MCSE Designing Security for a Windows Server 2003 Network: Exam 70-298
Chapter 1: Designing a Secure Network Framework
- Table 1.1: Hardware Requirements for Windows Server 2003
- Table 1.2: ksetup Parameters for UNIX Kerberos Integration
Chapter 2: Securing Servers Based on Function
- Table 2.1: Comparison of Client and Server Authentication Settings in Group Policy
- Table 2.2: Comparison of the secure*.inf and hisec*.inf Predefined Security Templates
- Table 2.3: Strong Password Requirements
- Table 2.4: Active Directory Client Services Extensions Features
- Table 2.5: Security Analysis Results Icons
- Table 2.6: secedit.exe configure Switch Parameters
- Table 2.7: secedit Security Areas Descriptions
- Table 2.8: secedit.exe Analyze Switch Parameters
- Table 2.9: secedit.exe Import Switch Parameters
- Table 2.10: secedit Export Switch Parameters
- Table 2.11: secedit generaterollback Switch Parameters
- Table 2.12: gpupdate Switch Parameters
- Table 2.13: Managing Anonymous Access in Windows Server 2003
- Table 2.14: Securing Infrastructure Servers Best Practices
- Table 2.15: Encryption Levels in Terminal Services
- Table 2.16: Remote Access Policy Encryption Options
- Table 2.17: Summary of Services for Server Roles
- Table 2.18: Server Roles and Recommended Security Templates
Chapter 4: Securing the Network Management Process
- Table 4.1: Domain Functional Levels Within Windows Server 2003
- Table 4.2: Controllers Supported by Different Forest Functional Levels
Chapter 5: Securing Network Services and Protocols
- Table 5.1: IPSec Encryption Algorithms
- Table 5.2: IPSec Hash Algorithms
- Table 5.3: IPSec Authentication Methods
- Table 5.4: Diffie-Hellman Groups
- Table 5.5: Comparison of Authentication Header and Encapsulated Security Payload Protocol s
- Table 5.6: AH Header Description
- Table 5.7: Encapsulated Security Payload Header Descriptions
- Table 5.8: Predefined IPSec Policies
- Table 5.9: Security Negotiation Order of Preference
- Table 5.10: Security Methods for the Require Security Setting
- Table 5.11: New IPSec Features in Windows Server 2003
- Table 5.12: Filter List and Filter Actions Recommendations
- Table 5.13: Commonly Used TCP and UDP Ports
- Table 5.14: Common Threats to DNS
- Table 5.15: Securing the DNS Server Service
- Table 5.16: Default Users, Groups, and Permissions for the DNS Server Service on a Domain Controller
- Table 5.17: Default Users, Groups, and Permissions for DACLs in Active Directory-Integrated Zones
- Table 5.18: Default DNS Resource Record Permissions for Users and Groups in Active Directory
- Table 5.19: Server Message Block Signing Options
- Table 5.20: Common Threats to Wireless Networks
- Table 5.21: WLAN Network Infrastructure Requirements
- Table 5.22: Computer-Based Authentication Scenarios
Chapter 9: Securing Network Resources
- Table 9.1: Benefits and Limitations of User/ACL Method
- Table 9.2: Benefits and Limitations of the Account Group/ACL Method
- Table 9.3: Benefits and Limitations of the AG/RG Method
- Table 9.4: Benefit and Limitations of Role-Based Authorization Method
- Table 9.5: Logon Event IDs and Descriptions
- Table 9.6: Privilege Use Event IDs
- Table 9.7: cipher.exe Command-Line Switches
- Table 9.8: Safeguarding Your Systems
- Table 9.9: Best Practices for Backups
- Table 9.10: Disaster Recovery Best Practices
- Table 9.11: Firmware Console Redirection
- Table 9.12: Windows Components that Support Console Redirection
- Table 9.13: Securing Emergency Management Services Out-of-Band Connections
- Table 9.14: Recovery Console Environment Variables
Chapter 10: Securing Network Clients
- Table 10.1: The Microsoft Security Bulletin Classification System
- Table 10.2: Key Differences between SUS and SMS
- Table 10.3: Remote Access Conditions