Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Administering Windows Vista Security—The Big Surprises Introduction How to Keep Vista Security from Giving You a Stroke
Overview Vista Turns Out to Be More Than Just a Pretty Face. Who Knew? Meet the Coauthors What's Inside This Book Stay Up to Date with My Free Newsletter Contacting Us
Chapter 1: Administering Vista Security—The Little Surprises
Restoring the Administrator
Making Your Own Administrator Activating the Administrator Account
Power Users Are Essentially Gone "Run…" Is Off the Start Menu BOOT.INI Is Gone, BCD Is Here
BOOT.INI Review BCD Terminology Creating a Second OS Entry Understanding Vista Boot Manager Identifiers Choosing Timeout and Default OS with bcdedit
Changing the Boot Manager Timeout Changing the Default Boot Manager Entry
Changing an Entry Option Cleaning Up: Deleting OS Entries
"Documents and Settings" Is Gone, Kind Of IPv6 and Network Properties Remote Desktop Gets a Bit More Secure
NTFS and the Registry Are Transaction Based Undelete Comes to Windows for Real!
Changes in Security Options
Changes to Named Pipe Access Changes to Share and Registry Access LM Deemphasized, NTLMv2 Emphasized No More Unsigned Driver Warnings
Encryption News
Vista Includes New Cryptographic Services You Can Encrypt Your Pagefile Offline Files Folders Are Encrypted per User
New Event Viewer
XML Format Comes to Event Viewer Custom Queries Lets You Customize Event Viewer Generating Actions from Events Telling the Event Log Service to Display Messages Forwarding Events from One Computer to Another Subscription Overview
Set Up the Sources Set Up the Collector
Creating an Example Subscription
Step One: Set Up Vista2 for WinRM Step Two: Create the Subscription on Vista1
Troubleshooting Subscription Delays
Adjusting the 15 Minutes Understanding the "Reboot Delay"
Event Forwarding in Workgroups
Step One: Configure WS-Management on Vista2 Step Two: Tell the Collector to Trust the Source Step Three: Test WS-Management Connectivity Step Four: Set Up the Subscription
Chapter 2: Understanding User Account Control (UAC)—"Are You Sure, Mr. Administrator?"
Introducing UAC Why UAC Is Good, after All
UAC Benefits for Users UAC Benefits for Admins UAC as a Transition Tool
An Overview of UAC Digging Deeper into UAC
How Windows Creates the Standard User Token
How Windows Vista Tokens Are Structured
Your "Name": Your Security ID (SID) Your Groups: A SID List Your Privileges: What You Can Do SeWhat? Your Windows Integrity Level
Seeing Your Token Information Summary: From Administrator to Standard User
How to Tell UAC to Use the Administrator Token
Using RunAs to Get an Administrator Token Command Prompt Window Making Elevated Windows Easier to Get To
Keep a High-Power Command Prompt Handy Make Any Icon Automatically Raise the Consent UI Sometimes Elevation Doesn't Work You Can't Get Past the Consent UI
What Tells Windows to Use the Administrator Token
Vista Looks for Installers UAC and the Vista GUI
Vista's "Alertness Warnings" UAC's Clues: Will This Need Elevation?
Vista Requests Elevation if a Manifest Requests It
What Manifests Are and What They Do Examining Manifests Adding a Manifest with a Resource Editor Adding an External Manifest Embedding a Manifest with Manifest Tool Embedding Manifests Can Break Digital Signing
The Program Compatibility Assistant Tells UAC to Elevate Application Compatibility Toolkit "Shims" Tell UAC to Elevate
Reconfiguring User Account Control
Turning UAC On, Off, or in Overdrive Configuring UAC Junior: UAC for the User Side Point: How "Administrator-ish" Must You Be to Get UACed? Excluding the Built-in Administrator Telling UAC to Skip the Heuristics Controlling Secure Desktop
Understanding the Secure Desktop Disabling Secure Desktop Enabling Applications with Secure Desktop
Sign or Go Home: Requiring Signed Applications Working around Apps That Store Data in the Wrong Places The Big Switch: Turning Off UAC Altogether
Will UAC Succeed? Summary
Chapter 3: Help for Those Lame Apps—File and Registry Virtualization
File and Registry Virtualization Basics Seeing File Virtualization in Action File and Registry Virtualization Considerations Which Areas Are Protected and Where They Are Virtualized
How Virtualization Handles Files
File Writes under Virtualization File Reads under Virtualization
How Virtualization Handles the Registry
What Does "Legacy" Mean, Exactly? Seeing Virtualization in Standard Versus Administrative Users Tracking Virtualization A Possible Virtualization Problem Controlling Virtualization The Future of Virtualization Summary
Chapter 4: Understanding Windows Integrity Control
Windows Integrity Control Overview Mandatory Controls Versus Discretionary Controls
The Orange Book C2 Certification and NT C and B: Discretionary Versus Mandatory
Discretionary Access Overview and Terminology
Parts of a Discretionary Access System "Securable Objects": What Discretionary Access Can Protect
Mandatory Access Overview and Terminology
