Skip to content

Securing Windows NT/2000 Servers for the Internet A Checklist for System Administrators

Spend $50 to get a free movie!

ISBN-10: 1565927680

ISBN-13: 9781565927681

Edition: 2001

Authors: Stefan Norberg, Russell Deborah

List price: $29.95
Blue ribbon 30 day, 100% satisfaction guarantee!
Out of stock
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

In recent years, Windows NT and Windows 2000 systems have emerged as viable platforms for Internet servers. More and more organizations are now entrusting the full spectrum of business activities--including e-commerce--to Windows. Unfortunately, the typical Windows NT/2000 installation makes a Windows server an easy target for attacks, and configuring Windows for secure Internet use is a complex task. "Securing Windows NT/2000 Servers for the Internet suggests a two-part strategy to accomplish the task: "Hardening" any Windows server that could potentially be exposed to attacks from the Internet, so the exposed system (known as a "bastion host") is as secure as it can be. Providing…    
Customers also bought

Book details

List price: $29.95
Copyright year: 2001
Publisher: O'Reilly Media, Incorporated
Publication date: 12/26/2000
Binding: Paperback
Pages: 216
Size: 7.00" wide x 9.25" long x 0.75" tall
Weight: 1.188
Language: English

Windows NT/2000 Security
Internet Threats
Building a Secure Site on the Internet
The Windows NT/2000 Architectures
Windows NT/2000 in the Perimeter Network
Cryptography Basics
Building a Windows NT Bastion Host
Using the Security Configuration Editor
Basic Configuration
Advanced Configuration
Setting System Policies
TCP/IP Configuration
Configuring Administrative Tools and Utilities
Setting Permissions
Building a Windows 2000 Bastion Host
Differences Between the Systems
IPSec in Windows 2000
Setting Up Secure Remote Administration
Symantec pcAnywhere
Windows 2000 Terminal Services
Open Source (SSH, Cygwin, TCP Wrappers, and VNC)
Backing Up and Restoring Your Bastion Host
Defining Your Backup Policy
Backup Methods
Types of Backups
Backup Software
Auditing and Monitoring Your Perimeter Network
System Auditing in Windows
Time Synchronization Using NTP
Remote Logging and Log Management
Integrity Checking
Network-Based Intrusion Detection Systems
Maintaining Your Perimeter Network
Setting Up Policies and Procedures
Performing Third-Party Audits
Staying Informed
Well-Known Ports Used by Windows NT/2000
Security-Related Knowledge Base Articles
Build Instructions for OpenSSH on Cygwin