Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Windows Server Security Essentials
Windows Server Security Essentials

Windows Server Security Essentials: Develop and implement a secure Microsoft infrastructure platform using native and built-in tools

Arrow left icon
Profile Icon Santhosh Sivarajan
Arrow right icon
$19.99 per month
Full star icon Full star icon Full star icon Full star icon Half star icon 4.8 (6 Ratings)
Paperback Feb 2015 240 pages 1st Edition
eBook
$9.99 $28.99
Paperback
$48.99
Subscription
Free Trial
Renews at $19.99p/m
Arrow left icon
Profile Icon Santhosh Sivarajan
Arrow right icon
$19.99 per month
Full star icon Full star icon Full star icon Full star icon Half star icon 4.8 (6 Ratings)
Paperback Feb 2015 240 pages 1st Edition
eBook
$9.99 $28.99
Paperback
$48.99
Subscription
Free Trial
Renews at $19.99p/m
eBook
$9.99 $28.99
Paperback
$48.99
Subscription
Free Trial
Renews at $19.99p/m

What do you get with a Packt Subscription?

Free for first 7 days. $19.99 p/m after that. Cancel any time!
Product feature icon Unlimited ad-free access to the largest independent learning library in tech. Access this title and thousands more!
Product feature icon 50+ new titles added per month, including many first-to-market concepts and exclusive early access to books as they are being written.
Product feature icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Product feature icon Thousands of reference materials covering every tech concept you need to stay up to date.
Subscribe now
View plans & pricing
Table of content icon View table of contents Preview book icon Preview Book

Windows Server Security Essentials

Chapter 1. Operating System and Baseline Security

Server or network security doesn't start from a configuration or implementation level. In order to achieve the maximum result, it has to start from a policy or framework level. Also, your security and hardening policy must apply to all your end-to-end devices and services for it to effectively secure your IT infrastructure. The network or server components can be a part of this policy. Since the emphasis of this book is more towards the server security aspect, I will focus more on server security configuration instead of a broad security. Physical security is more important than any other security. For the purpose of this book, my assumption is that a policy, framework, and physical security are already in place. So our security conversation starts from a server level.

In this chapter, my plan is to walk you through a security tool, Security Configuration Wizard (SCW), and it's configuration details, and explain how you can use this tools in your environment to make the existing or new server infrastructure more secure. This tool will provide you with a common platform to create a policy template and apply these polices in an automated fashion, regardless of how they are defined and where they are coming from.

Microsoft Windows Server

The Microsoft Windows Server operating system has gone through several changes over the last decade. One of the major changes that you will notice in the latest versions of Windows is that of the improvement and integration of security. It is clear that server security is essential in one form or another in the enterprise world. Since the latest version of Windows is Windows Sever 2012 R2, I will be using this operating system as my base operating system in this book.

All solutions listed in the book are validated on a Windows 2012 environment. However, most of the methods and configuration details included in this book can also be used in the previous versions of Windows.

According to Microsoft, the Windows Server 2012 operating system is "secure by default". In some aspects, this is true. However, you need to tweak or customize it based on your business and technical requirements to achieve the maximum benefit.

If you are thinking about using the Windows Server 2012 operation system for applications, data, network services, and so on, the actual server hardening or security process starts from the selection of the type of operating system. In Windows Server 2012, you can use the Server Core installation to minimize the security threat. The details and benefits of Server Core can be found at http://msdn.microsoft.com/en-us/library/hh846323(v=vs.85).aspx. Since Server Core installation contains only a few services, processes, and so on, it can minimize the number of malicious attacks (attack surface) on the server. These server attacks can lead to a major enterprise-wide attack. So, if your service runs on the Server Core operating system, it is recommend to select Server Core for this application.

Note

Keep in mind that Server Core can support only a few services. The details of these supported services can be found at http://msdn.microsoft.com/en-us/library/hh846323(v=vs.85).aspx.

The next step in this process is to select the correct (or minimum) server roles for your server. The details of selecting and configuring server roles based on your requirements are included in Chapter 3, Server Roles and Protocols.

From an operating system perspective, in order to achieve maximum security using native and built-in solutions, the security aspect can be summarized using the following diagram:

Microsoft Windows Server

Note

Windows Server 2012 operating system installation, configuration, and conversion details can be found in Instant Migration from Windows Server 2008 and 2008 R2 to 2012 How-to, Packt Publishing.

Baseline and security

According to its definition, baseline is something you can measure all the time and compare it to identify the difference between the current state and the starting point. In general, the business and technical requirements reflect the core of a baseline policy. It can also be a combination of your business requirements and industry-best practices. As a security administrator, your job is to translate these polices into a technical policy that you can apply in your IT environment.

Different companies and industries follow different standards and policies to secure their IT infrastructure. The following are some of the popular standards that are widely used in the industry:

The details of these agencies and their recommendations can be reviewed on their websites.

Out of the box, Windows Server 2012 and higher provides a few security tools that can be used as a starting point for your Windows Server security configuration. We will start this journey with a built-in security tool called Microsoft Security Configuration Wizard (SCW). This is a very powerful role-based tool that is included with Windows Server 2012 or higher. You can easily translate your business security policies into a technical policy using this tool. As a first step, you need to define your business security requirements or policies. Once you have that documented, you can use Microsoft SCW to create a policy template for different types of servers. In general, these business security requirements can be achieved by disabling unwanted services, blocking unused ports, modifying registry settings, and restricting network and server access. In other words, Microsoft SCW will help you to identify minimum functionality requirements for a server-based on an installed role or service on that particular server. Then this policy can be applied to a server or set of servers using Microsoft SCW, or any other mechanisms like Group Policy Objects (GPOs).

The following is a five-step process to get you to implement the policy in an efficient manner:

  1. Define your business security policy.
  2. Translate it into a technical policy.
  3. Create a policy template using a tool.
  4. Policy review and validation.
  5. Policy implementation.

Security Configuration Wizard

The Microsoft Security Configuration Wizard tool has four major sections: Role-Based Service Configuration, Network Security, Registry Settings, and Auditing Policy. Each of these sections has sub-categories to address specific service requests, based on the top level category. The following table provides a high-level explanation of the available options inside Microsoft SCW:

Role-Based Service Configuration

Server role

This section provides an option to select or deselect appropriate roles based on your requirements. SCW will automatically detect installed roles on the server. All the dependent roles will also be selected automatically.

Client features

In this section, you can select client features that are specific for the role you have chosen in the previous step.

Administration option

Provides an option to select different administration tools and options.

Additional services

By default, SCW will select all required service-based roles, features, and administrative options. This section will give you an option to review these configurations and to make changes if needed.

Handling unwanted services

In this section, you will have an option to select unidentified services. SCW will not display services if they are not present in the local system.

Network Security

Network security rules

In this section, you can select firewall rules, traffic types, ports, and so on.

Registry Settings

SMB security setting

Provides an option to enable or disable SMB security signing.

LDAP Signing requirement

If the Domain Controller role is selected, you will see an option to configure LDAP signing.

Outbound Authentication methods

This section provides an option to configure remote computer authentication methods. You will have an option to select either domain account or local account.

Auditing Policy

System Audit Policy

This section provides an option to enable or disable auditing on a selected server.

Since creating a business security policy is beyond the scope of this book, my assumption would be that you have a business security policy already defined and in place. So we will be starting with the Translating your policy into a technical policy section.

Translating your policy into a technical policy

In this stage, as a security administrator, your job is to convert the existing business security policy into a technical policy. Since we are planning to use Microsoft SCW for this exercise, we can map our policy directly into an SCW policy.

I always use a worksheet to map these policies so as to make sure they align with existing options in the tool. The following is a sample worksheet. It helps an administrator identify the policies that are available in SCW and map them accordingly. On the left side of the worksheet, we have Business Security Policy. They directly come from the business or service owners. On the center of the worksheet, we have Technical Policy; in this case, I have included all available SCW roles and services in this section. The right column, Comments, is for mentioning any additional steps or comments required to complete the task.