WIC Components
WIC's Six Integrity Levels How Objects Get and Store Integrity Levels: Mandatory Labels
The SACL: It's Not Just for Audits Anymore WIC's Mandatory Labels: Lost in SACE Viewing Object Integrity Levels: Meet chml and icacls
The Tools: icacls and chml Viewing Integrity Levels with chml Viewing Integrity Levels with icacls Decoding Mandatory Labels
Changing Object Integrity Levels
The New "Modify an object label Properties" Privilege Permissions Needed to Change an Integrity Level Changing an Object's Integrity with chml Changing an Object's Integrity with icacls Testing Out WIC's Prime Directive Default Low Integrity Folders
User Integrity Levels
User Integrity Levels Depend Solely on Privileges
Where Users Store Integrity Levels Viewing User Integrity Levels
Process Integrity Levels
How Processes Get Their Integrity Levels Viewing Process Integrity Levels
Seeing Processes in Action
Setting Up Example: Starting a Low Integrity Application Internet Explorer Protected Mode and WIC A Prime Directive Puzzle: WIC and Deletes
Testing File Delete Permissions with icacls Denying File Deletes Is Different from Denying Most Things How Blocking Deletes via WIC Can Fail The Solution: Ensuring That WIC Protects Objects
Using WIC ACEs to Restrict Access Things WIC ACEs Can't Do
You Cannot Apply Mandatory Labels with Group Policy You Cannot Create Standard Permissions That Name Mandatory Labels
A Note on Modifying System Files Dialing Up Custom Labels
Meet SDDL Strings Understanding the Secret Language of Bs: SDDL Label Syntax
The SACL Designator The SACL Flags The SACE Type SACE Flags
No Flags: "Apply It to Me" CI: "Copy This to the Subfolders" OI: "Copy This to the Files" IO: "I Don't Want it, But the Kids Can Have It If They Want" NP: "Okay, the Kids Get It, but Not the Grandkids" ID: "I Didn't Start This, I Only Inherited It"
SACE Rights SACE Trustee: The Integrity Level
Using SDDL Strings to Set Integrity Levels
Summary
Chapter 5: BitLocker—Solving the Laptop Security Problem
Overview The Laptop Security Problem Today BitLocker Drive Encryption—the Overview
BitLocker Components What Is a TPM?
Full Disk Encryption
Encryption Algorithm Key Storage
Authentication or Access Control
Increasing Security with Additional Key Protectors
PINs Startup Keys
Boot Process Validation (Integrity Check)
Enabling BitLocker for the First Time Using BitLocker without a TPM
Summary of Key Protectors
Recovery
Recovery Example 1: Desktop Hardware Failure (Stand-Alone System without a TPM) Recovery Example 2: Laptop Hardware Failure (TPM-based) Recovery Example 3: Lost USB Key (Computer with a TPM) Recovery Example 4: "Found" Laptop Recovery Summary
BitLocker and Active Directory Group Policy Options Managing the TPM and BitLocker in the Enterprise Servicing a BitLocker-Protected Computer Secure Decommissioning Planning for BitLocker Deployment Summary
Chapter 6: Post-Boot Protection—Code Integrity, New Code Signing Rules, and PatchGuard
Address Space Layout Randomization Giving 64-bit More Armor
PatchGuard
Great, PatchGuard Breaks My App: What Do I Do Now? So, You Want to Disable PatchGuard
Code Integrity
What Can Go Wrong?
Troubleshooting Services Troubleshooting Drivers Troubleshooting Windows Components
New Code Signing Rules
What Is Code Signing and Why Does It Matter? ActiveX Controls Protected Media Path Requirements x64 Requirements Getting Down to Business: Code Signing an Application or Driver
Using an Internal CA Using a Commercial CA
Getting Down to Business: Deploying an Application or Driver Signed by a Publisher
Summary
Chapter 7: How Vista Secures Services
Services in Brief Service Control Manager How Vista Toughens Services: Overview Session Separation Reducing Service Privileges
Developers Can Reduce Service Privileges Admins Can Also Reduce Service Privileges Special Case: Multiple Services Needing Different Privileges Reduced Privilege Summary
Service Isolation
How Service Isolation Works Restricting a Service's SID Granting Write Permissions to a Service SID Understanding the sc.exe Restricted SID Commands
Restricting a Service's Network Ports Summary
Index
Symbols and Numbers
Index
A
Index
B
Index
C
Index
D
Index
E
Index
F
Index
G
Index
H
Index
I-J
Index
K
Index
L
Index
M
Index
N
Index
O
Index
P
Index
Q
Index
R
Index
S
Index
T
Index
U
Index
V
Index
W
Index
X-Z
List of Figures
Chapter 1: Administering Vista Security—The Little Surprises Chapter 2: Understanding User Account Control (UAC)—"Are You Sure, Mr. Administrator?" Chapter 3: Help for Those Lame Apps—File and Registry Virtualization Chapter 4: Understanding Windows Integrity Control Chapter 5: BitLocker—Solving the Laptop Security Problem Chapter 6: Post-Boot Protection—Code Integrity, New Code Signing Rules, and PatchGuard Chapter 7: How Vista Secures Services
List of Tables
Chapter 4: Understanding Windows Integrity Control Chapter 5: BitLocker—Solving the Laptop Security Problem
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion