Module 3 l Objectives –Identify the security risks associated with specific NT Services –Understand the risk introduced by specific protocols –Identify ways to strengthen the defensive rings against an outside threat
Rings Of Defense
Module 3 –Services –Protocols –Trust Relationships –NT Domains Overview
Network and Domain Security l Least Service Rule l Run As Who?
Network Security l NetBEUI l NetBios l NWLink IPX/SPX l TCP/IP
Network Security l Protocol Isolation –Service –Gateway l TCP/IP Security –Port Filtering
Firewall or Proxy Server
Binding Relationships WorkstationServer WS SVR WSSVR IPX/SPX TCP/IP IPX/SPX
l “Planning and administration of a secure system still has to be done by humans, and even in a highly trusted system such as Windows NT, security it is not automatic. It is still the system administrator who is responsible for implementing an organization’s security policy.” Network and Domain Security
Domain Security l Identify the preferred way of networking and authenticating NT and it’s users l Understand the risks and benefits of Trust Relationships l Understand the proper use of Global and Local Groups l Understand network authentication Overview (Part 2)
l Domain Models l Single Domain Model l Single Master Domain Model l Multiple Master Domain Model Domain Security
l Trusted Domains l Types of Trusts Resource Master Domain Security
Notes Only
l Trusted Domain l Trusting Domain Network and Domain Security
l DC Accounts l Local Accounts l Domain Accounts l Domain Admins l Domain Users l Domain Guests Domain Security
l Global Groups l Local Groups Domain Security
l Logging On To Domains l Discovery l Secure Channels l Pass-Through Authentication Domain Security
l Security l Threats l Countermeasures Network and Domain Security