Books & Videos

Table of Contents

  1. Chapter 1 Windows NT/2000 Security

    1. Internet Threats

    2. Building a Secure Site on the Internet

    3. The Windows NT/2000 Architectures

    4. Windows NT/2000 in the Perimeter Network

    5. Cryptography Basics

  2. Chapter 2 Building a Windows NT Bastion Host

    1. Installation

    2. Using the Security Configuration Editor

    3. Basic Configuration

    4. Advanced Configuration

    5. Setting System Policies

    6. TCP/IP Configuration

    7. Configuring Administrative Tools and Utilities

    8. Setting Permissions

  3. Chapter 3 Building a Windows 2000 Bastion Host

    1. Differences Between the Systems

    2. IPSec in Windows 2000

  4. Chapter 4 Setting Up Secure Remote Administration

    1. Symantec pcAnywhere

    2. Windows 2000 Terminal Services

    3. Open Source (SSH, Cygwin, TCP Wrappers, and VNC)

  5. Chapter 5 Backing Up and Restoring Your Bastion Host

    1. Defining Your Backup Policy

    2. Backup Methods

    3. Types of Backups

    4. Backup Software

  6. Chapter 6 Auditing and Monitoring Your Perimeter Network

    1. System Auditing in Windows

    2. Time Synchronization Using NTP

    3. Remote Logging and Log Management

    4. Integrity Checking

    5. Network-Based Intrusion Detection Systems

  7. Chapter 7 Maintaining Your Perimeter Network

    1. Setting Up Policies and Procedures

    2. Performing Third-Party Audits

    3. Staying Informed

  1. Appendix Well-Known Ports Used by Windows NT/2000

  2. Appendix Security-Related Knowledge Base Articles

  3. Appendix Build Instructions for OpenSSH on Cygwin

  4. Colophon