Book Image

Windows Server 2019 Cookbook - Second Edition

By : Mark Henderson, Jordan Krause
Book Image

Windows Server 2019 Cookbook - Second Edition

By: Mark Henderson, Jordan Krause

Overview of this book

Do you want to get up and running with essential administrative tasks in Windows Server 2019? This second edition of the Windows Server 2019 Cookbook is packed with practical recipes that will help you do just that. The book starts by taking you through the basics that you need to know to get a Windows Server operating system working, before teaching you how to navigate through daily tasks using the upgraded graphical user interface (GUI). You'll then learn how to compose an optimal Group Policy and perform task automation with PowerShell scripting. As you advance, you’ll get to grips with faster app innovation, improved Windows security measures, and hybrid cloud environments. After you’ve explored the functions available to provide remote network access to your users, you’ll cover the new Hyper-V enhancements. Finally, this Windows Server book will guide you through practical recipes relating to Azure integration and important tips for how to manage a Windows Server environment seamlessly. By the end of this book, you’ll be well-versed with Windows Server 2019 essentials and have the skills you need to configure Windows services and implement best practices for securing a Windows Server environment.
Table of Contents (18 chapters)

Revoking a certificate

Individual certificates come and go. Most certificates last until they expire and are then renewed. Or maybe the service that was using the certificate is retired and has been turned off. But sometimes, a certificate is compromised. Maybe the private key for the certificate was uploaded to a public version control repository – in real life, this happens all the time. Maybe the private key was sent to the wrong person.

Once a certificate's private key has been compromised, that certificate can no longer be trusted. A malicious user could take that certificate and use it to 'man-in-the-middle' your previously secure SSL connection and intercept and read the sensitive traffic.

The way to limit the damage caused by this is to revoke the issued certificate. Most web browsers check something called a Certificate Revocation List (CRL) when establishing an SSL connection to check if a certificate has been revoked (in other words, blacklisted...