As an example, you can see a sample internal portal server policy in the following worksheet where I have mapped a Business Security Policy to a Technical Policy:

Business Security Policy

 

Technical Policy

Comments

 

Role-Based Service Configuration (SCW)

It must be a dedicated server for the proposed application. All other non-dependent services must be disabled.

 

Server role

Review #4 and #5 as well.

Required client features must be running on the server to support the application.

 

Client features

 

Administrators must be able to remotely administer the server, IIS task scheduler, WMI, and log files.

 

Administration option

 

Custom monitoring service (InfraMon) must be enabled and running on all servers.

 

Additional services

 

All unwanted and non-dependent services must be disabled.

 

Handling unwanted services

 
 

Network Security (SCW)

Only HTTP port 80 and 443 allowed to this server. All other non-dependent ports and services must be disabled.

 

Network security rules

 
 

Registry Settings (SCW)

Client computers must be running Windows 7 or higher to access this application.

 

SMB security setting

 
  

LDAP Signing requirement

 

Only domain users can access this application.

 

Outbound Authentication methods

 
 

Auditing Policy (SCW)

Successful and failed login attempts must be audited and saved.

 

System Audit Policy

 
 

Testing (SCW)

Solution must be tested and evaluated in the lab before implementing in production.

  

Test the security policy in the lab using SCW.

 

Implementation (GPO)

Solution must be deployed using an automated mechanism. It must be transparent to the application developers and owners.

  

Export security policy and GPO and implement it in the correct OU.

 

Rollback Plan (GPO)

Must be able to roll back to previous state if/as needed.

  

Use GPO.

In the preceding exercise, we had a perfect one-to-one matching between Security Business Policy and SCW options, but in the real world, it may be different. So you may need to modify the policy worksheet based on your requirements. If the options are not available in SCW, you may need to configure it manually using GPO or other mechanisms.

Creating a policy template

In order to generate a policy template, you must be a local administrator on the server. SCW can be run from a local server or from a remote server. If you are running SCW from a remote server, you need to make sure that the required ports and firewall rules are enabled on this remote server. By default, SCW tries to establish an admin$ share connection to the remote server. Perform the following steps:

  1. Open Server Manager. You can open Server Manager from the status bar, or by typing Server Manager in the Windows Start screen.
  2. From the Tools menu, select the Security Configuration Wizard option.
    Creating a policy template

    Selecting the Security Configuration Wizard option

  3. Click on Next on the Welcome to the Security Configuration Wizard page.
  4. Select the Create a new security policy option on the Configuration Action page. Click on Next.
    Creating a policy template
  5. On the Select Server page, enter the server name in the Server textbox, or click on the Browse button to search for a server from the Active Directory. This server will be used to create a baseline policy based on the roles and features installed on this server.
  6. If you specify a remote server, and the current logged-in user does not have local administrative permissions on the remote server, you can specify an alternate account using the Specify User Account… option. Click on Next.
  7. SCW analyzes the remote server and updates the configuration database based on the installed role and features on the selected server. You can see the details by selecting the View Configuration Database option from the Processing Security Configuration Database page:
    • The View Configuration Database option opens the SCW Viewer window to display the configuration database.
    • If you see Windows Security Warning for the ActiveX control, select Yes to continue the operation.
    • The Security Configuration Database option has five different sections—Server Roles, Client Features, Administration and Other Options, Services, and Windows Firewall. You will be evaluating and modifying these settings based on your business security policy requirement.
    • You can safely close the SCW Viewer window without interrupting any other tasks.
    • Click on Next to continue.
      Creating a policy template
  8. Click on Next on the Role-Based Service Configuration page.
  9. In the Select Server Roles window:
    • From the View drop-down box, you can select All roles, Installed Roles, Uninstalled Roles, or Select Roles. Since we are creating a baseline policy based on an install role, we will select Installed Roles.

      Note

      If the required roles are not installed on the server, you can add these roles from Server Manager by selecting the Add roles and features option. All required roles must be installed prior to creating a baseline policy.

