Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Securing Windows NT/2000 Servers for the Internet

Securing Windows NT/2000 Servers for the Internet

List Price: $29.95
Your Price: $19.77
Product Info Reviews

<< 1 2 >>

Rating: 5 stars
Summary: Excellent for *nix Admins needing to secure WinNT/2000
Review: As a Solaris/Linux admin, I had no clue how to secure a windows machine. I knew to turn off services I recognized but that is about it. Since we only really use NT for the PDC, the file server, and internal groupware client- I really was not interested in pouring over documentation to secure these boxes. I have too much to do in keeping the frontline unix boxes secure.
Norberg introduces the architecture and services and othter things that I really did not know about. He then gives practical suggestions on how to lock down the server. He does state that this is a for a bastion host, so that rules out a web server anyway.
However, this book explains the services and what would need turned off, you can then modify this to your needs.
This book is a must for any Unix admin that needs to learn about WinNt and security for it. I give this book five stars for being exactly what it says it is.

Rating: 4 stars
Summary: An important resource
Review: As network security becomes more and more important, it's nice to see something very specific to Windows NT/2000. Yes, this is a book for specific architecture, but actually would be a very good resource if you are moving into the Windows area especially from an UNIX background. What you take away more than anything else from the book is that the only way to be really secure is to close almost everything, and that's what the author shows. Their setup is an ideal world - a server dedicated to just being secure with some services, and you are shown step by step what is good to have on and what is not.

It is important more so because it gives you a reference point to learn more and try to close holes that you can. There are often a number of services and potential entrance points that are left open by default, or may be open, but you are not using them. So close 'em! You may not be 100% secure then, but 50% secure is better than open and flapping to the digital world.

The book is the kind you skim from cover to cover, then go back and read what you want to know more about, and return to it again and again as reference. It has been invaluable to my knowledge and has given me starting off points to pursue specific areas of security. I hope the book is updated when .NET starts to really spread out. Until then, this helps point us to where we can put up more defense. Knowledge is your best tool to fight insecurity, and this is an excellent tool in your kit.

Rating: 4 stars
Summary: A must for any Windows NT/2k admin wanting to stay employed
Review: I am a senior engineer for network security operations. I read "Securing Windows NT/2000 Servers for the Internet" (SWNS) to better advise clients on secure configuration of their Windows platforms. Stefan's wonderful book is a testament to the fundamental insecurity of stock Windows platforms. Luckily, his advice transforms vulnerable systems into bastion hosts suitable for deployment on the hostile Internet.

SWNS' key insight is the need to cripple many default Windows services in the interest of security. These troublesome "features" include NetBIOS, the Workstation service, the Server service, and others. In fact, after creating a bastion host, Stefan says "there's no way of administering it remotely!" (This is the case because NT's standard remote admin tools, like Event Viewer and Server Manager, require RPC using NetBIOS.) Thankfully, Stefan provides several options for secure remote administration, like pcAnywhere, Windows 2000 Terminal Services, and open source alternatives (Secure Shell, Virtual Network Computer, etc.)

I concur with an earlier review noting the lack of attention for Microsoft's IIS web server. Hundreds of thousands of Windows machines were recently compromised by the "Code Red" worm, demonstrating two facts. First, Windows is frequently used to host web servers. Second, IIS is frequently deployed insecurely. A second edition of SWNS should add a chapter on configuring IIS. I was also unhappy with Stefan's dismissal of intrusion detection technology in chapter six. He should try the Windows port of the open source Snort IDS.

Overall, SWNS is a must-buy for Windows administrators. The book is a quick read, but it explains many aspects of the internal workings of Microsoft's premier operating systems. As the title implies securing "servers" and not just the underlying operating system, future editions should discuss proper deployment of popular applications for Windows NT/2000, like IIS and Exchange.

Rating: 4 stars
Summary: A must for any Windows NT/2k admin wanting to stay employed
Review: I am a senior engineer for network security operations. I read "Securing Windows NT/2000 Servers for the Internet" (SWNS) to better advise clients on secure configuration of their Windows platforms. Stefan's wonderful book is a testament to the fundamental insecurity of stock Windows platforms. Luckily, his advice transforms vulnerable systems into bastion hosts suitable for deployment on the hostile Internet.

SWNS' key insight is the need to cripple many default Windows services in the interest of security. These troublesome "features" include NetBIOS, the Workstation service, the Server service, and others. In fact, after creating a bastion host, Stefan says "there's no way of administering it remotely!" (This is the case because NT's standard remote admin tools, like Event Viewer and Server Manager, require RPC using NetBIOS.) Thankfully, Stefan provides several options for secure remote administration, like pcAnywhere, Windows 2000 Terminal Services, and open source alternatives (Secure Shell, Virtual Network Computer, etc.)

I concur with an earlier review noting the lack of attention for Microsoft's IIS web server. Hundreds of thousands of Windows machines were recently compromised by the "Code Red" worm, demonstrating two facts. First, Windows is frequently used to host web servers. Second, IIS is frequently deployed insecurely. A second edition of SWNS should add a chapter on configuring IIS. I was also unhappy with Stefan's dismissal of intrusion detection technology in chapter six. He should try the Windows port of the open source Snort IDS.

