2803: Microsoft Security Guidance Training III (1 Day)
About This Clinic
This one-day instructor-led clinic builds on existing knowledge of server and client security and provides students with the knowledge and skills to apply security best practices for Microsoft Exchange Server and to use Microsoft Internet Security and Acceleration (ISA) Server 2004 to improve security at the network perimeter. It also provides students with prescriptive guidance to implement layered defenses against malicious software and measures to increase security for Microsoft Windows 98 and Windows NT 4.0 network clients.
Attendees will be current IT professionals with experience using Microsoft Windows 2000 Server or Microsoft Windows Server 2003 and with knowledge of Microsoft Active Directory concepts. Students will also benefit from experience with Microsoft ISA Server 2000. The students will be in an environment where they are responsible for aspects of security management and deployment associated with their internal network infrastructure and Internet or intranet services.
At Clinic Completion
After completing this clinic, students will be able to:
- Describe how to deploy a secure Exchange Server 2003 infrastructure. This includes:
- Describing deployment scenarios for implementing a secure Exchange Server environment
- Hardening and securing Exchange Server services and messaging protocols
- Maintaining security on Exchange Server 2003 by using various administration tools
- Configuring Exchange Server to prevent unwanted e-mail
- Describe how to implement ISA Server to increase the security of perimeter networks. This includes:
- Describing how to implement ISA Server 2004 in a variety of perimeter network configurations
- Describing the firewall functionality that ISA Server 2004 provides and how to implement this functionality
- Implementing secure Internet client access to an organization’s internal servers using ISA Server 2004
- Implementing secure Internet client access to an organization’s Exchange servers using ISA Server 2004; and learning real-world strategies for patch management and network security and how to troubleshoot problems with existing security configurations
- Describe general planning considerations for deploying a defense against malicious software (malware) for client computers, servers, and the network infrastructure. This includes:
- Describing the importance of implementing a defense-in-depth solution to defend against malware
- Creating and implementing a strategy to secure client computers against malware
- Creating and implementing a strategy to secure servers against malware
- Creating and implementing a strategy to secure the network infrastructure against malware
- Describe strategies for hardening legacy clients and servers to reduce as much as possible the risk to computers running WindowsNT and Windows98. This includes:
- Understanding how to defend a Windows NT-based network against threats.
- Understanding how to defend computers running Windows NT against threats
- Understanding how to defend Windows 98 clients and the limitations of Windows 98 clients
Module 1: Implementing Exchange Server Security
This session describes how to deploy a more secure Exchange Server 2003 infrastructure. This session also describes how to increase the security of e-mail that flows through an organization’s Exchange servers. As well, this session describes how to configure Exchange Server 2003 to reduce the amount of unwanted e-mail using Exchange Server 2003 features such as Real Time Block List support and Intelligent Message Filtering.
- Implementing Exchange Server
- Securing Exchange Server Services and Messaging Protocols
- Maintaining Security on Exchange Server
- Configuring Exchange to Protect Against Unwanted E-Mail
Module 2: Securing the Network Perimeter with ISA Server 2004
This session describes how ISA Server 2004 can provide a complete security solution to help protect the network perimeter from the Internet, remote users, and remote network segments. The session demonstrates how ISA Server 2004 can enhance security for internal servers and external-facing resources such as Exchange Server or Internet Information Services, and also how ISA Server can operate as a virtual private networking server for more secure remote access to the internal network.
- Introduction to ISA Server 2004
- Securing Access to Internal Servers
- Implementing Application and Web Filtering
- Securing Access to Exchange Server
- Virtual Private Networking with ISA Server 2004
Module 3: Defense in Depth Against Malicious Software
Malicious software has become increasingly advanced; worms and viruses can propagate more quickly and evade detection more effectively. This session describes how a defense-in-depth approach to antivirus solution design can help protect various components of a computing infrastructure from malicious software attacks, including client computers, servers and networking devices. The session also covers how to implement an effective outbreak control and recovery plan, and how to identify, contain and remedy the effects of malicious software.
- Understanding the Characteristics of Malicious Software
- Malware Defense-in-Depth
- Malware Defense for Client Computers
- Malware Defense for Servers
- Network-Based Malware Defense
- Malware Outbreak Control and Recovery
Module 4: Threat Mitigation for Windows 98 and Windows NT 4.0
While migration to a newer platform is recommended, many customers have key business applications that will only run on legacy operating systems. This session provides prescriptive information on hardening legacy Windows clients and servers, with the goal to reduce the risk of Windows NT and Windows 98 systems as much as possible. This session also provides guidance on how to increase security when upgrading to newer operating systems.
- Mitigating Threats for Windows NT Networks
- Mitigating Threats for Computers Running Windows NT
- Mitigating Threats for Windows 98 Clients
- Migrating from Legacy Systems
Before attending this clinic, students must have:
- Understanding of network security essentials
- Hands-on experience with Windows NT 4.0, Windows2000, or WindowsServer 2003
- Experience with Active Directory and Group Policy
- Hands-on experience with Exchange Server2003
- Basic knowledge of Internet Security and Acceleration (ISA) Server200