|Implementing, Managing, and Troubleshooting Baseline Security |
Implementing, Managing, and Troubleshooting Service Packs and Security Updates
Configure security templates.
- Configure registry and file system permissions.
- Configure account policies.
- Configure audit policies.
- Configure user rights assignment.
- Configure security options.
- Configure system services.
- Configure restricted groups.
- Configure event logs.
Deploy security templates. Deployment methods include using Group Policy and scripting.
Troubleshoot security template problems. Considerations include Group Policy, upgraded operating systems, and mixed client-computer operating systems.
Configure additional security based on computer roles. Computer roles include Microsoft SQL Server computer, Microsoft Exchange Server computer, domain controller, Internet Authentication Service (IAS) server, Internet Information Services (IIS) server, and mobile client computer.
Configure additional security for client-computer operating systems by using Group Policy.
Implementing, Managing, and Troubleshooting Security-Enhanced Communication Channels
Determine the current status of service packs and security updates. Tools include MBSA and HFNetChk.
Install service packs and security updates. Consideration include slipstreaming and using Remote Installation Services (RIS), custom scripts, and isolated networks.
- Install service packs and security updates on new client computers and servers. Considerations include slipstreaming and using RIS, custom scripts, and isolated networks.
Manage service packs and security updates. Considerations include server computers and remote client computers. Tools include Microsoft Software Update Service, Automatic Updates, and SMS.
Troubleshoot the deployment of service packs and security updates. Typical issues include third-party application compatibility, permissions, and version conflicts.
Configuring, Managing, and Troubleshooting Authentication and Remote Access Security
Configure IPSec to help protect communication between networks and hosts. Hosts include domain controllers, Internet Web servers, databases, e-mail servers, and client computers.
- Configure IPSec authentication.
- Configure appropriate encryption levels.
- Configure the appropriate IPSec protocol. Protocols include AH and ESP.
- Deploy and manage IPSec certificates. Considerations include renewing certificates.
Troubleshoot IPSec. Typical issues include IPSec rule configurations, firewall configurations, routers, and authentication.
Implement security for wireless networks.
- Configure public and private wireless LANs.
- Configure wireless encryption levels. Levels include WEP and 802.1x.
- Configure wireless network connection settings on client computers. Client-computer operating systems include Windows 2000 Professional, Windows XP Professional, and Windows CE 3.0.
Configure Server Message Block (SMB) signing to support packet authentication and integrity.
Deploy and manage SSL certificates. Considerations include renewing certificates and obtaining self-issued certificates versus public-issued certificates.
- Obtain public and private certificates.
- Install certificates for SSL.
- Renew certificates.
Configure SSL to help protect communication channels. Communication channels include client computer to Web server, Web server to SQL Server computer, client computer to Active Directory domain controller, and e-mail server to client computer.
Implementing and Managing a Public Key Infrastructure (PKI) and Encrypting File System (EFS)
Configure and troubleshoot authentication.
- Configure authentication protocols to support mixed Windows client-computer environments.
- Configure the interoperability of Kerberos authentication with UNIX computers.
- Configure authentication for extranet scenarios.
- Configure trust relationships.
- Configure authentication for members of non-trusted domain authentication.
Configure and troubleshoot authentication for Web users. Authentication types include Basic, Integrated Windows, anonymous, digest, and client certificate mapping.
Configure authentication for security-enhanced remote access. Authentication types include PAP, CHAP, MS-CHAP, MS-CHAP v2, EAP-MD5, EAP-TLS, and Multi-factor authentication with smart cards and EAP.
Configure and troubleshoot virtual private network (VPN) protocols. Considerations include Internet service provider (ISP), client-computer operating system, Network Address Translation (NAT) devices, Routing and Remote Access server, and firewall server.
Manage client-computer configuration for remote access security. Tools include remote access policy and Connection Manager Administration Kit.
Monitoring and Responding to Security Incidents
Install and configure Certificate Authority (CA) hierarchies. Considerations include enterprise, standalone, and third-party.
- Install and configure the root, intermediate, and issuing CA. Considerations include renewals and hierarchy.
- Configure certificate templates. Considerations include LDAP queries, HTTP queries, and third-party CAs.
- Configure the publication of Certificate Revocation Lists (CRLs).
- Configure public key Group Policy.
- Configure certificate renewal and enrollment.
- Deploy certificates to users, computers, and CAs.
Manage Certificate Authorities (CAs). Considerations include enterprise, stand-alone, and third-party.
- Enroll and renew certificates.
- Revoke certificates.
- Manage and troubleshoot Certificate Revocation Lists (CRLs). Considerations include publishing the CRL.
- Back up and restore the CA.
Manage client-computer and server certificates. Considerations include SMIME, EFS, exporting, and storage.
- Publish certificates through Active Directory.
- Issue certificates using MMC, Web enrollment, programmatic, or auto enrollment using Windows XP.
- Recover KMS-issued keys.
Manage and troubleshoot EFS. Considerations include domain members, workgroup members, and client-computer operating systems.
Configure and manage auditing. Considerations include Windows Events, Internet Information Services (IIS), firewall log files, Network Monitor Log, and RAS log files.
- Manage audit log retention.
- Manage distributed audit logs by using EventComb.
Analyze security events. Considerations include reviewing logs and events.
Respond to security incidents. Incidents include hackers, viruses, denial-of-service (DoS) attacks, natural disasters, and maintaining chains of evidence.
- Isolate and contain the incident. Considerations include preserving the chain of evidence.
- Implement counter measures.
- Restore services.