Download presentation
Presentation is loading. Please wait.
Published byNathaniel Newton Modified over 9 years ago
2
Module 3 l Objectives –Identify the security risks associated with specific NT Services –Understand the risk introduced by specific protocols –Identify ways to strengthen the defensive rings against an outside threat
3
Rings Of Defense
4
Module 3 –Services –Protocols –Trust Relationships –NT Domains Overview
5
Network and Domain Security l Least Service Rule l Run As Who?
6
Network Security l NetBEUI l NetBios l NWLink IPX/SPX l TCP/IP
7
Network Security l Protocol Isolation –Service –Gateway l TCP/IP Security –Port Filtering
8
Firewall or Proxy Server
9
Binding Relationships WorkstationServer WS SVR WSSVR IPX/SPX TCP/IP IPX/SPX
10
l “Planning and administration of a secure system still has to be done by humans, and even in a highly trusted system such as Windows NT, security it is not automatic. It is still the system administrator who is responsible for implementing an organization’s security policy.” Network and Domain Security
11
Domain Security l Identify the preferred way of networking and authenticating NT and it’s users l Understand the risks and benefits of Trust Relationships l Understand the proper use of Global and Local Groups l Understand network authentication Overview (Part 2)
12
l Domain Models l Single Domain Model l Single Master Domain Model l Multiple Master Domain Model Domain Security
16
l Trusted Domains l Types of Trusts Resource Master Domain Security
17
Notes Only
18
l Trusted Domain l Trusting Domain Network and Domain Security
19
l DC Accounts l Local Accounts l Domain Accounts l Domain Admins l Domain Users l Domain Guests Domain Security
20
l Global Groups l Local Groups Domain Security
21
l Logging On To Domains l Discovery l Secure Channels l Pass-Through Authentication Domain Security
22
l Security l Threats l Countermeasures Network and Domain Security
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.