You'll learn how to evaluate what's worth securing; and how to make the most of the tools Microsoft gives you. Exactly which alert settings to use in Performance Monitor. How to filter the colossal amounts of data Network Monitor gathers, so you can actually identify possible security breaches. Using NT's audit tools (many sysadmins don't bother, because of the performance hit, but this book makes sensible recommendations about which settings offer the most bang for the buck).
The authors' expertise shows in even small details. Like including a legal notice on your logon dialog box warning that only authorized users may enter. (Did you know that some companies couldn't prosecute hackers because, instead of including a legal notice, they displayed a welcome banner?)
An incredibly valuable appendix contains a detailed matrix of baseline security settings for every virtually element of an NT system, from accounts and user properties, to file permissions and registry settings. There are separate sets of settings for domain controllers, file/print servers, database servers, web servers, RAS servers, and workstations. Start your customization from the settings in this appendix, and you can dramatically upgrade your network's security without having to learn every tiny piece of NT minutiae. For NT managers and admins, this book is as "must-have" as they come.