    • You will notice that some of the roles are selected by default. These are some of the required or dependent components for successful creation, implementation, and rollback of these policies.
    • Select the appropriate roles here. As an example, I am selecting the Web Server role here.
    • Click on Next to continue.
      Creating a policy template
  10. On the Select Client Features page, select the appropriate client features based on your security requirements. Click on Next.
  11. On the Select Administrative and Other Options page, select the appropriate options based on your security policy requirement. Click on Next.
  12. As an example, in this exercise, I will be selecting the following administrative options:
    • Remote Windows Administration.
    • Also, you will see a few new options based on the selected roles and features on the previous page.
    • Select Web Server options from the View drop-down menu.
      Creating a policy template
    • Here, I am using my worksheet as an example. Based on the requirement, we need to have remote administration enabled. So, I will be selecting the Remote Administration for Web Server (IIS) option.
      Creating a policy template
    • Click on Next.
  13. On the Select Additional Services page, select the additional services based on your requirement. According to my security policy requirement, "A custom monitoring service (InfraMon) must be enabled and running on all servers." As shown in the following screenshot, you will have an option to select or deselect additional services from this window. Click on Next.
    Creating a policy template
  14. On the Handling Unspecified Service page, select the appropriate option based on your security policy requirement. Unspecified services are services that are not part of the default configuration database. Since they are unknown to the SCW application, and may be a security threat, you will be presented with the following two options:
    • Do not change the startup mode of the service: This will leave the existing startup mode (Automatic, Manual, and so on) of the services intact.
    • Disable the service: If you are not sure about the listed service, you can use the Disable the service option to disable these types of services at operating system startup.
    • Once you complete the configuration, you can click on Next to proceed to the next step in the process.
  15. You can confirm these settings on the Confirm Service Changes window. Click on Next.
  16. Click on Next to continue with network security configuration, from the Network Security window. If you do not have a network security requirement, you can skip this configuration using the Skip this section option.
  17. In the Network Security Rules window, select the appropriate firewall rules. For example, if you need to modify the HTTP traffic rule, you can:
    • Select the World Wide Web Services (HTTP Traffic-In) rule.
    • Select Edit to edit an existing policy or Add to add a custom policy.
      Creating a policy template
  18. On the Add or Edit rule window, you have the following tabs:
    • Program and Services: Enable or disable services and programs
    • Protocols and Ports: Enable or disable ports and protocols
    • Scope: Restrict IP address traffic based on selected IP address range
      Creating a policy template
    • Click on Next.
  19. Click on Next to continue with registry security configuration, from the Registry Security window.
  20. If you don't have a registry security requirement, you can skip this configuration using the Skip this section option.
  21. On the Require SMB Security Signatures page, select the appropriate options based on your security policy requirement.
    Creating a policy template
  22. Click on Next
  23. On the Outbound Authentication Methods page, select the appropriate options. Click on Next.
    Creating a policy template
  24. On the Outbound Authentication using Domain Account page, select the appropriate options based on your security requirement. The following are the available options:
    • Windows NT 4.0 Service Pack 6a or later operating system
    • Clock that is synchronized with the select server's clock
  25. Click on Next.
    Creating a policy template
  26. On the Registry Setting Summary page, review the selected settings and click on Next to continue.
  27. Select Next to continue with audit policy configuration from the Audit Policy window:
    • If you don't have auditing requirements, you can skip this configuration using the Skip this section option, or you can configure the auditing by selecting the options from the System Audit Policy page. As an example, I will be selecting the Audit successful and unsuccessful activities option.
    • Click on Next.
      Creating a policy template
  28. On the Audit Policy Summary page, review the selected settings and click on Next to continue.
  29. Click on Next on the Save Security Policy page.
  30. On the Security Policy File Name page, enter the Name and Description values for the policy. Click on Next.
    Creating a policy template
  31. Select the Apply Later option on the Apply Security Policy page.
    Creating a policy template
  32. Click on Finish on the Completing the Security Configuration Wizard page.

    Note

    By default, all the polices will be saved in the %Systemroot%\Security\MSSCW\Policies folder.

Policy review and validation

At this point, you have created a baseline security template based on your business security requirement. As always, it is a best practice to evaluate these configurations in an isolated lab environment before it is implemented in the production environment.

