Table of Contents
Introduction xix 
Chapter 1 Understanding Core Security Principles 1
 Understanding Risk 1
 Exploring the Security Triad 4
 Protecting Against Loss of Confidentiality 5
 Protecting Against Loss of Availability 5
 Protecting Against Loss of Integrity 6
 Implementing a Defense-in-Depth Security Strategy 7
 Enforcing the Principle of Least Privilege 9
 Hardening a Server 10
 Reducing the Attack Surface 11
 Keeping a System Updated 14
 Enabling the Firewall 16
 Installing Antivirus Software 16
 The Essentials and Beyond 16
 Chapter 2 Understanding Malware and Social Engineering 19
 Comparing Malware 19
 Viruses 21
 Worms 22
 Trojan Horses 23
 Buffer-Overflow Attacks 25
 Spyware 26
 Understanding the Threat 27
 Protecting Against Malware 28
 Using Antivirus Software 29
 Using Microsoft Security Essentials on Desktops 31
 Thwarting Social-Engineering Attacks 34
 Social Engineering in Person 34
 Social Engineering with a Phone Call 34
 Recognizing Phishing Attempts 35
 Recognizing Pharming 38
 Protecting Email 39
 The Essentials and Beyond 41
 Chapter 3 Understanding User Authentication 43
 Comparing the Three Factors of Authentication 44
 Using Passwords for Authentication 45
 Comparing Password Attack Methods 45
 Creating Strong Passwords 47
 Enforcing Strong Passwords 49
 Exploring Account Lockout Policies 51
 Unlocking an Account 53
 Resetting a Password 55
 Changing a Password 57
 Creating a Password-Reset Disk 58
 Using Smart Cards and Token Devices for Authentication 59
 Using Biometrics for Authentication 60
 Starting Applications with Run As Administrator 61
 Preventing Time Skew with Kerberos 63
 Identifying RADIUS Capabilities 64
 Identifying Unsecure Authentication Protocols 65
 LM 66
 NTLM (NTLMv1) 66
 The Essentials and Beyond 67
 Chapter 4 Securing Access with Permissions 69
 Comparing NTFS Permissions 69
 Identifying Basic NTFS Permissions 70
 Identifying Advanced NTFS Permissions 71
 Combining Permissions 75
 Enabling and Disabling Permission Inheritance 76
 Moving and Copying Files 79
 Comparing NTFS and FAT 81
 Exploring Share Permissions 81
 Identifying Share Permissions 83
 Combining NTFS and Share Permissions 85
 Identifying Active Directory Permissions 87
 Viewing Active Directory Users and Computers 87
 Comparing NTFS and Active Directory Permissions 88
 Viewing Active Directory Permissions 88
 Assigning Registry Permissions 91
 The Essentials and Beyond 93
 Chapter 5 Using Audit Policies and Network Auditing 95
 Exploring Audit Policies 96
 Exploring Object Access Auditing 99
 Comparing Account Logon and Logon Events 101
 Exploring Directory Service Access Auditing 102
 Understanding Account Management Auditing 103
 Understanding System Events Auditing 103
 Understanding Privilege Use Auditing 104
 Understanding Policy Change Auditing 105
 Understanding Process Tracking 105
 Enabling Auditing 105
 Enabling Object Access Auditing 107
 Enabling Directory Service Access Auditing 108
 Viewing Audit Information 110
 Managing Security Logs 111
 Saving Audit Information 113
 Securing Audit Information 113
 Auditing a Network with MBSA 114
 Installing MBSA 116
 Running MBSA 116
 The Essentials and Beyond 117
 Chapter 6 Protecting Clients and Servers 121
 Understanding User Account Control 122
 Understanding the Dimmed Desktop 123
 Modifying User Account Control 123
 Keeping Systems Updated 125
 Updating Systems with Automatic Updates 126
 Updating Systems with WSUS or SCCM 128
 Using Group Policy to Configure Clients 129
 Protecting Clients 130
 Understanding Offline Folders 130
 Encrypting Offline Folders 132
 Using Software-Restriction Policies 133
 Protecting Servers 135
 Using Separate VLANs 136
 Separating Services 136
 Using Read-Only Domain Controllers 139
 Exploring DNS Security Issues 140
 Protecting Against Email Spoofing with SPF Records 141
 Understanding Dynamic Updates 141
 Using Secure Dynamic Updates 142
 The Essentials and Beyond 144
 Chapter 7 Protecting a Network 147
 Identifying Common Attack Methods 147
 Denial of Service 148
 Distributed Denial of Service 149
 Sniffing Attack 149
 Spoofing Attack 151
 Port Scan 151
 Exploring Firewalls 153
 Comparing Hardware-Based and Software-Based Firewalls 154
 Comparing UTMs and SCMs 155
 Isolating Servers on Perimeter Networks 157
 Using Honeypots 159
 Isolating a Network with NAT 159
 Exploring Network Access Protection 159
 Understanding NAP Components 160
 Evaluating Client Health with VPN Enforcement 162
 Using Other NAP Enforcement Methods 163
 Identifying NAP Requirements 163
 Identifying Protocol Security Methods 164
 IPsec 165
 Comparing Tunneling Protocols 166
 DNSSEC 167
 The Essentials and Beyond 168
 Chapter 8 Understanding Wireless Security 171
 Comparing Wireless Devices 171
 Wireless Adapters 172
 Wireless Access Points 173
 Wireless Routers 173
 Comparing Wireless Security Methods 174
 Understanding Encryption Keys 175
 Wired Equivalent Privacy 175
 Wi-Fi Protected Access 176
 Wi-Fi Protected Access Version 2 177
 Extended Authentication Protocol 178
 Viewing Windows 7 Wireless Settings 179
 Configuring Wireless Routers 183
 Changing the Default Administrator Password 183
 Changing the SSID 183
 To Broadcast or Not to Broadcast 185
 Using MAC Filters 187
 Configuring Windows 7 for Wireless 189
 The Essentials and Beyond 190
 Chapter 9 Understanding Physical Security 193
 Comparing Site Security and Computer Security 194
 Understanding the Importance of Physical Security 194
 Controlling Physical Access 196
 Using Switches Instead of Hubs 199
 Using Group Policy to Enhance Computer Security 200
 Understanding Default GPOs 200
 Designing OUs and GPOs to Manage Users and Computers 201
 Creating OUs in a Domain 202
 Moving Objects into an OU 203
 Creating GPOs to Manage Users and Computers 203
 Understanding Security Settings in a GPO 204
 Disabling Log On Locally with Group Policy 206
 Controlling Removable Storage Access with Group Policy 209
 Exploring Mobile Device Security 211
 Protecting Mobile Devices Against Malware 212
 Minimizing Risks with Bluetooth Devices 212
 The Essentials and Beyond 213
 Chapter 10 Enforcing Confidentiality with Encryption 215
 Comparing Encryption Methods 216
 Understanding Symmetric Encryption 216
 Exploring AES 218
 Understanding Asymmetric Encryption 219
 Using Certificates to Share Public Keys 222
 Understanding Hashing 223
 Securing Email 225
 Encrypting Email 226
 Digitally Signing Email 228
 Understanding EFS 231
 Encrypting and Decrypting Files with EFS 232
 Understanding the Recovery Agent 233
 Understanding Behavior When Files Are Moved or Copied 233
 Exploring BitLocker Drive Encryption 235
 Understanding BitLocker Requirements 235
 Understanding Recovery Keys 236
 Using BitLocker To Go 237
 The Essentials and Beyond 238
 Chapter 11 Understanding Certificates and a PKI 241
 Understanding a Certificate 241
 Comparing Public and Private Keys 243
 Understanding Certificate Errors 245
 Viewing Certificate Properties 248
 Exploring the Components of a PKI 251
 Understanding the Certificate Chain 252
 Comparing Certificate Services 254
 The Essentials and Beyond 255
 Chapter 12 Understanding Internet Explorer Security 257
 Exploring Browser Settings 257
 Understanding IE Enhanced Security Configuration 259
 Selecting Cookies Settings 260
 Manipulating the Pop-up Blocker 262
 Using InPrivate Filtering and InPrivate Browsing 263
 Deleting Browser History 265
 Managing Add-ons 266
 Exploring Advanced Security Settings 268
 Comparing Security Zones 269
 Using IE Tools to Identify Malicious Websites 272
 Understanding the SmartScreen Filter 272
 Modifying Protected Mode 273
 The Essentials and Beyond 273
 Appendix A Answers to Review Questions 277
 Chapter 1 277
 Chapter 2 278
 Chapter 3 278
 Chapter 4 279
 Chapter 5 280
 Chapter 6 281
 Chapter 7 282
 Chapter 8 282
 Chapter 9 283
 Chapter 10 284
 Chapter 11 285
 Chapter 12 286
 Appendix B Microsoft’s Certification Program 287
 Certification Objectives Map 288
 Index 293