario-based approaches to evaluation, planning, deployment, and management. Videos illustrating the functionality in the Test Lab can be downloaded from the authors’ blog http://blogs.technet.com.b.security_talk/. Each chapter wraps up with a bullet list summary of key concepts discussed in the chapter.

    Key Features

    • Provides practical examples of how to design and deploy a world-class security infrastructure to protect both Windows 8 and non-Microsoft assets on your system
    • Written by two Microsoft employees who provide an inside look at the security features of Windows 8
    • Test Lab Guides enable you to test everything before deploying live to your system

    Readership

    Information Security professionals, Windows systems architects and administrators, technical decision makers, network administrators and other IT professionals who use are responsible for architecting, designing, planning, and deploying security solutions for systems using Microsoft Windows.

    Table of Contents

    Acknowledgments

    About the Authors

    About the Technical Editor

    Foreword

    Chapter 1. Planning Platform Security

    Chapter Points

    Reviewing the Core Security Principles

    Planning a Secure Platform from End to Edge and Beyond

    From End to Edge and Beyond Chapter Previews

    Summary

    Chapter 2. Planning Server Role in Windows Server 2012

    Chapter Points

    Server Role and Security Considerations

    Using Server Manager to Add a New Role or Feature

    Using Security Compliance Manager to Hardening Servers

    Administrator’s Punch List

    Summary

    Chapter 3. Deploying Directory Services and Certificate Services

    Chapter Points

    Evolving Threats Against Certificates

    Implementing Directory Services on Windows Server 2012

    Implementing Certificate Services on Windows Server 2012

    Installing AD CS Role

    Site-Aware Certificate Enrollment

    Renew with the Same Key

    Validate Your Knowledge in AD CS

    Administrator’s Punch List

    Summary

    Chapter 4. Deploying AD FS and AD RMS in Windows Server 2012

    Chapter Points

    Planning for Active Directory Federation Services

    Deploying Active Directory Federation Services

    Troubleshooting Active Directory Federation Services

    Active Directory Rights Management Services

    Summary

    Chapter 5. Patch Management with Windows Server 2012

    Chapter Points

    Why Should You Have a Patch Management Strategy in Place?

    Planning WSUS Deployment on Windows Server 2012

    Deploying WSUS

    Managing Updates with WSUS

    Using Group Policy to Configure WSUS

    Administrator’s Punch List

    Summary

    Chapter 6. Virtualization Security

    Chapter Points

    Considerations Regarding Virtualization Security in Microsoft Platform

    Understanding an

    Details

    No. of pages:
    542
    Language:
    English
    Copyright:
    © 2013
    Published:
    Imprint:
    Syngress
    Print ISBN:
    9781597499804
    Electronic ISBN:
    9781597499811

    Reviews

    "This comprehensive book is designed to cover security for the client device that connects to server based applications, services and the servers themselves.  It also covers security for the edge of the network such as a firewall or a remote access server and finally, security for the cloud."--Microsoft Security Blog, November 8, 2012
    "In this reference on Windows Server 2012 Security the authors Shindler, Shindler, and Diogenes, all with strong backgrounds in Windows network security in academia and private industry, attempt to cover the full range of security issues that affect the Windows network environment. The organizing principles throughout are availability, integrity, and confidentiality."--Reference & Research Book News, October 2013
    "This book shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise…The book is a single source for learning how to secure Windows 8 in many systems, including core, endpoint, and anywhere access."--ComputerWeekly.com, September 2, 2013