Flylib.com
List of Exercises
Previous page
Table of content
Next page
Chapter 1: Basic Windows 2000 Security: Using Security Templates
Exercise 1.01: Creating the Security Console
Exercise 1.02: Configuring Restricted Groups
Exercise 1.03: Configuring System Services Security
Exercise 1.04: Configuring Registry Security
Exercise 1.05: Configuring File System Security
Exercise 1.06: Configuring Security Templates
Exercise 1.07: Importing and Exporting Templates
Exercise 1.08: Importing Security Templates at the Organizational Unit Level
Exercise 1.09: Importing Security Templates at the Domain Level
Exercise 1.10: Implementing Security Templates Using Scripting
Exercise 1.11: Analyzing Local Security with the Security Configuration and Analysis Snap-in
Exercise 1.12: Analyzing Security with Secedit.exe
Chapter 2: Advanced Security Template and Group Policy Issues
Exercise 2.01: Securing Domain Controllers
Exercise 2.02: Locking Down SQL Server with the IIS Lockdown Tool
Exercise 2.03: Hardening the SQL Server with the Microsoft Baseline Security Analyzer
Exercise 2.04: Routine Maintenance with the HFNetChk Tool
Exercise 2.05: Locking Down Exchange Server with the IIS Lockdown Tool
Exercise 2.06: Locking Down IIS Servers with the URLScan Tool
Exercise 2.07: Locking Down IIS Servers with the IIS Lockdown Tool
Exercise 2.08: Removing the Local Computer Recovery Agent Keys
Exercise 2.09: Applying the Setup Security Template
Exercise 2.10: Analyzing Security Issues with the Event Logs
Chapter 3: Identifying, Installing, and Troubleshooting Required Updates
Exercise 3.01: Determining the Need for Updating Using Windows Update
Exercise 3.02: Using HFNetChk to Analyze for Updates
Exercise 3.03: Using MBSA to Analyze for Updates from the GUI
Exercise 3.04: Using MBSA to Analyze for Updates from the Command Line
Exercise 3.05: Slipstreaming the Windows 2000 Professional Source Files with Service Pack 3
Exercise 3.06: Installing and Configuring the Remote Installation Service
Exercise 3.07: Creating a New RIS CD-Based Installation Image
Exercise 3.08: Updating a Single Computer Using Windows Update
Exercise 3.09: Getting Updates Using the Windows Update Catalog
Exercise 3.10: Installing and Configuring Software Update Services
Exercise 3.11: Installing and Configuring the Automatic Updates Client
Chapter 4: Installing, Configuring, & Managing Windows 2000 Certificate Authorities
Exercise 4.01: Installing Certificate Services
Exercise 4.02: Using the Certificate Request Wizard
Exercise 4.03: Using the Certificate Services Web Interface
Exercise 4.04: Exporting a Certificate and a Private Key
Exercise 4.05: Importing a Certificate from a Trusted Root CA
Exercise 4.06: Revoking a Certificate and Publishing a CRL
Exercise 4.07: Configuring CRL Publishing Options
Exercise 4.08: Selecting the Available Certificate Templates for New Certificate Issue
Exercise 4.09: Configuring Automatic Certificate Enrollment
Exercise 4.10: Configuring Trusted Root CAs
Exercise 4.11: Backing Up Certificate Services
Exercise 4.12: Restoring Certificate Services
Exercise 4.13: Selecting the Publication Location for New Certificates
Exercise 4.14: Recovering a Lost KMS Key
Exercise 4.15: Configuring Auto-enrollment
Chapter 5: Managing and Troubleshooting the Encrypting File System
Exercise 5.01: Encrypting Files with EFS Encryption
Exercise 5.02: Encrypting Remote Files with EFS Encryption
Exercise 5.03: Preventing EFS Use on a Server
Exercise 5.04: Adding Multiple Users to an Encrypted File in Windows XP
Exercise 5.05: Decrypting a File
Exercise 5.06: Creating a New EFS Recovery Agent
Exercise 5.07: Adding an EFS Recovery Agent
Chapter 6: Configuring and Troubleshooting Windows IP Security
Exercise 6.01: Building an IPSec MMC Console
Exercise 6.02: Creating a New IPSec Policy
Chapter 7: Implementing Secure Wireless Networks
Exercise 7.01: Enabling WEP and 802.1
x
Security in Windows XP Professional
Exercise 7.02: Enabling WEP in Windows 2000 Professional
Chapter 8: Configuring Secure Network and Internet Authentication Methods
Exercise 8.01: Configuring a Client for Kerberos Delegation
Exercise 8.02: Configuring a Local Host Service for Kerberos Delegation
Exercise 8.03: Configuring a Domain Account Service for Kerberos Delegation
Exercise 8.04: Configuring Kerberos Preauthentication
Exercise 8.05: Configuring Trusts with Active Directory Domains and Trusts
Exercise 8.06: Configuring Trusts with NetDOM
Exercise 8.07: Configuring the Servers to Require NTLMv2
Exercise 8.08: Configuring Windows NT 4.0 Clients to Use NTLMv2
Exercise 8.09: Configuring Windows 9.
