Synopses & Reviews
In recent years, Windows NT and Windows 2000 systems have emerged as viable platforms for Internet servers. More and more organizations are now entrusting the full spectrum of business activities--including e-commerce--to Windows.Unfortunately, the typical Windows NT/2000 installation makes a Windows server an easy target for attacks, and configuring Windows for secure Internet use is a complex task. Securing Windows NT/2000 Servers for the Internet suggests a two-part strategy to accomplish the task:
Securing Windows NT/2000 Servers for the Internet
- "Hardening" any Windows server that could potentially be exposed to attacks from the Internet, so the exposed system (known as a "bastion host") is as secure as it can be.
- Providing extra security protection for exposed systems by installing an additional network (known as a "perimeter network") that separates the Internet from an organization's internal networks.
is a concise guide that pares down installation and configuration instructions into a series of checklists aimed at Windows administrators. Topics include:
- Introduction--Windows NT/2000 security threats, architecture of the Windows NT/2000 operating system and typical perimeter networks.
- How to build a Windows NT bastion host.
- Configuring Windows and network services, encrypting the password database, editing the registry, setting system policy characteristics, performing TCP/IP configuration, configuring administrative tools, and setting necessary permissions.
- Differences between Windows NT and Windows 2000 security including IPSec (IP Security Protocol) configuration.
- Secure remote administration--SSH, OpenSSH, TCP Wrappers, the Virtual Network Console, and the new Windows 2000 Terminal Services.
- Windows NT/2000 backup, recovery, auditing, and monitoring--event logs, the audit policy, time synchronization with NTP (Network Time Protocol), remote logging, integrity checking, and intrusion detection.
Administrators who carefully follow the detailed instructions provided in this book will dramatically increase the security of their Windows NT/2000 Internet servers.
Whilst Windows NT and 2000 systems have emerged as viable platforms for Internet servers, securing Windows for Internet use is a complex task. This guide simplifies the task by paring down installation and configuration instructions into a series of security checklists.
This concise guide pares down installation and configuration instructions into a series of checklists for Windows administrators. Topics include: Windows NT/2000 security threats, architecture of the Windows NT/2000 operating system and typical perimeter networks, how to build a Windows NT bastion host, and configuring Windows and network services.
About the Author
Stefan Norberg is an independent network security consultant based in Stockholm, Sweden. Before becoming an independent contractor, he worked for Hewlett-Packard Consulting, where he built everything from large firewalls to highly available Unix clusters. During the last couple of years, he has spent most of his time designing and implementing Internet firewalls using building blocks like Cisco IOS, HP-UX, Linux, and Windows NT/2000. Every now and then, he enjoys teaching Windows NT/2000 classes. Stefan is an MCSE+Internet and Microsoft Certified Trainer. When he finds spare time, Stefan enjoys spending it with his wife Marianne and daughter Matilda.
Table of Contents
Dedication; Preface; Contents of This Book; Conventions Used in This Book; Free Software Described in This Book; Comments and Questions; Acknowledgments; Chapter 1: Windows NT/2000 Security; 1.1 Internet Threats; 1.2 Building a Secure Site on the Internet; 1.3 The Windows NT/2000 Architectures; 1.4 Windows NT/2000 in the Perimeter Network; 1.5 Cryptography Basics; Chapter 2: Building a Windows NT Bastion Host; 2.1 Installation; 2.2 Using the Security Configuration Editor; 2.3 Basic Configuration; 2.4 Advanced Configuration; 2.5 Setting System Policies; 2.6 TCP/IP Configuration; 2.7 Configuring Administrative Tools and Utilities; 2.8 Setting Permissions; Chapter 3: Building a Windows 2000 Bastion Host; 3.1 Differences Between the Systems; 3.2 IPSec in Windows 2000; Chapter 4: Setting Up Secure Remote Administration; 4.1 Symantec pcAnywhere; 4.2 Windows 2000 Terminal Services; 4.3 Open Source (SSH, Cygwin, TCP Wrappers, and VNC); Chapter 5: Backing Up and Restoring Your Bastion Host; 5.1 Defining Your Backup Policy; 5.2 Backup Methods; 5.3 Types of Backups; 5.4 Backup Software; Chapter 6: Auditing and Monitoring Your Perimeter Network; 6.1 System Auditing in Windows; 6.2 Time Synchronization Using NTP; 6.3 Remote Logging and Log Management; 6.4 Integrity Checking; 6.5 Network-Based Intrusion Detection Systems; Chapter 7: Maintaining Your Perimeter Network; 7.1 Setting Up Policies and Procedures; 7.2 Performing Third-Party Audits; 7.3 Staying Informed; Well-Known Ports Used by Windows NT/2000; Security-Related Knowledge Base Articles; Build Instructions for OpenSSH on Cygwin; Colophon;