Microsoft Windows Server 2003 (70-298)

Network Security Design

Intro and Overview
Analyze Existing Policies
Organizational Requirements
Principles of Security Design
Analyze Risks to Current Administration
Design a Recovery Process

Creating the Security Framework

Security Guideposts
Design Segmented Networks
Identify Technology Limitations
Analyze Interoperability Constraints
Threat Modeling

Logical Security Design

Designing Public Key Infrastructure
Public Key Cryptography
Certificate Services
Microsoft Certification Services
Design a CA Hierarchy
Trusted CA
Design Security for CA Servers
Certificate Enrollment Process
Design Certification Enrollment
Separating CA Admin Roles
Design Trust Models
Domain/Trees/Forests
External and Internal Trusts
Shortcut/Realm/Cross-Forest Trusts
Restricting Trust Relationships
Design Administration of Servers
Software Update Services
Using SUS
Design SUS Infrastructure
Identify Current Patch Level
Microsoft Baseline Security Analyzer
Creating a Baseline Analysis

Physical Security Design

Design Network Infrastructure Security
Firewall Configuration
Active Directory Considerations
Design an IPSec Policy
Enabling IPSec
IPSec Policy Rules
Configuring IPSec Policy
IPSec Policy Example pt. 1
IPSec Policy Example pt. 2
Securing DNS Traffic
Security for Wireless Networks
Wireless Network Threats
Wireless Encryption and Security
Design 802.1x Authentication pt. 1
Design 802.1x Authentication pt. 2

Secure Communication Between Networks

Designing Security for IIS
Controlling Access to Web Sites
Design IIS Authentication
User Authentication Using Certificates
Design VPN Connectivity
Remote Access Protocols
Setting Up a VPN
Router to Router VPN
Select Protocols for VPN Access
Design Secure VPN Connectivity
Demand Dial Routing
Design Secure Demand Dial Routing
Configuring NAT
Configuring a Firewall
Security Templates for Server Systems
Understanding Security Templates
Modify Security Templates
Security Configuration and Analysis
Security Template Best Practices

Design An Access Control Strategy

Design an Access Control Strategy
Create a Delegation Strategy
Delegating Control
Analyze Auditing Requirements
Using NTFS Permissions
NTFS Permission Behavior
Share and NTFS Permissions
The Effective Permission
Access Control for Files and Folders
Backup and Recovery Strategy
EFS Strategy
Permissions for Registry Objects
Design a Group Strategy

Design Client Infrastructure Security

Design a Client Authentication Strategy
Analyze Authentication Requirements
Hardening Client Operating Systems
Strategy for Client Remote Access
Remote Access Policies
Default Remote Access Policies
Create a Remote Access Policy
Remote Access Authentication Protocols
Design Authentication Using IAS
Authenticating with IAS
Configuring the IAS Server

Credits

About this Author