A highly portable, easily digestible road-map to configuring, maintaining and troubleshooting essential IIS 6.0 features.The book is organized around the 15 "MMCs" (Microsoft Management Consoles) that contain the configuration menus for the essential features. The options within each menu are explained clearly, potential problems are identified up-front, and configurations are subsequently presented in the aptly named "By the Book" section for that MMC. Readers will also appreciate the "Reality Check" sidebars througout, which present valuable cost/benefit analyses of situations where there is no single "right" answer.
• A checklist for network engineers and administrators to make sure they have configured you network professionally and responsibily
• The information needed by networking professionals responsible for configuring, maintaining and troubleshooting Microsoft's Internet Information Server 6.0
• Cleeraly and concisly identifies those features of IIS that represent the highest risk factors for attacks
|Product dimensions:||0.86(w) x 6.00(h) x 9.00(d)|
Table of Contents
Coverage includes: Script Source Access, Information Disclosure, Denial of Service, Buffer Overflows, Directory Traversal, Cross-Site Scripting, Preparing the Operating System, Partitioning Hard Drives, Installing the OS, Preparing the File System, Installing IIS, Installing Hotfixes, Locking Down COM and Database Access, Securing Web Services, Running the IIS Lockdown Wizard, Securing IIS Global Settings, Securing the Default and Administration Web Sites, Disabling Internet Printing, Disabling or Securing the FrontPage Server Extensions, Configuring URLScan, Securing Web Sites, Building a Directory Structure, Setting Master WWW Properties, Securing by Content Type, Authenticating Users, Using Anonymous Authentication, Using Basic Authentication, Using Digest Authentication, Using Integrated Windows Authentication, Using Client Certificate Mapping, Publishing Web Content, Staging and Review, Setting File Attributes, Building File Checksums, Moving Content versus Updating Content, Summary, Solutions Fast Track, Frequently Asked Questions
Most Helpful Customer Reviews
Most people in the business world are likely familiar with the term ¿CYA¿, which is exactly what this book is designed to do. The authors intend that reading this book will give IIS administrators the information they need to keep their networks secure, and hence keep their jobs. This is the first CYA book I¿ve read, and I was quite impressed by the nice balance between providing enough useful information without overkill. The book is designed to get right to the point by showing (not telling) exactly what is required in securing an IIS 6 installation. Each chapter is focused on a specific section of IIS security. Chapters cover topics as varied as Basic IIS security, Advanced IIS security, monitoring, and general Server 2003 hardening. Each chapter contains the some information on the Microsoft recommended procedure for the particular practice (what the authors call ¿By the Book¿). Additionally, you will find many sections throughout the book labeled ¿Realty Check¿, which is designed to highlight how to either do something different from what Microsoft recommends or what some of the problems associated with the recommended procedure might be. Finally, ¿Notes from the Underground¿ popup frequently, which help illustrate how hackers might utilize poor security around the illustrated practice in order to gain something. I found the chapters to be well laid-out, easy to follow, and right to the point. This book helped provide some real insight to various security practices around IIS, and was quite interesting to read as well. This book is a must-have if you are responsible for monitoring or maintaining IIS 6 in your infrastructure. I am definitely looking forward to reading the next in the series of CYA books!