Securing Windows 2000 Server Documentation

From: Michael Howard (mikehowat_private)
Date: Mon Feb 24 2003 - 11:12:20 PST

  • Next message: Raistlin: "Re: Riched20.DLL attribute label buffer overflow vulnerability"

    The Microsoft Solutions for Security team has released 'Securing Windows
    2000 Server'. This is the first of several prescriptive security
    solutions planned for release this year. These new security solutions
    are designed to provide customers with authoritative, proven, and tested
    solutions that address today's security challenges and business
    requirements.
    
    The contents include:
    
    Chapter 1: Introduction to Securing Windows 2000 Server
    This chapter introduces the Securing Windows 2000 Server guide. It
    includes a brief overview of each of the other chapters.
    
    Chapter 2: Defining the Security Landscape
    This chapter focuses on defining security components that need to be
    understood to perform a security analysis of your organization. General
    guidance on how to perform a preliminary asset analysis for your
    organization is offered. The relationship between threats, exposures,
    vulnerabilities, and countermeasures is also explained.
    
    Chapter 3: Understanding the Security Risk Management Discipline
    Proven practices are drawn upon in this chapter, from security analysis
    methodologies in use today that leverage the MSF and MOF. The SRMD also
    is defined in detail in this chapter, which provides learning that can
    be applied to assess and determine the level of risk in your own
    environment.
    
    Chapter 4: Applying the Security Risk Management Discipline
    The SRMD is put into practice throughout this chapter to determine which
    threats and vulnerabilities have the most potential impact on a
    particular organization. This chapter applies this process to a generic
    scenario in which a fictitious company is used to illustrate how a set
    of common implementation decisions, and, therefore, a significant number
    of real-world vulnerabilities, should be determined. At the conclusion
    of this chapter, the specific risks addressed are fully defined,
    described, and analyzed.
    
    Chapter 5: Securing the Domain Infrastructure
    Determining the criteria on which to base decisions that impact the
    organization at a domain level is the focus of this chapter. A high
    level overview of the Microsoft(r) Active Directory(r) service design,
    the organizational unit (OU) design, and domain policy is provided. In
    addition, specific domain policies that are implemented at Contoso, the
    fictional customer scenario used in this guide, are discussed in detail.
    
    Chapter 6: Hardening the Base Windows 2000 Server
    The base settings applied to the member servers at Contoso are explained
    in this chapter. Group Policy was used to apply as many of the changes
    to the default Windows 2000 Server configuration as possible. For the
    member servers in this scenario, the Group Policy settings described are
    stored in the security template, MSS Baseline.inf. This template was
    imported into the Member Server Baseline Policy group policy, which is
    linked to the Member Server OU.
    
    Chapter 7: Hardening Specific Server Roles
    The domain controllers, file servers, network infrastructure servers,
    and Web servers in any organization require different settings to
    maximize their security. This chapter focuses on the domain controllers
    and the other primary member server roles to show the steps that you
    should take to ensure that each of these roles is as secure as possible.
    
    Chapter 8: Patch Management
    This chapter shows how to ensure that an environment is kept up to date
    with all the necessary security patches; how to find out about new
    patches in a timely manner, how to implement them quickly and reliably,
    and how to monitor to ensure that they are deployed consistently.
    
    Chapter 9: Auditing and Intrusion Detection
    This chapter shows how to audit an environment to provide the best
    chances of spotting attacks. It also looks at intrusion detection
    systems - software that is specifically designed to detect behavior that
    indicates an attack is occurring.
    
    Chapter 10: Responding to Incidents
    This chapter covers the best ways to respond to different types of
    attack and includes the steps that you should take to report the
    incidents effectively. It also includes a case study to illustrate a
    typical response to an incident.
    
    Chapter 11: Conclusion
    This chapter closes out the solution guide by providing a brief overview
    of everything that has been discussed.
    
    
    The guides are available at:
    
    http://www.microsoft.com/technet/treeview/default.asp?url=/technet/secur
    ity/prodtech/Windows/SecWin2k/Default.asp
    
    PDF versions of the guides as well as the scripts, security templates,
    and job aids can be downloaded at:
    
    http://www.microsoft.com/downloads/details.aspx?FamilyID=9964cf42-e236-4
    d73-aef4-7b4fdc0a25f6&DisplayLang=en
    
    
    Cheers, Michael
    Secure Windows Initiative
    Writing Secure Code 2nd Edition
    http://www.microsoft.com/mspress/books/5957.asp
    



    This archive was generated by hypermail 2b30 : Mon Feb 24 2003 - 13:49:31 PST