Learn your way! Get started

Implementing Security in Win2K3

with expert Rafiq Wayani


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 6/14/2006
Level Advanced
Runtime 8h 15m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included
Platform Internet Explorer Only


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

Implementing and Administering Security in a Windows Server 2003 Network course will give you the knowledge and skills necessary to prepare to pass Microsoft exam 70-299. This course serves as an elective course for individuals pursuing the MCSA or MCSE on Windows Server 2003 certification.

Meet the expert

Rafiq Wayani has extensive experience including more than 20 years in IT as Systems Architect, Software Engineer, DBA, and Project Manager. Wayani has instructed in a variety of technical areas, has designed and implemented network and information systems, and is certified across a wide range of platforms and systems including Microsoft Solutions Developer, Systems Engineer, Application Developer, Database Administrator, Trainer; Novell Netware Administrator and Engineer; Master Certified Netware Engineer; and A Certified.

Course outline



Module 1

Security Design (25:45)
  • Introduction (01:34)
  • Designing Security Overview (00:24)
  • Reasons to Design Security (04:40)
  • Defense in Depth (01:20)
  • Least Privilege (02:12)
  • Minimize Attack Surface (02:31)
  • Design Security (03:35)
  • Install Active Directory Demo (04:02)
  • Add Client to Domain Demo (02:33)
  • Install Adminpak.msi Demo (00:54)
  • Install gpmc.msi Demo (01:23)
  • Summary (00:31)
More on Security Design (42:04)
  • Introduction (01:05)
  • Security Implementation (01:43)
  • Network Security Overview (07:04)
  • Setup MMC with Tools (01:55)
  • Group Policy Management (00:56)
  • Enforce a Policy on Client (04:24)
  • Network Security Plan (05:00)
  • Standard Policy (01:15)
  • Suggested Policy (02:13)
  • Suggested Policy Demo (02:27)
  • Update Group Policy (02:56)
  • RunOnce Registry Key (03:42)
  • Group Policy Precedence (04:55)
  • Security Filtering Group Policy (01:44)
  • Summary (00:37)
Policies and Procedures (32:18)
  • Introduction (00:37)
  • Procedures Overview (02:08)
  • Reasons Why Policies Fail (05:14)
  • Creating Policies/Procedures (05:31)
  • Create New Policies Demo (02:50)
  • Link a GPO to an OU (00:41)
  • Allow Term. Serv./Local Login (02:30)
  • Use gupdate /force (02:48)
  • Domain vs. Local S.P. (03:48)
  • Rem. Desktop Access Demo (05:38)
  • Summary (00:27)

Module 2

Microsoft Solutions Framework (26:30)
  • Introduction (00:57)
  • MSF Overview (02:08)
  • Planning Phase (02:54)
  • Building Phase (01:19)
  • Managing Phase (04:08)
  • Building a Team (01:38)
  • Building the Extended Team (01:37)
  • Setting up a Forest Trust Demo (00:37)
  • Raise Domain Functional Level (01:10)
  • Raise Forest Functional Level (00:49)
  • Check DNS Forwarders (01:07)
  • Run the New Trust Wizard (02:14)
  • Create Other Side of Trust (01:48)
  • Confirm the Trusts (00:42)
  • Test the Trust Relationship (02:35)
  • Summary (00:39)
Plan/Configure Security (16:43)
  • Introduction (01:07)
  • Security Components (00:37)
  • Authentication (00:35)
  • Authorization (01:49)
  • Least Privilege (02:04)
  • Authentication Protocols (02:11)
  • Password Storage (01:35)
  • Auth. w/Group Policy Demo (03:08)
  • G.P. Results Wizard Demo (02:53)
  • Summary (00:38)
Plan/Config. Password Policy (33:24)
  • Introduction (00:56)
  • Passwords Overview (03:19)
  • How to Lockout Accounts (00:53)
  • Restrict Computer Access (01:06)
  • View/Set Password Policy (01:33)
  • View/Set Acct. Lockout Policy (02:44)
  • Supplemental Authentication (05:01)
  • Group Types/Scopes (01:53)
  • Restricted Group Policy (02:03)
  • View/Set Delegation (03:30)
  • View/Set Restricted G.P. (05:58)
  • Ways to Access Group Polices (00:59)
  • Set Lockout Tasks (00:27)
  • Set Audit Tasks (00:34)
  • Access Advanced Features (01:33)
  • Summary (00:47)

Module 3

Encrypted File System (EFS) (25:36)
  • Introduction (00:47)
  • Encrypted File System (02:47)
  • Common Issues (01:09)
  • Implementation (00:18)
  • Data Recovery Agent (DRA) (01:56)
  • Using EFS in Explorer (01:18)
  • Using certmgr.msc (02:39)
  • Create/Implement DRA (04:11)
  • Using cipher.exe (02:31)
  • Test DRA (00:32)
  • Important EFS Pitfall (06:25)
  • Summary (00:58)
Security Templates / Tools (30:02)
  • Introduction (00:48)
  • Apply Latest Updates Demo (02:16)
  • Configure Automatic Updates (02:25)
  • Sec. Config. and Analysis Tool (02:05)
  • Create a Security Template (00:59)
  • Resultant Set of Policy (RSoP) (03:21)
  • MS Baseline Security Analyzer (04:36)
  • Rename Admin/Guest Account (02:13)
  • Security Configuration Wizard (10:22)
  • Summary (00:50)
Securing Servers (24:16)
  • Introduction (00:53)
  • Threats to Domain Controllers (05:55)
  • Implementing Security Policies (03:12)
  • Securing Active Directory (AD) (03:04)
  • Determine if Computer is a DC (03:22)
  • Moving Active Directory Demo (02:18)
  • Use NTDSUtil (03:46)
  • Check New AD Location (00:57)
  • Summary (00:45)

Module 4

Windows Update Services (16:28)
  • Introduction (00:47)
  • Software Update Services (00:35)
  • Requirements for SUS (00:58)
  • Install SUS (03:21)
  • Configure SUS (02:09)
  • Using SSL with SUS (01:12)
  • Backup SUS (04:01)
  • Restore SUS (02:01)
  • Best Practices (01:04)
  • Summary (00:15)
IP Security (32:57)
  • Introduction (00:30)
  • IPSec Overview (01:48)
  • Securing Network Environment (00:50)
  • Create IPSec Policy on Client (02:32)
  • Create IPSec Policy on Server (04:12)
  • Manage Filter Lists/Actions (01:47)
  • Default IPSec Policies (01:03)
  • netsh tool (02:57)
  • IP Security Monitor (01:15)
  • Main Mode/Quick Mode (03:52)
  • Inet Conn. Sharing / Firewall (00:51)
  • Prohibit ICS/Firewall (02:04)
  • Routing and Remote Access (00:51)
  • Config. Routing/Rmt. Access (04:29)
  • Routing/Rmt. Enhancements (02:10)
  • Common IPSec Config Errors (01:25)
  • Summary (00:13)
Certificates (24:11)
  • Introduction (01:05)
  • Digital Certificates (01:48)
  • Contents of a Certificate (00:17)
  • Certificate Enrollment Methods (00:45)
  • Revoking Certificates (00:50)
  • Certificate Templates (00:44)
  • Certificate Keys (01:14)
  • Install Certificate Services (03:19)
  • Request a User Certificate (01:38)
  • Install a Certificate (00:18)
  • View the Certificate (01:00)
  • Revoke a Certificate (01:15)
  • Publish Revoked Certificates (00:40)
  • View Revoked Certificate List (00:56)
  • View Certificate Templates (00:32)
  • Create New Cert. Template (02:42)
  • Export a Certificate (01:47)
  • Backup Certificate Authority (01:44)
  • Restore Certificate Authority (00:54)
  • Summary (00:36)

Module 5

Secure Sockets Layer (24:39)
  • Introduction (00:38)
  • SSL Comm. Overview (04:25)
  • SSL Comm. Definition (00:33)
  • How SSL Works (03:39)
  • Private/Public Key Definition (01:44)
  • Private/Public Key Auth. (00:36)
  • Certificates Overview (03:01)
  • Symmetric Key (02:44)
  • Hash (01:19)
  • Public Key Infrastructure (PKI) (01:30)
  • Securing a Website Demo (04:08)
  • Summary (00:17)
Wireless (18:45)
  • Introduction (00:53)
  • Wireless Networks (00:39)
  • Benefits (01:25)
  • Security Threats (02:18)
  • Wireless Standards (00:59)
  • Wireless Security (01:28)
  • Wireless Network Policies (01:08)
  • View/Set Wireless Policies (04:32)
  • Setup Wireless on Client (03:31)
  • View Access Point Config. (01:16)
  • Summary (00:30)
Windows 2003 Security (41:42)
  • Introduction (00:37)
  • Securing Domain Controllers (08:00)
  • Configure Auditing (03:10)
  • Rename Admin/Guest Account (01:20)
  • Configure Event Log Settings (01:50)
  • Filter Event Logs (01:04)
  • Save a Log File (01:17)
  • Configure NTFS Security (00:36)
  • Configure Security Options (01:47)
  • Auditing Config. Guidelines (04:46)
  • DNS Overview (03:25)
  • DNS Security Options (04:00)
  • Protecting DNS Servers (02:15)
  • DNS: AD Integrated DNS (00:50)
  • DNS: Update Credentials (00:52)
  • DNS: Secure Zone Replication (00:19)
  • DNS: Prevent Auth. Access (00:52)
  • Securing DHCP Servers (04:12)
  • Summary (00:21)

Module 6

Client Security (25:59)
  • Introduction (00:43)
  • Securing Windows Clients (01:58)
  • Administrative Templates (02:31)
  • View Administrative Templates (02:14)
  • Custom Admin Templates (06:05)
  • View Custom Template Details (02:36)
  • Remove an Admin Template (00:22)
  • Admin vs. Security Templates (01:06)
  • Software Restriction Policy (01:46)
  • SRP Demo (04:36)
  • How Apps. Identify Software (00:32)
  • Considerations with SRP (01:06)
  • Summary (00:18)
Network Access - Part 1 (24:04)
  • Introduction (00:38)
  • Components (04:26)
  • Server (00:11)
  • Requirements (01:12)
  • Types of Clients (03:09)
  • Security (02:29)
  • Setup Remote Access (01:16)
  • Manage Users Permissions (02:10)
  • Config. Routing/Rmt. Access (03:47)
  • Connect through VPN (02:05)
  • Connect as a Client (00:46)
  • Failed Connect Attempt (01:31)
  • Summary (00:20)
Network Access - Part 2 (29:44)
  • Introduction (00:43)
  • VPN Connection (00:36)
  • Connection Process (01:27)
  • Components (01:39)
  • Encryption Protocols (00:18)
  • Encryption Requirements (03:23)
  • Wireless (00:54)
  • Two Modes for Wireless (01:13)
  • Wireless Components (01:27)
  • Wireless Standards (02:21)
  • 802.1x Authentication (01:01)
  • Win XP Client Config Types (01:01)
  • Determine Auth. Methods (01:23)
  • Dial-In Permissions (01:05)
  • Other Permissions (00:32)
  • Remote Access Policy (00:36)
  • Specify Rmt. Access Policies (03:12)
  • Config. Rmt. Access Logging (01:02)
  • Specify Dial-In Perm./Prop. (02:44)
  • Raise Domain/Forest Levels (02:20)
  • Summary (00:36)