Search icon CANCEL
Subscription
0
Cart icon
Cart
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Active Directory Disaster Recovery

You're reading from  Active Directory Disaster Recovery

Product type Book
Published in Jun 2008
Publisher
ISBN-13 9781847193278
Pages 252 pages
Edition 1st Edition
Languages
Author (1):
Florian Rommel Florian Rommel
Profile icon Florian Rommel
Toc

Table of Contents (17) Chapters close

Active Directory Disaster Recovery
Credits
About the Author
About the Reviewers
1. Preface
1. An Overview of Active Directory Disaster Recovery 2. Active Directory Design Principles 3. Design and Implement a Disaster Recovery Plan for Your Organization 4. Strengthening AD to Increase Resilience 5. Active Directory Failure On a Single Domain Controller 6. Recovery of a Single Failed Domain Controller 7. Recovery of Lost or Deleted Users and Objects 8. Complete Active Directory Failure 9. Site AD Infrastructure Failure (Hardware) 10. Common Recovery Tools Explained Sample Business Continuity Plan Bibliography

Securing Your DNS Configuration


DNS represents AD's foundation, and all clients connected to an AD require a working and correct DNS in order to access resources. DNS has had several security flaws with significant impact. From an attacker's point of view, an unsecured or relaxed DNS environment is probably the best attack vector against an AD. Microsoft's TechNet white paper on securing an AD environment discusses best practices for securing DNS, in Chapter 6 (http://technet2.microsoft.com/windowsserver/en/library/cc1eff0a-3a9e-46d2-8a7d-6b2e16461c711033.mspx).

One DNS attack vector is a Denial of Service (DoS), which, by causing too much traffic for example, causes the DNS service to fail to respond to legitimate client queries. Another attack vector is DNS poisoning , which means that an attacker successfully modifies entries in the DNS database, which then causes client requests to resolve incorrectly. All traffic is then sent to the attacker's machine, which can cause a lot of problems...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime