Designing Microsoft Windows 2000 Network Security
Résumé
Contents
About This Book | xxix |
Intended Audience | xxx |
Prerequisites | xxx |
Reference Materials | xxxi |
About the Supplemental Course Materials CD-ROM | xxxi |
Features of This Book | xxxii |
Notes | xxxii |
Conventions | xxxii |
Chapter and Appendix Overview | xxxiii |
Finding the Best Starting Point for You | xxxvi |
Where to Find Specific Skills in This Book | xxxvi |
Getting Started | xl |
Hardware Requirements | xl |
Software Requirements | xl |
Setup Instructions | xli |
About the Online Book | xlviii |
Sample Readiness Review Questions | xlviii |
The Microsoft Certified Professional Program | xlix |
Microsoft Certification Benefits | xlix |
Requirements for Becoming a Microsoft Certified Professional | li |
Technical Training for Computer Professionals | lii |
Technical Support | liv |
CHAPTER 1Introduction to Microsoft Windows 2000 Security | 1 |
About This Chapter | 1 |
Before You Begin | 1 |
Chapter Scenario: Lucerne Publishing | 2 |
Current Network | 2 |
Account Management | 2 |
Expansion Plans | 3 |
Online Ordering | 3 |
Security Issues | 3 |
Lesson 1: Microsoft Windows 2000 Security Services Overview | 4 |
Security Subsystem Components | 5 |
LSA Functionality | 7 |
Windows 2000 Security Protocols | 8 |
The Security Support Provider Interface (SSPI) | 9 |
Lesson Summary | 9 |
Lesson 2: Designing Security Business Requirements | 10 |
Determining Business Requirements | 10 |
Making the Decision | 12 |
Applying the Decision | 13 |
Lesson Summary | 14 |
Lesson 3: Designing Security to Meet Technical Requirements | 15 |
Determining Technical Requirements | 15 |
Making the Decision | 16 |
Applying the Decision | 17 |
Lesson Summary | 19 |
Review | 20 |
CHAPTER 2Designing Active Directory for Security | 21 |
About This Chapter | 21 |
Before You Begin | 22 |
Chapter Scenario: Wide World Importers | 23 |
The Existing Network | 23 |
User Account Management | 23 |
Application Support | 23 |
Client Desktops | 24 |
Lesson 1: Designing Your Forest Structure | 25 |
Active Directory Design Basics | 25 |
Deploying a Single Forest | 26 |
Making the Decision | 27 |
Applying the Decision | 28 |
Deploying Multiple Forests | 28 |
Making the Decision | 30 |
Applying the Decision | 31 |
Lesson Summary | 32 |
Lesson 2: Designing Your Domain Structure | 33 |
Deploying a Single Domain | 33 |
Making the Decision | 33 |
Applying the Decision | 34 |
Deploying Multiple Domains | 34 |
Understanding Account Policies | 34 |
Making the Decision | 37 |
Applying the Decision | 38 |
Lesson Summary | 39 |
Lesson 3: Designing an OU Structure | 40 |
Planning for Delegation of Administration | 40 |
Delegating Control to an Organizational Unit | 40 |
Making the Decision | 42 |
Applying the Decision | 44 |
Planning for Group Policy Deployment | 45 |
Making the Decision | 49 |
Applying the Decision | 49 |
Lesson Summary | 51 |
Lesson 4: Designing an Audit Strategy | 52 |
Configuring Audit Settings | 52 |
Making the Decision | 53 |
Applying the Decision | 54 |
Lesson Summary | 55 |
Activity: Designing an Audit Strategy | 56 |
Lab 2-1: Designing Active Directory for Security | 57 |
Lab Objectives | 57 |
About This Lab | 57 |
Before You Begin | 57 |
Scenario: Contoso Ltd. | 57 |
Exercise 1: Determining the Number of Forests | 59 |
Exercise 2: Determining the Number of Domains | 60 |
Exercise 3: Designing an OU Structure | 60 |
Review | 62 |
CHAPTER 3Designing Authentication for a Microsoft Windows 2000 Network | 63 |
About This Chapter | 63 |
Before You Begin | 64 |
Chapter Scenario: Market Florist | 65 |
The Existing Network | 65 |
Market Florist Active Directory Design | 66 |
Market Florist Server Configuration | 66 |
Lesson 1: Designing Authentication in a Microsoft Windows 2000 Network | 68 |
Determining Business and Technical Requirements | 68 |
Lesson Summary | 69 |
Lesson 2: Designing Kerberos Authentication | 70 |
Designing Kerberos Authentication | 71 |
