More About the Author "endeavor27@163.com"

Author Nick: endeavor27@163.com
Site:


Articles by endeavor27@163.com :

Sort by:

Guidelines for Designing Monitoring and Maintenance Strategies for IIS

Designing monitoring and maintenance strategies for MCSA Certification combines the monitoring and maintenance strategies described for all networked systems—such as firewalls and intrusion detection—and adds Windows specific operating system security and HS-spe-cific strategies such as backing up the metabase and managing US-specific logs. It is also necessary to include a design for secure administrative practices. […]

Designing IIS Security Baselines

Securing IIS involves a combination of developing security for Microsoft 70-620 and using US specific knowledge and controls. Windows Server 2003 hardening baselines were introduced in Chapter 8. This lesson focuses on designing security for IIS. This lesson goes beyond the simple IIS incremental template mentioned previously and provides specific baselines for IIS services. Do […]

Designing Security for IIS

Web sites serve as easily identifiable targets for targeted MCSE 2003 exams and nontargeted attacks. Public Web servers, by their very definition, must be accessible to everyone, and thus attacks can easily be directed to them. Web servers also run standardized applications and must be able to respond to standard protocols. Because these applications are […]

Guidelines for Reducing the Web Server Attack Surface

To reduce the Web server attack surface, you must secure MCSE 2003 exams and then enable only needed IIS components and services. The following sections provide guidelines for how to do these things. Guidelines for Securing Windows Server 2003 The first step in reducing the attack surface for the Web server is to reduce the […]

Guidelines for Increasing Wireless Security through Network Topology

Where wireless access points are placed on the LAN is important. You do have CompTIA A+ Practical Application choices. Should you firewall the AP? Follow these guidelines to increase wireless security: Carefully select and correctly position the antenna to limit the exposure of wireless networks. When you do this, better coverage and access is provided […]