Microsoft SCW creates an XML file as an output policy file, which can be reviewed by using any XML reader. Microsoft has provided a command-line supplement SCW tool called SCWCMD to accomplish this. SCWCMD is a powerful tool that can support the following actions:

  • SCWCMD analyze: Analyzes the computer based on your security policy
  • SCWCMD configure: Applies SCW security to a computer
  • SCWCMD register: This updates the SCW database based on your custom roles and features
  • SCWCMD rollback: This will roll back the policies from the previously applied computer
  • SCWCMD transform: This converts an SCW-generated policy to a GPO-based policy
  • SCWCMD view: This views the existing SCW policy

We will be using the SCWCMD tool with view option for our policy review and validation process:

  • From the command prompt, enter the following command:
    SCWCMD view /x:WebServerBaseLineV1.0.xml
    
    Policy review and validation
  • It will open SCW Viewer. Click on Yes to access Windows Security Warning. You should be able to review the policy settings from SCW Viewer.

Once you have verified the settings, you can apply it to one server to evaluate the result. We will be using Security Configuration Wizard (SCW) to achieve this:

  1. Open Security Configuration Wizard (SCW) from Server Manager.
  2. Click on Next in the Welcome window.
  3. In the Configuration Action window, select the Apply an existing security policy option.
  4. In the Existing security policy file window, select the previously created policy file.
  5. Click on Next.
    Policy review and validation
  6. In the Select Server window, select the correct destination server. Click on Next.
  7. You can view the policy detail in the Apply Security Policy window. Click on Next to continue.

At this point, as an administrator, your job is to validate and verify the result. Once you are satisfied with the result, you can move to the production implementation.

Policy implementation

Applying a policy using Microsoft SCW is suitable for a small environment or testing purposes. However, in an enterprise environment, it may not be sufficient. Some type of automated mechanism should be in place. Since Microsoft Group Policy Object (GPO) is a commonly used tool in any environment, we can use GPO to deploy these security configurations into the designated servers. Since Microsoft SCW and Microsoft GPO are not directly connected, the first step in the process is to export output of the SCW XML file into the GPO format, and then import this into Active Directory.

In our scenario, we will be using the SCWCMD Transform command with the syntax scwcmd transform /p:<SCWPolicy.xml> /g:<GPOName>:

  1. Open the command line from your Windows Server 2012 server.
  2. Type scwcmd transform /p:WebServerBaseLineV1.0.XML /g:WebServerBaselineV1.0 and press Enter.
    Policy implementation
  3. This will convert and export the policy into Active Directory.
  4. Open Group Policy Manager Console. You can open it from Server Manager or type Group Policy Manager on the start screen.
  5. Expand your Domain, Domain Name, and then Group Policy Objects nodes. The exported policy will be in the Group Policy Objects node.
  6. The GPO configuration can be verified by evaluating the policies in the Settings tab.
    Policy implementation
  7. Once you are satisfied with the policy, it can be deployed (linked) to an existing Organizational Unit (OU). In this scenario, we will be linking it to an OU called InternalWebServers.

    Note

    Keep in mind that the SCWCMD Trasnform command will only export the polices into Active Directory. You need to manually link these GPO, using Group Policy Administration console.

  8. Locate the correct OU by expanding the top level OU. In this scenario, I will be selecting the InternalWebServers OU.
  9. Right-click on the InternalWebServers OU and select the Link an Existing GPO option.
    Policy implementation
  10. Select the WebServerBaseLiveV1.0 GPO from the Select GPO window. Click on OK.
  11. This will link the existing GPO to this OU and all severs inside this OU will automatically receive the policy.

Note

The GPO will get updated on to these computers during the default GPO interval. However, you can force the update manually by using the GPUpdate/Force command, or by selecting the Group Policy Update option from the GPMC console.

Analyzing the result and troubleshooting

The SCWCMD tool provides an option to troubleshoot the computers so as to ensure that these computers are in compliance with your security policy. We will be using the SCWCMD Analyze option to analyze a computer's existing policy against an implemented policy. We can use this command against any computer regardless of whether you have used SCW or GPO to implement these policies. The result will be saved in an XML file in the working directory, unless you have specified a different path. These files can be viewed using the SCWCMD View option.