Overall, SWNS is a must-buy for Windows administrators. The book is a quick read, but it explains many aspects of the internal workings of Microsoft's premier operating systems. As the title implies securing "servers" and not just the underlying operating system, future editions should discuss proper deployment of popular applications for Windows NT/2000, like IIS and Exchange.

Rating: 4 stars
Summary: A must for any Windows NT/2k admin wanting to stay employed
Review: I am a senior engineer for network security operations. I read "Securing Windows NT/2000 Servers for the Internet" (SWNS) to better advise clients on secure configuration of their Windows platforms. Stefan's wonderful book is a testament to the fundamental insecurity of stock Windows platforms. Luckily, his advice transforms vulnerable systems into bastion hosts suitable for deployment on the hostile Internet.

SWNS' key insight is the need to cripple many default Windows services in the interest of security. These troublesome "features" include NetBIOS, the Workstation service, the Server service, and others. In fact, after creating a bastion host, Stefan says "there's no way of administering it remotely!" (This is the case because NT's standard remote admin tools, like Event Viewer and Server Manager, require RPC using NetBIOS.) Thankfully, Stefan provides several options for secure remote administration, like pcAnywhere, Windows 2000 Terminal Services, and open source alternatives (Secure Shell, Virtual Network Computer, etc.)

I concur with an earlier review noting the lack of attention for Microsoft's IIS web server. Hundreds of thousands of Windows machines were recently compromised by the "Code Red" worm, demonstrating two facts. First, Windows is frequently used to host web servers. Second, IIS is frequently deployed insecurely. A second edition of SWNS should add a chapter on configuring IIS. I was also unhappy with Stefan's dismissal of intrusion detection technology in chapter six. He should try the Windows port of the open source Snort IDS.

Overall, SWNS is a must-buy for Windows administrators. The book is a quick read, but it explains many aspects of the internal workings of Microsoft's premier operating systems. As the title implies securing "servers" and not just the underlying operating system, future editions should discuss proper deployment of popular applications for Windows NT/2000, like IIS and Exchange.

Rating: 4 stars
Summary: Great server security info here for smaller environments
Review: I have been waiting for a book like this for quite a while. For anyone interested in securing W2k Internet servers this book has some excellent advice. The networking security tips are particularly useful and relevant. I was disappointed that there was not more IIS specific security information, given that most W2K servers on the Internet are running IIS. Also, as the author himself points out, much of the changes he is proposing to harden servers are not practical in an enterprise-sized environment. By hardening servers as he describes you loose much of the scalable administration NT and W2K where built around. I would not want to implement the majority of these changes on a production environment of more than 30 or so servers for that reason. I also would not put pcanywhere on any production server as a way to get around just having disabled the functionality of the native remote administration tools. Having said all that, buy this book if you are responsible for securing your Microsoft servers. There is enough great information here to make it well worth it.

Rating: 4 stars
Summary: Great server security info here for smaller environments
Review: I have been waiting for a book like this for quite a while. For anyone interested in securing W2k Internet servers this book has some excellent advice. The networking security tips are particularly useful and relevant. I was disappointed that there was not more IIS specific security information, given that most W2K servers on the Internet are running IIS. Also, as the author himself points out, much of the changes he is proposing to harden servers are not practical in an enterprise-sized environment. By hardening servers as he describes you loose much of the scalable administration NT and W2K where built around. I would not want to implement the majority of these changes on a production environment of more than 30 or so servers for that reason. I also would not put pcanywhere on any production server as a way to get around just having disabled the functionality of the native remote administration tools. Having said all that, buy this book if you are responsible for securing your Microsoft servers. There is enough great information here to make it well worth it.

Rating: 5 stars
Summary: Required reading for all NT/2000 Administrator
Review: I run an ASP based on NT and 2000 servers. This book provides real solutions to help minimize your risk of your servers being hacked. I would also recommed the book as a good start for hardening internal file/print/db servers in your corporate LAN/WAN.

Rating: 5 stars
Summary: Very highly recommended for systems administrators
Review: In Securing Windows NT/2000 Servers For The Internet, Stefan Norberg is designed to assist the experienced users of Windows NT/2000 to protect their computers from Internet intrusion, sabotage, information theft, and other unwanted encroachments. Very highly recommended for systems administrators and the non-specialist general users concerned with security issues, Securing Windows NT/2000 Servers For The Internet covers every aspect of building Windows 2000 security systems is comprehensively presented.

Rating: 5 stars
Summary: Excellent NT/2000 Security Resource
Review: Stefan Norberg wrote one of the first good securing NT documents that were available on the Internet. This book takes that paper to the next level. I have read and researched quite a bit on securing NT/2000 and from what I've read so far (not quite done yet), I consider this one of the best resources. The section on installing SSH on NT is extremely helpful for those who have not tackled that beast before. Norberg's original paper was considered by many (including myself) to be essential reading for anyone concerned with NT/2000 security. This book is even better and should be a part of the library of any responsible NT/2000 admin.


<< 1 2 >>

© 2004, ReviewFocus or its affiliates