Tham khảo sách 'security operations guide for windows 2000 server', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả | Microsoft Prescriptive Guidance Security Operations Guide for Windows 2000 Server Information in this document including URL and other Internet Web site references is subject to change without notice. Unless otherwise noted the example companies organizations products domain names e-mail addresses logos people places and events depicted herein are fictitious and no association with any real company organization product domain name e-mail address logo person place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright no part of this document may be reproduced stored in or introduced into a retrieval system or transmitted in any form or by any means electronic mechanical photocopying recording or otherwise or for any purpose without the express written permission of Microsoft Corporation. Microsoft may have patents patent applications trademarks copyrights or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft the furnishing of this document does not give you any license to these patents trademarks copyrights or other intellectual property. 2002 Microsoft Corporation. All rights reserved. Microsoft MS-DOS Windows Windows NT and Active Directory are either registered trademarks or trademarks of Microsoft Corporation in the United States and or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Contents Chapter 1 Introduction 1 Microsoft Operations Framework MOF . 2 Get Secure and Stay Secure. 3 Get Secure. 3 Stay Secure. 3 Scope of this Guide. 3 Chapter Outlines. 6 Chapter 2 Understanding Security Risk. 6 Chapter 3 Managing Security with Windows 2000 Group Policy. 6 Chapter 4 Securing Servers Based on Role. 6 Chapter 5 Patch Management . 7 Chapter 6 Auditing and Intrusion .