Here, I am running the SCWCMD Analyze command against a non-hardening server to demonstrate the result:

  1. From the command prompt, enter the SCWCMD Analyze /m:Server02 /p:WebServerBaseLineV1.0.XML command.
    Analyzing the result and troubleshooting
  2. The output will be saved in the same directory and the default filename will be the server name. In this scenario, it will be called Server02.XML.
  3. The SCWCMD view command can be used to view this file. This command will open the result file in SCW Viewer.
  4. From the command prompt, enter SCWCMD View /x:Server02.XML.
  5. If you receive an Active X Windows Security Warning, click on Yes to continue.
  6. Depending on the policy and configuration of the server, you will see different listings such as Misconfigured Services, Rules are not on the system, and the like on the Security Configuration Wizard Analysis Results window.
    Analyzing the result and troubleshooting

A backup or rollback plan

A backup or rollback plan is important for any business. Microsoft SCW provides an easy method to revert the changes to its previous state. During the policy implementation, SCW will create the rollback files on the local server with the current configuration. These are XML files and are located in %systemdir%\security\msscw\rollbackfiles folder.

Note

Rollback files are located on the local server itself.

If the rollback files are not available in the default folder, you will receive the following error message during the server selection:

A backup or rollback plan

Once you perform the rollback operation, the XML files get deleted from the rollbackfiles folder. So, if you want to keep a record of these policies and settings, you will need to back up these files before performing the rollback operation.

Note

Microsoft SCW can only roll back the changes that have been applied by the SCW tool. If you use any other mechanisms like GPO, SCW won't be able to revert these changes.

If you use GPO to implement the policy, you can move these servers to a different OU to avoid applying these policies. Keep in mind that some policies are tattooed into the system. In that case, you need to create another GPO to revert these changes.

The following instructions provide the details of a rollback method using SCW"

  1. Open Security Configuration Wizard from Server Manager.
  2. Click on Next in the Welcome window.
  3. From the Configuration Action window, select the Rollback the last applied security policy option. Click on Next.
    A backup or rollback plan
  4. In the Select Server window, select the appropriate server name. Click on Next.
  5. In the Rollback Security Configuration window, you can click on View Rollback File to verify the rollback details. It will open SCW Viewer. Click on Next to continue with the rollback operation.
    A backup or rollback plan
  6. You will see the status and progress in the next screen. Click on Next.
  7. Click on Finish on the Completing the Security Configuration Wizard screen to complete the rollback operation.
    A backup or rollback plan

Summary

The focus of this chapter was to provide a method to implement a baseline server security policy based on your business requirement. I believe we have achieved this by using Microsoft Security Configuration Wizard (SCW). Once you have established a server platform security, you have to implement other aspects of security like application restriction, security to minimize server exploitation, and so on. Also, it is critical to have a management and administration method to maintain and monitor these polices. In the coming chapters, I will be explaining a few tools to accomplish these tasks.

Left arrow icon Right arrow icon

Description

If you are a security or Windows Server administrator wanting to learn or advance your knowledge in Microsoft security and secure your Windows Server infrastructure effectively, this book is for you.

Who is this book for?

If you are a security or Windows Server administrator wanting to learn or advance your knowledge in Microsoft security and secure your Windows Server infrastructure effectively, this book is for you.

What you will learn

  • Design a secure Windows Server platform based on the best practices and industry standard recommendations
  • Identify and mitigate security risks using tools such as Security Configurations Wizard, ASA, AppLocker, BitLocker, and EMET
  • Follow stepbystep instructions to tighten the security of your Active Directory file, print server, HyperV and IIS servers, and application roles
  • Develop a secure access control mechanism using the Dynamic Access Control (DAC) feature
  • Learn how to maintain security and deliver new security updates and patches using the Windows Server Update Service (WSUS)
  • Discover how PowerShell cmdlets and custom scripts can support your daytoday security admin tasks

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Feb 27, 2015
Length: 240 pages
Edition : 1st
Language : English
ISBN-13 : 9781784398729
Vendor :
Microsoft

What do you get with a Packt Subscription?

Free for first 7 days. $19.99 p/m after that. Cancel any time!
Product feature icon Unlimited ad-free access to the largest independent learning library in tech. Access this title and thousands more!
Product feature icon 50+ new titles added per month, including many first-to-market concepts and exclusive early access to books as they are being written.
Product feature icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Product feature icon Thousands of reference materials covering every tech concept you need to stay up to date.
Subscribe now
View plans & pricing

Product Details

Publication date : Feb 27, 2015
Length: 240 pages
Edition : 1st
Language : English
ISBN-13 : 9781784398729
Vendor :
Microsoft

Packt Subscriptions

See our plans and pricing
Modal Close icon
$19.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
$199.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts
$279.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total $ 152.97
Windows Server 2012 R2 Administrator Cookbook
$54.99
Active Directory with PowerShell
$48.99
Windows Server Security Essentials
$48.99
Total $ 152.97 Stars icon
Banner background image

Table of Contents

9 Chapters
1. Operating System and Baseline Security Chevron down icon Chevron up icon
2. Native MS Security Tools and Configuration Chevron down icon Chevron up icon
3. Server Roles and Protocols Chevron down icon Chevron up icon
4. Application Security Chevron down icon Chevron up icon
5. Network Service Security Chevron down icon Chevron up icon
6. Access Control Chevron down icon Chevron up icon
7. Patch Management Chevron down icon Chevron up icon
8. Auditing and Monitoring Chevron down icon Chevron up icon
Index Chevron down icon Chevron up icon

Customer reviews

Top Reviews
Rating distribution
Full star icon Full star icon Full star icon Full star icon Half star icon 4.8
(6 Ratings)
5 star 83.3%
4 star 16.7%
3 star 0%
2 star 0%
1 star 0%
Filter icon Filter
Top Reviews

Filter reviews by




Elizabeth George Mar 04, 2015
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Excellent book . Content is well organized. I strongly recommend this book for novice and graduate students looking for better understanding in windows server security
Amazon Verified review Amazon
Sasijyothi Apr 08, 2015
Full star icon Full star icon Full star icon Full star icon Full star icon 5
“It is very difficult to find a good security book these days. This book is an exception to this. Content is well written and organized. I am a security analyst for a bank. We already started testing some of the process and solutions mentioned in this book. Our entire security group is very happy with the logic and ideas provided in this book. This book was beyond our expectations. It explains the operating system hardening details as well as other applications like IIS, DNS, DHCP, Hyper-V, File and Print servers. Looking forward to reading more books from this author. I highly recommend this book. “
Amazon Verified review Amazon
MGeorge Apr 14, 2015
Full star icon Full star icon Full star icon Full star icon Full star icon 5
The topics are very well organized and explained in step by step instruction style. It provides enough background information and detailed instructions on how to implement the mentioned solutions in IT networks. The custom PowerShell scripts provided are well written and ready to use. I learned about some new applications from this book like Microsoft Attack Surface Analyzer(ASA), AppLocker, Security Compliance Manager (SCM) etc. In my opinion, this is one of the “must have” books if you are looking for a Microsoft Security related book! Great job and good luck!
Amazon Verified review Amazon
itconsultant007 Apr 07, 2015
Full star icon Full star icon Full star icon Full star icon Full star icon 5
I strongly recommend this book if you are looking to learn more about windows server security. I'm an IT professional (MCITP-DBA), and more than often I have to work with our admin group in reviewing our windows server infrastructure security and policies. This the most hands-on book I came across so far on windows security. The book clearly shows that it is written by someone who deals with windows security on a daily basis. My favorite is the step-by-step tutorials that provides real-world scenarios and security solutions, which is exactly what I was looking for. The book gives you a jump start on different techniques for identifying and mitigating any flaws in your windows server environment, and it does so in a clear and concise manner. The book is well organized - easy to follow and understand. The two important parts of the book - proactive approach and step-by-step tutorials should be very helpful for readers at all levels. If you are looking for hands-on book for windows server security - this is your book.
Amazon Verified review Amazon
Marcin Policht May 02, 2015
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Well-written, comprehensive overview of various aspects of securing Windows Server 2012 R2 deployments, covering topics relevant regardless of the size of managed environment, geared towards IT Pros, but presented in the manner which is easily understood without extensive technical knowledge.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

What is included in a Packt subscription? Chevron down icon Chevron up icon

A subscription provides you with full access to view all Packt and licnesed content online, this includes exclusive access to Early Access titles. Depending on the tier chosen you can also earn credits and discounts to use for owning content

How can I cancel my subscription? Chevron down icon Chevron up icon

To cancel your subscription with us simply go to the account page - found in the top right of the page or at https://subscription.packtpub.com/my-account/subscription - From here you will see the ‘cancel subscription’ button in the grey box with your subscription information in.

What are credits? Chevron down icon Chevron up icon

Credits can be earned from reading 40 section of any title within the payment cycle - a month starting from the day of subscription payment. You also earn a Credit every month if you subscribe to our annual or 18 month plans. Credits can be used to buy books DRM free, the same way that you would pay for a book. Your credits can be found in the subscription homepage - subscription.packtpub.com - clicking on ‘the my’ library dropdown and selecting ‘credits’.

What happens if an Early Access Course is cancelled? Chevron down icon Chevron up icon

Projects are rarely cancelled, but sometimes it's unavoidable. If an Early Access course is cancelled or excessively delayed, you can exchange your purchase for another course. For further details, please contact us here.

Where can I send feedback about an Early Access title? Chevron down icon Chevron up icon

If you have any feedback about the product you're reading, or Early Access in general, then please fill out a contact form here and we'll make sure the feedback gets to the right team. 

Can I download the code files for Early Access titles? Chevron down icon Chevron up icon

We try to ensure that all books in Early Access have code available to use, download, and fork on GitHub. This helps us be more agile in the development of the book, and helps keep the often changing code base of new versions and new technologies as up to date as possible. Unfortunately, however, there will be rare cases when it is not possible for us to have downloadable code samples available until publication.

When we publish the book, the code files will also be available to download from the Packt website.

How accurate is the publication date? Chevron down icon Chevron up icon

The publication date is as accurate as we can be at any point in the project. Unfortunately, delays can happen. Often those delays are out of our control, such as changes to the technology code base or delays in the tech release. We do our best to give you an accurate estimate of the publication date at any given time, and as more chapters are delivered, the more accurate the delivery date will become.

How will I know when new chapters are ready? Chevron down icon Chevron up icon

We'll let you know every time there has been an update to a course that you've bought in Early Access. You'll get an email to let you know there has been a new chapter, or a change to a previous chapter. The new chapters are automatically added to your account, so you can also check back there any time you're ready and download or read them online.

I am a Packt subscriber, do I get Early Access? Chevron down icon Chevron up icon

Yes, all Early Access content is fully available through your subscription. You will need to have a paid for or active trial subscription in order to access all titles.

How is Early Access delivered? Chevron down icon Chevron up icon

Early Access is currently only available as a PDF or through our online reader. As we make changes or add new chapters, the files in your Packt account will be updated so you can download them again or view them online immediately.

How do I buy Early Access content? Chevron down icon Chevron up icon

Early Access is a way of us getting our content to you quicker, but the method of buying the Early Access course is still the same. Just find the course you want to buy, go through the check-out steps, and you’ll get a confirmation email from us with information and a link to the relevant Early Access courses.

What is Early Access? Chevron down icon Chevron up icon

Keeping up to date with the latest technology is difficult; new versions, new frameworks, new techniques. This feature gives you a head-start to our content, as it's being created. With Early Access you'll receive each chapter as it's written, and get regular updates throughout the product's development, as well as the final course as soon as it's ready.We created Early Access as a means of giving you the information you need, as soon as it's available. As we go through the process of developing a course, 99% of it can be ready but we can't publish until that last 1% falls in to place. Early Access helps to unlock the potential of our content early, to help you start your learning when you need it most. You not only get access to every chapter as it's delivered, edited, and updated, but you'll also get the finalized, DRM-free product to download in any format you want when it's published. As a member of Packt, you'll also be eligible for our exclusive offers, including a free course every day, and discounts on new and popular titles.