x
Clients to Use NTLMv2
Exercise 8.10: Requesting a Server Certificate for the IIS Server
Exercise 8.11: Configuring Anonymous, Basic, Digest, and Integrated Windows Web Site Authentication
Exercise 8.12: Configuring Web Authentication using SSL
Chapter 9: Configuring and Troubleshooting Remote Access and VPN Authentication
Exercise 9.01: Configuring the Routing and Remote Access Service for Dial-In Access
Exercise 9.02: Configuring Routing and Remote Access Service Modem Ports
Exercise 9.03: Configuring the Routing and Remote Access Service for Remote User VPN Access
Exercise 9.04: Configuring the PPTP and L2TP Ports for Inbound Access Only
Exercise 9.05: Checking the Status of a Connected VPN Port
Exercise 9.06: Creating a New Remote Access Policy to Restrict Remote User Access Times
Exercise 9.07: Configuring Windows 2000 for Connecting to a PPTP Server
Exercise 9.08: Creating a Dynamic Phone Book
Exercise 9.09: Creating a Basic Service Profile
Chapter 10: Configuring and Using Auditing and the Event Logs
Exercise 10.01: Auditing with Local Security Policy
Exercise 10.02: Configuring and Viewing the IIS Log Files
Exercise 10.03: Using EventCombMT
Chapter 11: Responding to and Recovering from Security Breaches
Exercise 11.01: Performing a DoS with SMBdie
Previous page
Table of content
Next page
MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network: Study Guide and DVD Training System (Exam 70-214)
ISBN: 1931836841
EAN: 2147483647
Year: 2003
Pages: 162
Authors:
Will Schmied
,
Thomas W. Shinder
BUY ON AMAZON
Developing Tablet PC Applications (Charles River Media Programming)
Introduction to Visual Basic .NET
Basics of the .NET Framework
Introduction to the VB .NET Language
Your First Windows Forms Application
Tablet Fax
Managing Enterprise Systems with the Windows Script Host
Introduction
File Operations
Input/Output Streams
Registry Operations
Security
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 250 Grounding and Bonding
Article 411: Lighting Systems Operating at 30 Volts or Less
Article 427: Fixed Electric Heating Equipment for Pipelines and Vessels
Notes for Tables 12(A) and 12(B)
Annex D. Examples
Web Systems Design and Online Consumer Behavior
Chapter II Information Search on the Internet: A Causal Model
Chapter IV How Consumers Think About Interactive Aspects of Web Advertising
Chapter VII Objective and Perceived Complexity and Their Impacts on Internet Communication
Chapter X Converting Browsers to Buyers: Key Considerations in Designing Business-to-Consumer Web Sites
Chapter XVI Turning Web Surfers into Loyal Customers: Cognitive Lock-In Through Interface Design and Web Site Usability
.NET System Management Services
Querying WMI
Instrumenting .NET Applications with WMI
The WMI Schema
WMI Providers
WMI Security
Understanding Digital Signal Processing (2nd Edition)
FFT INPUT/OUTPUT DATA INDEX BIT REVERSAL
HIGHPASS FIR FILTER DESIGN
BINARY NUMBER PRECISION AND DYNAMIC RANGE
BLOCK FLOATING-POINT BINARY FORMAT
COMPUTING FFT TWIDDLE FACTORS
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies