Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Windows Server Security Essentials
Windows Server Security Essentials

Windows Server Security Essentials: Develop and implement a secure Microsoft infrastructure platform using native and built-in tools

eBook
€8.99 €29.99
Paperback
€36.99
Subscription
Free Trial
Renews at €18.99p/m

What do you get with Print?

Product feature icon Instant access to your digital eBook copy whilst your Print order is Shipped
Product feature icon Paperback book shipped to your preferred address
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Shipping Address

Billing Address

Shipping Methods
Table of content icon View table of contents Preview book icon Preview Book

Windows Server Security Essentials

Chapter 1. Operating System and Baseline Security

Server or network security doesn't start from a configuration or implementation level. In order to achieve the maximum result, it has to start from a policy or framework level. Also, your security and hardening policy must apply to all your end-to-end devices and services for it to effectively secure your IT infrastructure. The network or server components can be a part of this policy. Since the emphasis of this book is more towards the server security aspect, I will focus more on server security configuration instead of a broad security. Physical security is more important than any other security. For the purpose of this book, my assumption is that a policy, framework, and physical security are already in place. So our security conversation starts from a server level.

In this chapter, my plan is to walk you through a security tool, Security Configuration Wizard (SCW), and it's configuration details, and explain how you can use this tools in your environment to make the existing or new server infrastructure more secure. This tool will provide you with a common platform to create a policy template and apply these polices in an automated fashion, regardless of how they are defined and where they are coming from.

Microsoft Windows Server

The Microsoft Windows Server operating system has gone through several changes over the last decade. One of the major changes that you will notice in the latest versions of Windows is that of the improvement and integration of security. It is clear that server security is essential in one form or another in the enterprise world. Since the latest version of Windows is Windows Sever 2012 R2, I will be using this operating system as my base operating system in this book.

All solutions listed in the book are validated on a Windows 2012 environment. However, most of the methods and configuration details included in this book can also be used in the previous versions of Windows.

According to Microsoft, the Windows Server 2012 operating system is "secure by default". In some aspects, this is true. However, you need to tweak or customize it based on your business and technical requirements to achieve the maximum benefit.

If you are thinking about using the Windows Server 2012 operation system for applications, data, network services, and so on, the actual server hardening or security process starts from the selection of the type of operating system. In Windows Server 2012, you can use the Server Core installation to minimize the security threat. The details and benefits of Server Core can be found at http://msdn.microsoft.com/en-us/library/hh846323(v=vs.85).aspx. Since Server Core installation contains only a few services, processes, and so on, it can minimize the number of malicious attacks (attack surface) on the server. These server attacks can lead to a major enterprise-wide attack. So, if your service runs on the Server Core operating system, it is recommend to select Server Core for this application.

Note

Keep in mind that Server Core can support only a few services. The details of these supported services can be found at http://msdn.microsoft.com/en-us/library/hh846323(v=vs.85).aspx.

The next step in this process is to select the correct (or minimum) server roles for your server. The details of selecting and configuring server roles based on your requirements are included in Chapter 3, Server Roles and Protocols.

From an operating system perspective, in order to achieve maximum security using native and built-in solutions, the security aspect can be summarized using the following diagram:

Microsoft Windows Server

Note

Windows Server 2012 operating system installation, configuration, and conversion details can be found in Instant Migration from Windows Server 2008 and 2008 R2 to 2012 How-to, Packt Publishing.

Baseline and security

According to its definition, baseline is something you can measure all the time and compare it to identify the difference between the current state and the starting point. In general, the business and technical requirements reflect the core of a baseline policy. It can also be a combination of your business requirements and industry-best practices. As a security administrator, your job is to translate these polices into a technical policy that you can apply in your IT environment.

Different companies and industries follow different standards and policies to secure their IT infrastructure. The following are some of the popular standards that are widely used in the industry:

The details of these agencies and their recommendations can be reviewed on their websites.

Out of the box, Windows Server 2012 and higher provides a few security tools that can be used as a starting point for your Windows Server security configuration. We will start this journey with a built-in security tool called Microsoft Security Configuration Wizard (SCW). This is a very powerful role-based tool that is included with Windows Server 2012 or higher. You can easily translate your business security policies into a technical policy using this tool. As a first step, you need to define your business security requirements or policies. Once you have that documented, you can use Microsoft SCW to create a policy template for different types of servers. In general, these business security requirements can be achieved by disabling unwanted services, blocking unused ports, modifying registry settings, and restricting network and server access. In other words, Microsoft SCW will help you to identify minimum functionality requirements for a server-based on an installed role or service on that particular server. Then this policy can be applied to a server or set of servers using Microsoft SCW, or any other mechanisms like Group Policy Objects (GPOs).

The following is a five-step process to get you to implement the policy in an efficient manner:

  1. Define your business security policy.
  2. Translate it into a technical policy.
  3. Create a policy template using a tool.
  4. Policy review and validation.
  5. Policy implementation.

Security Configuration Wizard

The Microsoft Security Configuration Wizard tool has four major sections: Role-Based Service Configuration, Network Security, Registry Settings, and Auditing Policy. Each of these sections has sub-categories to address specific service requests, based on the top level category. The following table provides a high-level explanation of the available options inside Microsoft SCW:

Role-Based Service Configuration

Server role

This section provides an option to select or deselect appropriate roles based on your requirements. SCW will automatically detect installed roles on the server. All the dependent roles will also be selected automatically.

Client features

In this section, you can select client features that are specific for the role you have chosen in the previous step.

Administration option

Provides an option to select different administration tools and options.

Additional services

By default, SCW will select all required service-based roles, features, and administrative options. This section will give you an option to review these configurations and to make changes if needed.

Handling unwanted services

In this section, you will have an option to select unidentified services. SCW will not display services if they are not present in the local system.

Network Security

Network security rules

In this section, you can select firewall rules, traffic types, ports, and so on.

Registry Settings

SMB security setting

Provides an option to enable or disable SMB security signing.

LDAP Signing requirement

If the Domain Controller role is selected, you will see an option to configure LDAP signing.

Outbound Authentication methods

This section provides an option to configure remote computer authentication methods. You will have an option to select either domain account or local account.

Auditing Policy

System Audit Policy

This section provides an option to enable or disable auditing on a selected server.

Since creating a business security policy is beyond the scope of this book, my assumption would be that you have a business security policy already defined and in place. So we will be starting with the Translating your policy into a technical policy section.

Translating your policy into a technical policy

In this stage, as a security administrator, your job is to convert the existing business security policy into a technical policy. Since we are planning to use Microsoft SCW for this exercise, we can map our policy directly into an SCW policy.

I always use a worksheet to map these policies so as to make sure they align with existing options in the tool. The following is a sample worksheet. It helps an administrator identify the policies that are available in SCW and map them accordingly. On the left side of the worksheet, we have Business Security Policy. They directly come from the business or service owners. On the center of the worksheet, we have Technical Policy; in this case, I have included all available SCW roles and services in this section. The right column, Comments, is for mentioning any additional steps or comments required to complete the task.

As an example, you can see a sample internal portal server policy in the following worksheet where I have mapped a Business Security Policy to a Technical Policy:

Business Security Policy

 

Technical Policy

Comments

 

Role-Based Service Configuration (SCW)

It must be a dedicated server for the proposed application. All other non-dependent services must be disabled.

 

Server role

Review #4 and #5 as well.

Required client features must be running on the server to support the application.

 

Client features

 

Administrators must be able to remotely administer the server, IIS task scheduler, WMI, and log files.

 

Administration option

 

Custom monitoring service (InfraMon) must be enabled and running on all servers.

 

Additional services

 

All unwanted and non-dependent services must be disabled.

 

Handling unwanted services

 
 

Network Security (SCW)

Only HTTP port 80 and 443 allowed to this server. All other non-dependent ports and services must be disabled.

 

Network security rules

 
 

Registry Settings (SCW)

Client computers must be running Windows 7 or higher to access this application.

 

SMB security setting

 
  

LDAP Signing requirement

 

Only domain users can access this application.

 

Outbound Authentication methods

 
 

Auditing Policy (SCW)

Successful and failed login attempts must be audited and saved.

 

System Audit Policy

 
 

Testing (SCW)

Solution must be tested and evaluated in the lab before implementing in production.

  

Test the security policy in the lab using SCW.

 

Implementation (GPO)

Solution must be deployed using an automated mechanism. It must be transparent to the application developers and owners.

  

Export security policy and GPO and implement it in the correct OU.

 

Rollback Plan (GPO)

Must be able to roll back to previous state if/as needed.

  

Use GPO.

In the preceding exercise, we had a perfect one-to-one matching between Security Business Policy and SCW options, but in the real world, it may be different. So you may need to modify the policy worksheet based on your requirements. If the options are not available in SCW, you may need to configure it manually using GPO or other mechanisms.

Creating a policy template

In order to generate a policy template, you must be a local administrator on the server. SCW can be run from a local server or from a remote server. If you are running SCW from a remote server, you need to make sure that the required ports and firewall rules are enabled on this remote server. By default, SCW tries to establish an admin$ share connection to the remote server. Perform the following steps:

  1. Open Server Manager. You can open Server Manager from the status bar, or by typing Server Manager in the Windows Start screen.
  2. From the Tools menu, select the Security Configuration Wizard option.
    Creating a policy template

    Selecting the Security Configuration Wizard option

  3. Click on Next on the Welcome to the Security Configuration Wizard page.
  4. Select the Create a new security policy option on the Configuration Action page. Click on Next.
    Creating a policy template
  5. On the Select Server page, enter the server name in the Server textbox, or click on the Browse button to search for a server from the Active Directory. This server will be used to create a baseline policy based on the roles and features installed on this server.
  6. If you specify a remote server, and the current logged-in user does not have local administrative permissions on the remote server, you can specify an alternate account using the Specify User Account… option. Click on Next.
  7. SCW analyzes the remote server and updates the configuration database based on the installed role and features on the selected server. You can see the details by selecting the View Configuration Database option from the Processing Security Configuration Database page:
    • The View Configuration Database option opens the SCW Viewer window to display the configuration database.
    • If you see Windows Security Warning for the ActiveX control, select Yes to continue the operation.
    • The Security Configuration Database option has five different sections—Server Roles, Client Features, Administration and Other Options, Services, and Windows Firewall. You will be evaluating and modifying these settings based on your business security policy requirement.
    • You can safely close the SCW Viewer window without interrupting any other tasks.
    • Click on Next to continue.
      Creating a policy template
  8. Click on Next on the Role-Based Service Configuration page.
  9. In the Select Server Roles window:
    • From the View drop-down box, you can select All roles, Installed Roles, Uninstalled Roles, or Select Roles. Since we are creating a baseline policy based on an install role, we will select Installed Roles.

      Note

      If the required roles are not installed on the server, you can add these roles from Server Manager by selecting the Add roles and features option. All required roles must be installed prior to creating a baseline policy.

    • You will notice that some of the roles are selected by default. These are some of the required or dependent components for successful creation, implementation, and rollback of these policies.
    • Select the appropriate roles here. As an example, I am selecting the Web Server role here.
    • Click on Next to continue.
      Creating a policy template
  10. On the Select Client Features page, select the appropriate client features based on your security requirements. Click on Next.
  11. On the Select Administrative and Other Options page, select the appropriate options based on your security policy requirement. Click on Next.
  12. As an example, in this exercise, I will be selecting the following administrative options:
    • Remote Windows Administration.
    • Also, you will see a few new options based on the selected roles and features on the previous page.
    • Select Web Server options from the View drop-down menu.
      Creating a policy template
    • Here, I am using my worksheet as an example. Based on the requirement, we need to have remote administration enabled. So, I will be selecting the Remote Administration for Web Server (IIS) option.
      Creating a policy template
    • Click on Next.
  13. On the Select Additional Services page, select the additional services based on your requirement. According to my security policy requirement, "A custom monitoring service (InfraMon) must be enabled and running on all servers." As shown in the following screenshot, you will have an option to select or deselect additional services from this window. Click on Next.
    Creating a policy template
  14. On the Handling Unspecified Service page, select the appropriate option based on your security policy requirement. Unspecified services are services that are not part of the default configuration database. Since they are unknown to the SCW application, and may be a security threat, you will be presented with the following two options:
    • Do not change the startup mode of the service: This will leave the existing startup mode (Automatic, Manual, and so on) of the services intact.
    • Disable the service: If you are not sure about the listed service, you can use the Disable the service option to disable these types of services at operating system startup.
    • Once you complete the configuration, you can click on Next to proceed to the next step in the process.
  15. You can confirm these settings on the Confirm Service Changes window. Click on Next.
  16. Click on Next to continue with network security configuration, from the Network Security window. If you do not have a network security requirement, you can skip this configuration using the Skip this section option.
  17. In the Network Security Rules window, select the appropriate firewall rules. For example, if you need to modify the HTTP traffic rule, you can:
    • Select the World Wide Web Services (HTTP Traffic-In) rule.
    • Select Edit to edit an existing policy or Add to add a custom policy.
      Creating a policy template
  18. On the Add or Edit rule window, you have the following tabs:
    • Program and Services: Enable or disable services and programs
    • Protocols and Ports: Enable or disable ports and protocols
    • Scope: Restrict IP address traffic based on selected IP address range
      Creating a policy template
    • Click on Next.
  19. Click on Next to continue with registry security configuration, from the Registry Security window.
  20. If you don't have a registry security requirement, you can skip this configuration using the Skip this section option.
  21. On the Require SMB Security Signatures page, select the appropriate options based on your security policy requirement.
    Creating a policy template
  22. Click on Next
  23. On the Outbound Authentication Methods page, select the appropriate options. Click on Next.
    Creating a policy template
  24. On the Outbound Authentication using Domain Account page, select the appropriate options based on your security requirement. The following are the available options:
    • Windows NT 4.0 Service Pack 6a or later operating system
    • Clock that is synchronized with the select server's clock
  25. Click on Next.
    Creating a policy template
  26. On the Registry Setting Summary page, review the selected settings and click on Next to continue.
  27. Select Next to continue with audit policy configuration from the Audit Policy window:
    • If you don't have auditing requirements, you can skip this configuration using the Skip this section option, or you can configure the auditing by selecting the options from the System Audit Policy page. As an example, I will be selecting the Audit successful and unsuccessful activities option.
    • Click on Next.
      Creating a policy template
  28. On the Audit Policy Summary page, review the selected settings and click on Next to continue.
  29. Click on Next on the Save Security Policy page.
  30. On the Security Policy File Name page, enter the Name and Description values for the policy. Click on Next.
    Creating a policy template
  31. Select the Apply Later option on the Apply Security Policy page.
    Creating a policy template
  32. Click on Finish on the Completing the Security Configuration Wizard page.

    Note

    By default, all the polices will be saved in the %Systemroot%\Security\MSSCW\Policies folder.

Policy review and validation

At this point, you have created a baseline security template based on your business security requirement. As always, it is a best practice to evaluate these configurations in an isolated lab environment before it is implemented in the production environment.

Microsoft SCW creates an XML file as an output policy file, which can be reviewed by using any XML reader. Microsoft has provided a command-line supplement SCW tool called SCWCMD to accomplish this. SCWCMD is a powerful tool that can support the following actions:

  • SCWCMD analyze: Analyzes the computer based on your security policy
  • SCWCMD configure: Applies SCW security to a computer
  • SCWCMD register: This updates the SCW database based on your custom roles and features
  • SCWCMD rollback: This will roll back the policies from the previously applied computer
  • SCWCMD transform: This converts an SCW-generated policy to a GPO-based policy
  • SCWCMD view: This views the existing SCW policy

We will be using the SCWCMD tool with view option for our policy review and validation process:

  • From the command prompt, enter the following command:
    SCWCMD view /x:WebServerBaseLineV1.0.xml
    
    Policy review and validation
  • It will open SCW Viewer. Click on Yes to access Windows Security Warning. You should be able to review the policy settings from SCW Viewer.

Once you have verified the settings, you can apply it to one server to evaluate the result. We will be using Security Configuration Wizard (SCW) to achieve this:

  1. Open Security Configuration Wizard (SCW) from Server Manager.
  2. Click on Next in the Welcome window.
  3. In the Configuration Action window, select the Apply an existing security policy option.
  4. In the Existing security policy file window, select the previously created policy file.
  5. Click on Next.
    Policy review and validation
  6. In the Select Server window, select the correct destination server. Click on Next.
  7. You can view the policy detail in the Apply Security Policy window. Click on Next to continue.

At this point, as an administrator, your job is to validate and verify the result. Once you are satisfied with the result, you can move to the production implementation.

Policy implementation

Applying a policy using Microsoft SCW is suitable for a small environment or testing purposes. However, in an enterprise environment, it may not be sufficient. Some type of automated mechanism should be in place. Since Microsoft Group Policy Object (GPO) is a commonly used tool in any environment, we can use GPO to deploy these security configurations into the designated servers. Since Microsoft SCW and Microsoft GPO are not directly connected, the first step in the process is to export output of the SCW XML file into the GPO format, and then import this into Active Directory.

In our scenario, we will be using the SCWCMD Transform command with the syntax scwcmd transform /p:<SCWPolicy.xml> /g:<GPOName>:

  1. Open the command line from your Windows Server 2012 server.
  2. Type scwcmd transform /p:WebServerBaseLineV1.0.XML /g:WebServerBaselineV1.0 and press Enter.
    Policy implementation
  3. This will convert and export the policy into Active Directory.
  4. Open Group Policy Manager Console. You can open it from Server Manager or type Group Policy Manager on the start screen.
  5. Expand your Domain, Domain Name, and then Group Policy Objects nodes. The exported policy will be in the Group Policy Objects node.
  6. The GPO configuration can be verified by evaluating the policies in the Settings tab.
    Policy implementation
  7. Once you are satisfied with the policy, it can be deployed (linked) to an existing Organizational Unit (OU). In this scenario, we will be linking it to an OU called InternalWebServers.

    Note

    Keep in mind that the SCWCMD Trasnform command will only export the polices into Active Directory. You need to manually link these GPO, using Group Policy Administration console.

  8. Locate the correct OU by expanding the top level OU. In this scenario, I will be selecting the InternalWebServers OU.
  9. Right-click on the InternalWebServers OU and select the Link an Existing GPO option.
    Policy implementation
  10. Select the WebServerBaseLiveV1.0 GPO from the Select GPO window. Click on OK.
  11. This will link the existing GPO to this OU and all severs inside this OU will automatically receive the policy.

Note

The GPO will get updated on to these computers during the default GPO interval. However, you can force the update manually by using the GPUpdate/Force command, or by selecting the Group Policy Update option from the GPMC console.

Analyzing the result and troubleshooting

The SCWCMD tool provides an option to troubleshoot the computers so as to ensure that these computers are in compliance with your security policy. We will be using the SCWCMD Analyze option to analyze a computer's existing policy against an implemented policy. We can use this command against any computer regardless of whether you have used SCW or GPO to implement these policies. The result will be saved in an XML file in the working directory, unless you have specified a different path. These files can be viewed using the SCWCMD View option.

Here, I am running the SCWCMD Analyze command against a non-hardening server to demonstrate the result:

  1. From the command prompt, enter the SCWCMD Analyze /m:Server02 /p:WebServerBaseLineV1.0.XML command.
    Analyzing the result and troubleshooting
  2. The output will be saved in the same directory and the default filename will be the server name. In this scenario, it will be called Server02.XML.
  3. The SCWCMD view command can be used to view this file. This command will open the result file in SCW Viewer.
  4. From the command prompt, enter SCWCMD View /x:Server02.XML.
  5. If you receive an Active X Windows Security Warning, click on Yes to continue.
  6. Depending on the policy and configuration of the server, you will see different listings such as Misconfigured Services, Rules are not on the system, and the like on the Security Configuration Wizard Analysis Results window.
    Analyzing the result and troubleshooting

A backup or rollback plan

A backup or rollback plan is important for any business. Microsoft SCW provides an easy method to revert the changes to its previous state. During the policy implementation, SCW will create the rollback files on the local server with the current configuration. These are XML files and are located in %systemdir%\security\msscw\rollbackfiles folder.

Note

Rollback files are located on the local server itself.

If the rollback files are not available in the default folder, you will receive the following error message during the server selection:

A backup or rollback plan

Once you perform the rollback operation, the XML files get deleted from the rollbackfiles folder. So, if you want to keep a record of these policies and settings, you will need to back up these files before performing the rollback operation.

Note

Microsoft SCW can only roll back the changes that have been applied by the SCW tool. If you use any other mechanisms like GPO, SCW won't be able to revert these changes.

If you use GPO to implement the policy, you can move these servers to a different OU to avoid applying these policies. Keep in mind that some policies are tattooed into the system. In that case, you need to create another GPO to revert these changes.

The following instructions provide the details of a rollback method using SCW"

  1. Open Security Configuration Wizard from Server Manager.
  2. Click on Next in the Welcome window.
  3. From the Configuration Action window, select the Rollback the last applied security policy option. Click on Next.
    A backup or rollback plan
  4. In the Select Server window, select the appropriate server name. Click on Next.
  5. In the Rollback Security Configuration window, you can click on View Rollback File to verify the rollback details. It will open SCW Viewer. Click on Next to continue with the rollback operation.
    A backup or rollback plan
  6. You will see the status and progress in the next screen. Click on Next.
  7. Click on Finish on the Completing the Security Configuration Wizard screen to complete the rollback operation.
    A backup or rollback plan

Summary

The focus of this chapter was to provide a method to implement a baseline server security policy based on your business requirement. I believe we have achieved this by using Microsoft Security Configuration Wizard (SCW). Once you have established a server platform security, you have to implement other aspects of security like application restriction, security to minimize server exploitation, and so on. Also, it is critical to have a management and administration method to maintain and monitor these polices. In the coming chapters, I will be explaining a few tools to accomplish these tasks.

Left arrow icon Right arrow icon

Description

If you are a security or Windows Server administrator wanting to learn or advance your knowledge in Microsoft security and secure your Windows Server infrastructure effectively, this book is for you.

Who is this book for?

If you are a security or Windows Server administrator wanting to learn or advance your knowledge in Microsoft security and secure your Windows Server infrastructure effectively, this book is for you.

What you will learn

  • Design a secure Windows Server platform based on the best practices and industry standard recommendations
  • Identify and mitigate security risks using tools such as Security Configurations Wizard, ASA, AppLocker, BitLocker, and EMET
  • Follow stepbystep instructions to tighten the security of your Active Directory file, print server, HyperV and IIS servers, and application roles
  • Develop a secure access control mechanism using the Dynamic Access Control (DAC) feature
  • Learn how to maintain security and deliver new security updates and patches using the Windows Server Update Service (WSUS)
  • Discover how PowerShell cmdlets and custom scripts can support your daytoday security admin tasks
Estimated delivery fee Deliver to Luxembourg

Premium delivery 7 - 10 business days

€17.95
(Includes tracking information)

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Feb 27, 2015
Length: 240 pages
Edition : 1st
Language : English
ISBN-13 : 9781784398729
Vendor :
Microsoft

What do you get with Print?

Product feature icon Instant access to your digital eBook copy whilst your Print order is Shipped
Product feature icon Paperback book shipped to your preferred address
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Shipping Address

Billing Address

Shipping Methods
Estimated delivery fee Deliver to Luxembourg

Premium delivery 7 - 10 business days

€17.95
(Includes tracking information)

Product Details

Publication date : Feb 27, 2015
Length: 240 pages
Edition : 1st
Language : English
ISBN-13 : 9781784398729
Vendor :
Microsoft

Packt Subscriptions

See our plans and pricing
Modal Close icon
€18.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
€189.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts
€264.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total 115.97
Windows Server 2012 R2 Administrator Cookbook
€41.99
Active Directory with PowerShell
€36.99
Windows Server Security Essentials
€36.99
Total 115.97 Stars icon
Banner background image

Table of Contents

9 Chapters
1. Operating System and Baseline Security Chevron down icon Chevron up icon
2. Native MS Security Tools and Configuration Chevron down icon Chevron up icon
3. Server Roles and Protocols Chevron down icon Chevron up icon
4. Application Security Chevron down icon Chevron up icon
5. Network Service Security Chevron down icon Chevron up icon
6. Access Control Chevron down icon Chevron up icon
7. Patch Management Chevron down icon Chevron up icon
8. Auditing and Monitoring Chevron down icon Chevron up icon
Index Chevron down icon Chevron up icon

Customer reviews

Top Reviews
Rating distribution
Full star icon Full star icon Full star icon Full star icon Half star icon 4.8
(6 Ratings)
5 star 83.3%
4 star 16.7%
3 star 0%
2 star 0%
1 star 0%
Filter icon Filter
Top Reviews

Filter reviews by




Elizabeth George Mar 04, 2015
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Excellent book . Content is well organized. I strongly recommend this book for novice and graduate students looking for better understanding in windows server security
Amazon Verified review Amazon
Sasijyothi Apr 08, 2015
Full star icon Full star icon Full star icon Full star icon Full star icon 5
“It is very difficult to find a good security book these days. This book is an exception to this. Content is well written and organized. I am a security analyst for a bank. We already started testing some of the process and solutions mentioned in this book. Our entire security group is very happy with the logic and ideas provided in this book. This book was beyond our expectations. It explains the operating system hardening details as well as other applications like IIS, DNS, DHCP, Hyper-V, File and Print servers. Looking forward to reading more books from this author. I highly recommend this book. “
Amazon Verified review Amazon
MGeorge Apr 14, 2015
Full star icon Full star icon Full star icon Full star icon Full star icon 5
The topics are very well organized and explained in step by step instruction style. It provides enough background information and detailed instructions on how to implement the mentioned solutions in IT networks. The custom PowerShell scripts provided are well written and ready to use. I learned about some new applications from this book like Microsoft Attack Surface Analyzer(ASA), AppLocker, Security Compliance Manager (SCM) etc. In my opinion, this is one of the “must have” books if you are looking for a Microsoft Security related book! Great job and good luck!
Amazon Verified review Amazon
itconsultant007 Apr 07, 2015
Full star icon Full star icon Full star icon Full star icon Full star icon 5
I strongly recommend this book if you are looking to learn more about windows server security. I'm an IT professional (MCITP-DBA), and more than often I have to work with our admin group in reviewing our windows server infrastructure security and policies. This the most hands-on book I came across so far on windows security. The book clearly shows that it is written by someone who deals with windows security on a daily basis. My favorite is the step-by-step tutorials that provides real-world scenarios and security solutions, which is exactly what I was looking for. The book gives you a jump start on different techniques for identifying and mitigating any flaws in your windows server environment, and it does so in a clear and concise manner. The book is well organized - easy to follow and understand. The two important parts of the book - proactive approach and step-by-step tutorials should be very helpful for readers at all levels. If you are looking for hands-on book for windows server security - this is your book.
Amazon Verified review Amazon
Marcin Policht May 02, 2015
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Well-written, comprehensive overview of various aspects of securing Windows Server 2012 R2 deployments, covering topics relevant regardless of the size of managed environment, geared towards IT Pros, but presented in the manner which is easily understood without extensive technical knowledge.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

What is the delivery time and cost of print book? Chevron down icon Chevron up icon

Shipping Details

USA:

'

Economy: Delivery to most addresses in the US within 10-15 business days

Premium: Trackable Delivery to most addresses in the US within 3-8 business days

UK:

Economy: Delivery to most addresses in the U.K. within 7-9 business days.
Shipments are not trackable

Premium: Trackable delivery to most addresses in the U.K. within 3-4 business days!
Add one extra business day for deliveries to Northern Ireland and Scottish Highlands and islands

EU:

Premium: Trackable delivery to most EU destinations within 4-9 business days.

Australia:

Economy: Can deliver to P. O. Boxes and private residences.
Trackable service with delivery to addresses in Australia only.
Delivery time ranges from 7-9 business days for VIC and 8-10 business days for Interstate metro
Delivery time is up to 15 business days for remote areas of WA, NT & QLD.

Premium: Delivery to addresses in Australia only
Trackable delivery to most P. O. Boxes and private residences in Australia within 4-5 days based on the distance to a destination following dispatch.

India:

Premium: Delivery to most Indian addresses within 5-6 business days

Rest of the World:

Premium: Countries in the American continent: Trackable delivery to most countries within 4-7 business days

Asia:

Premium: Delivery to most Asian addresses within 5-9 business days

Disclaimer:
All orders received before 5 PM U.K time would start printing from the next business day. So the estimated delivery times start from the next day as well. Orders received after 5 PM U.K time (in our internal systems) on a business day or anytime on the weekend will begin printing the second to next business day. For example, an order placed at 11 AM today will begin printing tomorrow, whereas an order placed at 9 PM tonight will begin printing the day after tomorrow.


Unfortunately, due to several restrictions, we are unable to ship to the following countries:

  1. Afghanistan
  2. American Samoa
  3. Belarus
  4. Brunei Darussalam
  5. Central African Republic
  6. The Democratic Republic of Congo
  7. Eritrea
  8. Guinea-bissau
  9. Iran
  10. Lebanon
  11. Libiya Arab Jamahriya
  12. Somalia
  13. Sudan
  14. Russian Federation
  15. Syrian Arab Republic
  16. Ukraine
  17. Venezuela
What is custom duty/charge? Chevron down icon Chevron up icon

Customs duty are charges levied on goods when they cross international borders. It is a tax that is imposed on imported goods. These duties are charged by special authorities and bodies created by local governments and are meant to protect local industries, economies, and businesses.

Do I have to pay customs charges for the print book order? Chevron down icon Chevron up icon

The orders shipped to the countries that are listed under EU27 will not bear custom charges. They are paid by Packt as part of the order.

List of EU27 countries: www.gov.uk/eu-eea:

A custom duty or localized taxes may be applicable on the shipment and would be charged by the recipient country outside of the EU27 which should be paid by the customer and these duties are not included in the shipping charges been charged on the order.

How do I know my custom duty charges? Chevron down icon Chevron up icon

The amount of duty payable varies greatly depending on the imported goods, the country of origin and several other factors like the total invoice amount or dimensions like weight, and other such criteria applicable in your country.

For example:

  • If you live in Mexico, and the declared value of your ordered items is over $ 50, for you to receive a package, you will have to pay additional import tax of 19% which will be $ 9.50 to the courier service.
  • Whereas if you live in Turkey, and the declared value of your ordered items is over € 22, for you to receive a package, you will have to pay additional import tax of 18% which will be € 3.96 to the courier service.
How can I cancel my order? Chevron down icon Chevron up icon

Cancellation Policy for Published Printed Books:

You can cancel any order within 1 hour of placing the order. Simply contact customercare@packt.com with your order details or payment transaction id. If your order has already started the shipment process, we will do our best to stop it. However, if it is already on the way to you then when you receive it, you can contact us at customercare@packt.com using the returns and refund process.

Please understand that Packt Publishing cannot provide refunds or cancel any order except for the cases described in our Return Policy (i.e. Packt Publishing agrees to replace your printed book because it arrives damaged or material defect in book), Packt Publishing will not accept returns.

What is your returns and refunds policy? Chevron down icon Chevron up icon

Return Policy:

We want you to be happy with your purchase from Packtpub.com. We will not hassle you with returning print books to us. If the print book you receive from us is incorrect, damaged, doesn't work or is unacceptably late, please contact Customer Relations Team on customercare@packt.com with the order number and issue details as explained below:

  1. If you ordered (eBook, Video or Print Book) incorrectly or accidentally, please contact Customer Relations Team on customercare@packt.com within one hour of placing the order and we will replace/refund you the item cost.
  2. Sadly, if your eBook or Video file is faulty or a fault occurs during the eBook or Video being made available to you, i.e. during download then you should contact Customer Relations Team within 14 days of purchase on customercare@packt.com who will be able to resolve this issue for you.
  3. You will have a choice of replacement or refund of the problem items.(damaged, defective or incorrect)
  4. Once Customer Care Team confirms that you will be refunded, you should receive the refund within 10 to 12 working days.
  5. If you are only requesting a refund of one book from a multiple order, then we will refund you the appropriate single item.
  6. Where the items were shipped under a free shipping offer, there will be no shipping costs to refund.

On the off chance your printed book arrives damaged, with book material defect, contact our Customer Relation Team on customercare@packt.com within 14 days of receipt of the book with appropriate evidence of damage and we will work with you to secure a replacement copy, if necessary. Please note that each printed book you order from us is individually made by Packt's professional book-printing partner which is on a print-on-demand basis.

What tax is charged? Chevron down icon Chevron up icon

Currently, no tax is charged on the purchase of any print book (subject to change based on the laws and regulations). A localized VAT fee is charged only to our European and UK customers on eBooks, Video and subscriptions that they buy. GST is charged to Indian customers for eBooks and video purchases.

What payment methods can I use? Chevron down icon Chevron up icon

You can pay with the following card types:

  1. Visa Debit
  2. Visa Credit
  3. MasterCard
  4. PayPal
What is the delivery time and cost of print books? Chevron down icon Chevron up icon

Shipping Details

USA:

'

Economy: Delivery to most addresses in the US within 10-15 business days

Premium: Trackable Delivery to most addresses in the US within 3-8 business days

UK:

Economy: Delivery to most addresses in the U.K. within 7-9 business days.
Shipments are not trackable

Premium: Trackable delivery to most addresses in the U.K. within 3-4 business days!
Add one extra business day for deliveries to Northern Ireland and Scottish Highlands and islands

EU:

Premium: Trackable delivery to most EU destinations within 4-9 business days.

Australia:

Economy: Can deliver to P. O. Boxes and private residences.
Trackable service with delivery to addresses in Australia only.
Delivery time ranges from 7-9 business days for VIC and 8-10 business days for Interstate metro
Delivery time is up to 15 business days for remote areas of WA, NT & QLD.

Premium: Delivery to addresses in Australia only
Trackable delivery to most P. O. Boxes and private residences in Australia within 4-5 days based on the distance to a destination following dispatch.

India:

Premium: Delivery to most Indian addresses within 5-6 business days

Rest of the World:

Premium: Countries in the American continent: Trackable delivery to most countries within 4-7 business days

Asia:

Premium: Delivery to most Asian addresses within 5-9 business days

Disclaimer:
All orders received before 5 PM U.K time would start printing from the next business day. So the estimated delivery times start from the next day as well. Orders received after 5 PM U.K time (in our internal systems) on a business day or anytime on the weekend will begin printing the second to next business day. For example, an order placed at 11 AM today will begin printing tomorrow, whereas an order placed at 9 PM tonight will begin printing the day after tomorrow.


Unfortunately, due to several restrictions, we are unable to ship to the following countries:

  1. Afghanistan
  2. American Samoa
  3. Belarus
  4. Brunei Darussalam
  5. Central African Republic
  6. The Democratic Republic of Congo
  7. Eritrea
  8. Guinea-bissau
  9. Iran
  10. Lebanon
  11. Libiya Arab Jamahriya
  12. Somalia
  13. Sudan
  14. Russian Federation
  15. Syrian Arab Republic
  16. Ukraine
  17. Venezuela