Home

HomeContact UsSite Map

SolutionsNews and EventsPartnersServicesAbout Us


.NET Operations Guide - Table of Contents

Chapter 1: Introduction

Monitoring .NET-based Applications
Chapter 2: Application Monitoring Concepts
Chapter 3: Selecting Data Sources
Chapter 4: Instrumenting .NET-Based Applications
Chapter 5: Configuring Management Applications
Chapter 6: Notifying and Reporting

Securing .NET-Based Applications
Chapter 7: General Security Recommendations
Chapter 8: Managing Security with Windows 2000 Group Policy
Chapter 9: Securing Servers Based on Role
Chapter 10: Securing Servers Running .NET-Based Applications
Chapter 11: Network Considerations for Servers Running .NET-Based Applications
Chapter 12: Customizing the Security Environment for Specific Applications

Appendix A: Files Secured
Appendix B: Default Windows 2000 Services
Appendix C: Additional Services
Appendix D: IIS Security Settings
Chapter 1: Introduction
Welcome
Who Should Read This Book
Prerequisites
Document Conventions
How to Use This Book
Monitoring NET-Based Applications
Securing NET-Based Applications
Capacity Planning for NET-Based Applications
Microsoft Operations Framework (MOF)
MOF Information
What Are NET-Based Applications?
What Is Different About NET-Based Applications?
What Is the NET Framework?
Common Language Runtime
Defining the Business Scenario
Fitch and Mather
Sample NET-Based Application
Key Technical Issues
Technologies Used
Architectural Diagram
Environments
Network Diagram
End-User Activity
Defining Usage and Test Scenarios
Defining User Profiles
Usage and Test Scenarios
Loading Fluctuations
Summary
Appendix A - Test Scenarios
Viewing Account Information
Purchasing Stock
Selling Stock
Contents
Chapter 2: Application Monitoring Concepts
Introduction
Defining Application Health
Characteristics of Healthy Applications
Characteristics of Unhealthy Applications
Monitoring Application Health
Why Monitor Application Health?
Defining Monitoring Terminology
Tiers
Logical Divisions
Coarse-Grained and Fine-Grained Monitoring
Application Monitoring Methodology
Establishing the Monitoring Focus
Determining the Physical and Application Architectures
Identifying System Information
Building a Baseline
Augmenting the Picture
Multiple End-to-End Monitoring Techniques

Monitoring Issues
Monitoring Load
Monitoring the Common Language Runtime
Events and Metrics
Defining an Event
Event Timing
Application Errors
Memory Leaks
Common Language Runtime Errors
Application Hanging
Communication Errors
Summary
Chapter 3: Selecting Data Sources
Introduction
Monitoring with System-Provided Data
Reviewing Current Monitoring Provision
Working in Stages
Monitoring Tiers and Logical Divisions
Defining Monitoring Levels
Distinguishing Between Applications
Monitoring Logical Divisions
Monitoring IIS
Monitoring ASPNET
Monitoring NET Common Language Runtime
Monitoring NET Remoting
Monitoring Managed Code Components
Monitoring Serviced Components
Monitoring the Data Tier
Monitoring Using Synthetic Transactions
Summary
Chapter 4: Instrumenting NET-Based Applications
Chapter 5: Configuring Management Applications
Introduction
Implementing a Management Architecture
Selecting Management Applications
Understanding the Architectural Design
Reviewing Core Management Services
Customizing the Management Applications
Customizing Application Center
Customizing AppMetrics
Customizing Web Monitor
Customizing Microsoft Operations Manager
Summary
References
Chapter 6: Notifying and Reporting
Introduction
Notifications and Actions
Defining Appropriate Actions
Defining Failure Levels
Implementing Notifications
Creating a Notification Hierarchy
Using Notification Methods
Combining Notification Methods
Understanding Notification Reliability
Testing Notifications
Notification Example
Defining and Generating Reports
General Principles
Creating the Reporting Environment
Reporting on Specific NET Framework Issues
Reporting on NET-Connected Applications
Reporting on Synthetic Transactions
Reporting Resources
Reporting with Microsoft Operations Manager
Reporting with Application Center 2000
Reporting with AppMetrics
Summary
Chapter 7: General Security Recommendations
Introduction
Get Secure and Stay Secure
Get Secure
Stay Secure
Scope of this Guide
Patch Management Strategies
Determining Which Patches to Appl
Deploying Service Packs and Hot fixes
Summary
More Information
Chapter 8: Managing Security with Windows 2000 Group Policy
Introduction
Importance of Using Group Policy
How Group Policy is Applied
Group Policy Structure
Test Environment
Checking your Domain Environment
Verifying DNS Configuration
Domain Controller Replication
Centralize Security Templates
Time Configuration
Policy Design and Implementation
Server Roles
Active Directory Structure to Support the Server Roles
Importing the Security Templates
Policy Design and Implementation
Server Roles
Active Directory Structure to Support the Server Roles
Importing the Security Templates
Keeping Group Policy Settings Secure
Events in the Event Log
Verifying Policy Using Local Security Policy MMC
Verifying Policy Using Command Line Tools
Auditing Group Policy
Troubleshooting Group Policy
Resource Kit Tools
Group Policy Event Log Errors
Summary
More Information
Chapter 9: Securing Servers Based on Role
Introduction
Domain Policy
Password Policy
Account Lockout Policy
Member Server Baseline Policy
Baseline Group Policy for Member Servers
Domain Controller Baseline Policy
Domain Controller Baseline Audit and Security Options Policy
Domain Controller Baseline Services Policy
Other Baseline Security Tasks
Windows 2000 Application Server Role
Changes to the Recommended Environmen
Administration Changes
Security Modifications if MBSA is Not Implemented
Summary
More Information
Chapter 10: Securing Servers Running NET-Based Applications
Introduction
Test Environment
Securing Server Roles for NET-based Applications
Presentation Tier Server Role
Business Tier Server Role
Development Server Roles
Other Server Roles
Additional Security Measures
IIS Lockdown
ASPNET Considerations
Removing Sample Applications
File and Folder Permissions
Summary
More Information
Chapter 11: Network Considerations for Servers Running .NET-Based Applications
Defining the Network
Identifying Physical Components
Identifying Logical Components
Identify Traffic Flow
Secure Traffic Flow
Protocols to Secure Transmitted Data
Protecting Against Attack
Increase Security with ISA Server
Protecting Authentication Credentials
Available Authentication Methods
Summary
More Information
Chapter 12: Customizing the Security Environment for Specific Applications
Determining Specific Application Requirements
Using a Test Environment to Determine Requirements
Customizing Security for FMStocks
Application Center
FMStocks Security Templates
FMStocks ASPNET Configuration Files
IIS Lockdown and URLScan
Securing Network Communications for FMStocks
Summary
More Information



Download Link

Due to the proprietary nature of this document, we will need the following information from you, before we can send you the link to the download site.

Please send me the link to the .NET Operations Guide:

* First Name, Last Name:
* Job Title:
* Company Web Address :
* Business Email Address: