Exam Objectives in this Chapter:
■ Plan security templates based on computer role. Computer roles include Microsoft SQL Server computer, Microsoft Exchange Server computer, domain controller, Internet Authentication Service (IAS) server, and Internet Information Services (IIS) server.
■ Configure additional security based on computer roles. Server computer roles include SQL Server computer, Exchange Server computer, domain controller, Internet Authentication Service (IAS) server, and Internet Information Services (IIS) server. Client computer roles include desktop, portable, and kiosk.
□ Plan and configure security settings.
□ Plan network zones for computer roles.
□ Plan and configure software restriction policies.
□ Plan security for infrastructure services. Services include Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS).
□ Plan and configure auditing and logging for a computer role. Considerations include Windows Events, IIS, firewall log files, Netlog, and Remote Access Service (RAS) log files.
□ Analyze security configuration. Tools include Microsoft Baseline Security Analyzer (MBSA), the MBSA command-line tool, and Security Configuration And Analysis.
Was this article helpful?
Turbocharge Your Traffic And Profits On Auto-Pilot. Would you like to watch visitors flood into your websites by the 1,000s, without expensive advertising or promotions? The fact is, there ARE people with websites doing exactly that right now. How is that possible, you ask? The answer is Advanced SEO Techniques.