๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Windows 2000 security: A postmortem analysis

โœ Scribed by E.Eugene Schultz


Publisher
Elsevier Science
Year
2004
Tongue
English
Weight
192 KB
Volume
2004
Category
Article
ISSN
1353-4858

No coin nor oath required. For personal study only.

โœฆ Synopsis


W2K certainly does not lack in the number of new (relative to WNT) security features it offers. Among the most important of these include:

Active Directory

Active Directory provides directory services that allow users and applications to find and access files, folders, applications, services and printers, no matter where they reside within a network. Active Directory serves as a repository for information concerning user and service accounts, groups, Organizational Units (OUs) (Note 1), Group Policy Objects (GPOs-to be covered shortly), domains and trust relationships between them, network properties, services, and many aspects of computer and network operations. Active Directory also distributes this information to users and applications, updating it whenever needed. From a security perspective, Active

Multiple methods of encrypting network traffic

W2K supports two versions of the Point-to-Point Tunneling Protocol (PPTP) as well as Secure Sockets Layer (SSL)/Transport Layer Security (TLS), IPsec and Layer Two Tunneling Protocol (L2TP) encryption of data sent over networks.


๐Ÿ“œ SIMILAR VOLUMES


Security and Windows 2000: Part 1
โœ Alison Webb ๐Ÿ“‚ Article ๐Ÿ“… 2002 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 303 KB
Security and Windows 2000: Part 2
โœ Alison Webb ๐Ÿ“‚ Article ๐Ÿ“… 2002 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 457 KB
Distributed security services in Microso
โœ Glenn Pittaway ๐Ÿ“‚ Article ๐Ÿ“… 1999 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 253 KB

## Report highlights tions. The distributed engines are managed centrally by a single console where the notifications are displayed and where selected tailor-made security policies are pushed down to the engines. Both packet headers as well as payload can be subject to closer scrutiny to detect a