Understanding the Kerberos Message Exchanges | 72 |
Analyzing Kerberos Authentication | 73 |
Initial Authentication with the Network | 73 |
Network Authentication | 76 |
Smart Card Authentication | 77 |
Multiple Domain Authentication | 79 |
Delegation | 80 |
Making the Decision | 82 |
Applying the Decision | 83 |
Lesson Summary | 84 |
Lesson 3: NTLM Authentication | 85 |
Designing NTML Authentication | 85 |
Making the Decision | 86 |
Applying the Decision | 87 |
Lesson Summary | 87 |
Lesson 4: Authenticating Down-Level Clients | 88 |
Analyzing Standard Authentication | 88 |
Analyzing the Directory Services Client | 89 |
Making the Decision | 92 |
Applying the Decision | 92 |
Lesson Summary | 93 |
Lesson 5: Planning Server Placement for Authentication | 94 |
Determining Server Placement for Authentication | 94 |
Planning DNS Server Placement | 94 |
Making the Decision | 95 |
Applying the Decision | 95 |
Planning DC Placement | 97 |
Making the Decision | 97 |
Applying the Decision | 97 |
Planning Global Catalog Server Placement | 97 |
Making the Decision | 98 |
Applying the Decision | 99 |
Planning PDC Emulator Placement | 99 |
Making the Decision | 99 |
Applying the Decision | 100 |
Lesson Summary | 100 |
Activity: Analyzing Authentication Network Infrastructure | 101 |
Lab 3-1: Designing Authentication for the Network | 102 |
Lab Objectives | 102 |
About This Lab | 102 |
Before You Begin | 102 |
Scenario: Contoso Ltd. | 102 |
Exercise 1: Designing Windows 2000 Client Authentication | 104 |
Exercise 2: Designing Down-Level Client Authentication | 105 |
Review | 106 |
CHAPTER 4Planning a Microsoft Windows 2000 Administrative Structure | 107 |
About This Chapter | 107 |
Before You Begin | 107 |
Chapter Scenario: Hanson Brothers | 108 |
The Existing Network | 108 |
Hanson Brothers' Active Directory Design | 109 |
Hanson Brothers' Administrative Needs | 109 |
The Central Administration Team | 110 |
Hanson Brothers' Current Issues | 110 |
Lesson 1: Planning Administrative Group Membership | 111 |
Designing Default Administrative Group Membership | 111 |
The Default Windows 2000 Administrative Groups | 111 |
Assessing Administrative Group Membership Design | 114 |
Making the Decision | 116 |
Applying the Decision | 117 |
Designing Custom Administrative Groups | 118 |
Determining When to Create Custom Groups | 119 |
Making the Decision | 120 |
Applying the Decision | 121 |
Lesson Summary | 122 |
Lesson 2: Securing Administrative Access to the Network | 123 |
Designing Secure Administrative Access | 123 |
Making the Decision | 124 |
Applying the Decision | 125 |
Designing Secondary Access | 126 |
Understanding the RunAs Service | 127 |
Making the Decision | 129 |
Applying the Decision | 129 |
Designing Telnet Administration | 129 |
Making the Decision | 130 |
Applying the Decision | 130 |
Designing Terminal Services Administration | 131 |
Assessing Terminal Services Administration | 131 |
Making the Decision | 132 |
Applying the Decision | 132 |
Lesson Summary | 133 |
Activity: Administering the Network | 134 |
Lab 4-1: Designing Administration for a Microsoft Windows 2000 Network | 136 |
Lab Objectives | 136 |
About This Lab | 136 |
Before You Begin | 136 |
Scenario: Contoso Ltd. | 136 |
Exercise 1: Designing Preexisting Administration Groups | 138 |
Exercise 2: Designing Administrative Access | 140 |
Review | 142 |
CHAPTER 5Designing Group Security | 143 |
About This Chapter | 143 |
Before You Begin | 143 |
Chapter Scenario: Hanson Brothers | 144 |
The Microsoft Exchange 2000 Server Deployment | 144 |
Deployment of Microsoft Outlook 2000 | 144 |
User Rights Requirements | 145 |
Lesson 1: Designing Microsoft Windows 2000 Security Groups | 146 |
Windows 2000 Groups | 146 |
Assessing Group Usage | 149 |
Making the Decision | 152 |
Applying the Decision | 152 |
Lesson Summary | 154 |
Activity: Reviewing Group Memberships | 155 |
Lesson 2: Designing User Rights | 158 |
Defining User Rights with Group Policy | 158 |
User Rights Within Windows 2000 | 158 |
