Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Active Directory Disaster Recovery

You're reading from   Active Directory Disaster Recovery Expert guidance on planning and implementing Active Directory disaster recovery plans with this book and eBook

Arrow left icon
Product type Paperback
Published in Jun 2008
Publisher
ISBN-13 9781847193278
Length 252 pages
Edition Edition
Arrow right icon
Author (1):
Arrow left icon
Florian Rommel Florian Rommel
Author Profile Icon Florian Rommel
Florian Rommel
Arrow right icon
View More author details
Toc

Table of Contents (17) Chapters Close

Active Directory Disaster Recovery
Credits
About the Author
About the Reviewers
1. Preface
1. An Overview of Active Directory Disaster Recovery FREE CHAPTER 2. Active Directory Design Principles 3. Design and Implement a Disaster Recovery Plan for Your Organization 4. Strengthening AD to Increase Resilience 5. Active Directory Failure On a Single Domain Controller 6. Recovery of a Single Failed Domain Controller 7. Recovery of Lost or Deleted Users and Objects 8. Complete Active Directory Failure 9. Site AD Infrastructure Failure (Hardware) 10. Common Recovery Tools Explained Sample Business Continuity Plan Bibliography

Securing Your DNS Configuration


DNS represents AD's foundation, and all clients connected to an AD require a working and correct DNS in order to access resources. DNS has had several security flaws with significant impact. From an attacker's point of view, an unsecured or relaxed DNS environment is probably the best attack vector against an AD. Microsoft's TechNet white paper on securing an AD environment discusses best practices for securing DNS, in Chapter 6 (http://technet2.microsoft.com/windowsserver/en/library/cc1eff0a-3a9e-46d2-8a7d-6b2e16461c711033.mspx).

One DNS attack vector is a Denial of Service (DoS), which, by causing too much traffic for example, causes the DNS service to fail to respond to legitimate client queries. Another attack vector is DNS poisoning , which means that an attacker successfully modifies entries in the DNS database, which then causes client requests to resolve incorrectly. All traffic is then sent to the attacker's machine, which can cause a lot of problems...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image