×

Uh-oh, it looks like your Internet Explorer is out of date.

For a better shopping experience, please upgrade now.

CYA Securing IIS 6.0
     

CYA Securing IIS 6.0

5.0 1
by Chris Peiris, Ken Schaefer, Bernard Cheah (Editor)
 

A highly portable, easily digestible road-map to configuring, maintaining and troubleshooting essential IIS 6.0 features.The book is organized around the 15 "MMCs" (Microsoft Management Consoles) that contain the configuration menus for the essential features. The options within each menu are explained clearly, potential problems are identified up-front, and

Overview

A highly portable, easily digestible road-map to configuring, maintaining and troubleshooting essential IIS 6.0 features.The book is organized around the 15 "MMCs" (Microsoft Management Consoles) that contain the configuration menus for the essential features. The options within each menu are explained clearly, potential problems are identified up-front, and configurations are subsequently presented in the aptly named "By the Book" section for that MMC. Readers will also appreciate the "Reality Check" sidebars througout, which present valuable cost/benefit analyses of situations where there is no single "right" answer.

• A checklist for network engineers and administrators to make sure they have configured you network professionally and responsibily
• The information needed by networking professionals responsible for configuring, maintaining and troubleshooting Microsoft's Internet Information Server 6.0
• Cleeraly and concisly identifies those features of IIS that represent the highest risk factors for attacks

Editorial Reviews

bn.com
The Barnes & Noble Review
In Windows Server 2003, the IIS 6.0 web server is switched off by default, for security reasons. But if you’ve got to turn it on and use it, you’ve got some hardening to do. The fastest solution: Buy this book and do what it tells you.

Start by hardening Windows Server itself (including oft-neglected steps like protecting log files so crackers can’t hide). Learn how to install IIS with only the services you need; configure MIME types and IP address restrictions; set up SSL and authentication; secure FTP, NNTP, and POP3 or SMTP mail services, WebDAV, FrontPage extensions, and more.

With checklists throughout -- and “reality checks” that reveal some crucial gotchas -- this book will be pretty much indispensable to working IIS 6.0 administrators. Bill Camarda

Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2003 and Upgrading & Fixing Networks for Dummies, Second Edition.

Product Details

ISBN-13:
9781931836258
Publisher:
Elsevier Science
Publication date:
05/01/2004
Pages:
352
Product dimensions:
0.86(w) x 6.00(h) x 9.00(d)

Related Subjects

Customer Reviews

Average Review:

Post to your social network

     

Most Helpful Customer Reviews

See all customer reviews

Cya Securing Iis 6.0 5 out of 5 based on 0 ratings. 1 reviews.
Guest More than 1 year ago
Most people in the business world are likely familiar with the term ¿CYA¿, which is exactly what this book is designed to do. The authors intend that reading this book will give IIS administrators the information they need to keep their networks secure, and hence keep their jobs. This is the first CYA book I¿ve read, and I was quite impressed by the nice balance between providing enough useful information without overkill. The book is designed to get right to the point by showing (not telling) exactly what is required in securing an IIS 6 installation. Each chapter is focused on a specific section of IIS security. Chapters cover topics as varied as Basic IIS security, Advanced IIS security, monitoring, and general Server 2003 hardening. Each chapter contains the some information on the Microsoft recommended procedure for the particular practice (what the authors call ¿By the Book¿). Additionally, you will find many sections throughout the book labeled ¿Realty Check¿, which is designed to highlight how to either do something different from what Microsoft recommends or what some of the problems associated with the recommended procedure might be. Finally, ¿Notes from the Underground¿ popup frequently, which help illustrate how hackers might utilize poor security around the illustrated practice in order to gain something. I found the chapters to be well laid-out, easy to follow, and right to the point. This book helped provide some real insight to various security practices around IIS, and was quite interesting to read as well. This book is a must-have if you are responsible for monitoring or maintaining IIS 6 in your infrastructure. I am definitely looking forward to reading the next in the series of CYA books!