Assessing Where to Apply User Rights | 162 |
Making the Decision | 163 |
Applying the Decision | 164 |
Lesson Summary | 165 |
Lab 5-1: Designing Security Groups and User Rights | 166 |
Lab Objectives | 166 |
About This Lab | 166 |
Before You Begin | 166 |
Scenario: Contoso Ltd. | 166 |
The Human Resources Application | 166 |
Exercise 1: Designing Security Groups | 168 |
Exercise 2: Designing User Rights | 170 |
Review | 171 |
CHAPTER 6Securing File Resources | 173 |
About This Chapter | 173 |
Before You Begin | 173 |
Chapter Scenario: Wide World Importers | 174 |
Planning Security for Software Deployment | 174 |
Print Security | 176 |
Planning for Protection of Confidential Data | 176 |
Lesson 1: Securing Access to File Resources | 177 |
Designing Share Security | 177 |
Configuring Share Permissions | 177 |
Making the Decision | 179 |
Applying the Decision | 180 |
Planning NTFS Security | 180 |
Changes in the Windows 2000 NTFS File System | 181 |
Assessing NTFS Permissions | 181 |
Making the Decision | 183 |
Applying the Decision | 184 |
Combining Share and NTFS Security | 185 |
Making the Decision | 187 |
Applying the Decision | 188 |
Lesson Summary | 188 |
Activity: Evaluating Permissions | 189 |
Lesson 2: Securing Access to Print Resources | 191 |
Assessing Printer Security | 191 |
Making the Decision | 192 |
Applying the Decision | 193 |
Lesson Summary | 193 |
Lesson 3: Planning EFS Security | 194 |
Overview of the EFS Process | 194 |
Designating an EFS Recovery Agent | 197 |
The Initial EFS Recovery Agent | 197 |
Configuring a Custom EFS Recovery Agent | 198 |
Configuring an Empty Encrypted Data Recovery Agent Policy | 199 |
Making the Decision | 199 |
Applying the Decision | 200 |
Recovering Encrypted Files | 200 |
Assessing Recovery of Encrypted Files | 200 |
Making the Decision | 202 |
Applying the Decision | 202 |
Lesson Summary | 202 |
Lab 6-1: Securing File and Print Resources | 203 |
Lab Objectives | 203 |
About This Lab | 203 |
Before You Begin | 203 |
Scenario: Contoso Ltd. | 203 |
Exercise 1: Planning File Security | 206 |
Exercise 2: Planning Print Security | 207 |
Exercise 3: Planning EFS for Laptops | 208 |
Review | 210 |
CHAPTER 7Designing Group Policy | 211 |
About This Chapter | 211 |
Before You Begin | 211 |
Chapter Scenario: Wide World Importers | 212 |
Proposed OU Structure | 212 |
Existing Site Definitions | 213 |
Application Installation Requirements | 213 |
Engineering Requirements | 213 |
The New Employee | 214 |
Lesson 1: Planning Deployment of Group Policy | 215 |
Group Policy Overview | 215 |
Planning Group Policy Inheritance | 215 |
Assessing Group Policy Application | 217 |
Block Policy Inheritance | 218 |
Configuring No Override | 219 |
Making the Decision | 219 |
Applying the Decision | 220 |
Filtering Group Policy by Using Security Groups | 221 |
Making the Decision | 223 |
Applying the Decision | 224 |
Lesson Summary | 224 |
Lesson 2: Troubleshooting Group Policy | 225 |
Assessing Group Policy Troubleshooting | 225 |
Making the Decision | 227 |
Applying the Decision | 228 |
Lesson Summary | 228 |
Activity: Troubleshooting Group Policy Application | 229 |
Lab 7-1: Planning Group Policy Deployment | 230 |
Lab Objectives | 230 |
About This Lab | 230 |
Before You Begin | 230 |
Scenario: Contoso Ltd. | 230 |
Exercise 1: Applying Group Policy | 233 |
Exercise 2: Designing Group Policy Filtering | 233 |
Exercise 3: Troubleshooting Group Policy Application | 234 |
Review | 237 |
L'auteur - Microsoft Corporation
The Microsoft Windows Server 2003 team designs, builds, tests, documents and supports Microsoft Windows server products and solutions.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Microsoft Press |
Auteur(s) | Microsoft Corporation |
Parution | 01/04/2001 |
Nb. de pages | 793 |
Format | 19 x 23,5 |
Couverture | Relié |
Poids | 1475g |
Intérieur | Noir et Blanc |
EAN13 | 9780735611344 |
ISBN13 | 978-0-7356-1134-4 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse