Title: Active Directory Tip
![]() |
![]() |
![]() |
Issue Sponsored By:
> Quest Software
![]()
IN THIS ISSUE:
>
Protecting DNS servers - Part 4
>
Why protect DNS?
>
White Paper: The Windows XP/2000 Answer Book: A Complete Resource from the Desktop to the Enterprise -- Chapter 18, 'DNS'
>
Restricting cached credentials
>
Group Policy 101
![]() |
![]() |
| |
![]() |
![AD]() |
![]() |
NEW ! Active Directory Security eBook by Robert Bragg
Much has been written about how to use Active Directory to centrally manage and secure your information systems. But how do you secure Active Directory itself? In this eBook, Roberta Bragg goes beyond the basics with expert guidance on how to secure your AD infrastructure.
Get a free assessment checklist in this 5-lesson eBook format today.
|
| |
|
![]() |
![]() |
![Headlines]()
![]()
Protecting DNS servers - Part 4
[James Michael Stewart]
Last week's tip covered how to delegate DNS administration
and how to use secured routing. This week's tip will review the next two DNS security improvements: delegating DNS administration and using secured routing.
Why protect DNS?
[James Michael Stewart]
Active Directory depends upon DNS. If DNS fails, so does Active Directory. This, in turn, means that if DNS fails, your entire network may be disabled. So what will happen to AD if DNS fails? Find out in this tip.
White Paper: The Windows XP/2000 Answer Book: A Complete Resource from the Desktop to the Enterprise -- Chapter 18, 'DNS'
[John Savill]
This chapter examines installation and configuration of DNS servers on local intranets for local name resolution. You'll also get the scoop on local DNS configuration for forwarding external name resolution requests to different DNS servers. The extensive tips and notes make this interesting reading for beginners and veterans alike.
Restricting cached credentials
[James Michael Stewart]
Windows operating systems, including 2000, XP, and 2003, cache the logon credentials for the last 10 users. This allows for the user to re-logon at a later date even if the domain controller cannot be accessed at the time of logon. While this does represent a fault tolerance to DC downtime and network congestion, it is a poor state of security. Find out what the most secure settings are in this tip.
![]()
FEATURED TOPIC:
Group Policy 101
Is the vast world of Group Policies driving you crazy? You're not alone! Get the scoop from our articles, tipsters and site experts, and learn how to be a Group Policy pro.
CHAPTER OF THE WEEK:
Harden your Windows system with site expert Roberta Bragg
We all know the stuff we should be doing to keep our Windows systems safe. Unfortunately, history shows that even veteran IT pros frequently fail to actually take the simple steps required to keep intruders out. This first chapter of SearchWin2000.com site expert Roberta Bragg's acclaimed book walks through the stuff you should do, right now, to plug the worst holes in your defenses. Think you have everything covered? Don't be so
sure -- check Roberta's list and get a reality check!
TIP CONTEST:
Win an iRiver iMP 450 SlimX CD/MP3 player!
Have you been thinking about participating in one of our monthly tip contests? Start fresh in August and get your Windows-related IT tips submitted early for a crack at this month's awesome prize: an iRiver iMP 450 SlimX CD/MP3 player!
|
![]() |
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]
Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
|
|
![]() |
![]() |
Free E-Newsletters!
Select e-newsletters you would like to receive via e-mail!
|
SearchWin2000: Certification Tip |
|
![]()
|
| Not a Member? We'll activate your membership with your subscription. |
|
![]() |
![]() |
![]() |
|
![]() |
|
![]() |
|