home

Securing the Microsoft internal network
by Floydman


Computer security analyst
[email protected]

You can distribute this document freely, as long as no changes are made to the file, or as long as someone else does not pretend credit for it. All comments and suggestions about the material presented here should be directed at [email protected]. If future versions of this document include add-ons coming from other people than me, then proper credit to the various authors will be clearly identified. All version updates of this document are to be released by me.

You can find it online at
http://www.geocities.com/floydian_99
http://securit.iquebec.com

The goal of this document is to define new guidelines in order to improve the security in Microsoft Windows-based internal networks. In order to be useful in real situations, these measures have been thought in function of obtaining the lowest-cost possible approach, to prevent such a project to become financially prohibitive. Security being a field in constant evolution, it is possible that new solutions will be integrated to these presented here in the future.

Targeted audience

This document is presented to anyone who has interests in computer security, network intrusion, hacking, viruses and Trojan horses, network administration, intrusion detection and computing in general.

Table of contents

1. Introduction
2. Definition of the multi-level approach
3. Maximising antivirus protection
4. Setting up personal firewalls
5. Optimising operating system security
6. Optimising applications security
7. Deployment
8. Costs and savings
9. Integrated commercial solutions vs. independent products
10. Conclusion
Appendix A. Resources

Download whole text file here

Home
Hosted by www.Geocities.ws

1