Protect Your Windows Network: From Perimeter to Data
Index
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]
acceptable use policy (AUP) acces remote protecting perimeters 2nd 3rd access anonymous restictions 2nd 3rd 4th controls (physical security) 2nd 3rd 4th 5th GUIs LUA (least user access) 2nd restriction network threat modeling processes 2nd 3rd 4th 5th rogue applying 802.1X 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th enabling IPsec 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th layer 2/3 protection 2nd 3rd 4th network quarantine systems 2nd 3rd 4th 5th preventing 2nd sniffing 2nd Web 2nd access control lists [See ACLs] access control lists (ACLs) best practices 2nd 3rd 4th layers 2nd security descriptors 2nd 3rd 4th 5th 6th 7th access masks accounts administrative security 2nd 3rd 4th 5th mitigating services 2nd 3rd 4th 5th 6th 7th IDS lockout passwords logon events services ASR (attack surface reduction) 2nd 3rd 4th 5th 6th 7th securing 2nd 3rd 4th 5th SRPs (software restriction policies) 2nd ACKnowledge packets ACLs (access control lists) 2nd best practices 2nd 3rd 4th layers 2nd security descriptors 2nd 3rd 4th 5th 6th 7th acocunts services dependencies 2nd ACS (Audit Collection Services) active administrative dependency [See also dependencies] active attacks [See also attacks] active-automated attacks active-manual attacks AdAware Address Resolution Protocol (ARP) attacks 2nd addresses ranges 2nd spoffing preventing 2nd administration [See management] administrative security dependencies 2nd 3rd 4th 5th mitigating services 2nd 3rd 4th 5th 6th 7th administrator password policy (APP) administrators passwords configuring 2nd 3rd 4th 5th 6th responsibilities ADS (Automated Deployment Services) Advanced Encryption Standard (AES) adware AES (Advanced Encryption Standard) agent-based enumeration agents recovery AH (Authentication Header) ALE (annualized loss expectancy) Alerter service algorithms crypto troubleshooting 2nd analysis environments 2nd Exchange Server Best Practices Analyzer Tool existing systems hacking 2nd MBSA (Microsoft Baseline Security Analyzer) of penetration tetsing 2nd 3rd of security needs 2nd 3rd 4th 5th 6th 7th 8th 9th penetration tests threats 2nd 3rd 4th annualized loss expectancy (ALE) anonymous connections (null sessions) anonymous restrictions 2nd 3rd 4th 5th anti-malware limiting malicious code anti-spyware software, applying 2nd antivirus policy (AVP) antivirus software applying 2nd API (application programming interface) null sessions APP (administrator password policy) application programming interface (API) null sessions application-filtering firewalls 2nd applications analyzing 2nd ASR (attack surface reduction) blocking unnecessay interfaces 2nd disabling unnecessay features uninstalling unnecessary components 2nd 3rd data-protection mechanisms incorporating into 2nd exposed (on hosts ) for small businesses applying anti-spyware/antivirus software 2nd configuring firewalls 2nd controlling automatic updating updating 2nd functionality restricting browser 2nd 3rd 4th turning off 2nd 3rd hiding LUA (least user access) running as 2nd patch states patches 2nd 3rd security baselining systems 2nd 3rd 4th evaluating reviewing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th servers services removing privileges 2nd 3rd spyware structure of updates version information 2nd Web IIS (Internet Information Services) applying 802.1X 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th anti-spyware/antivirus software 2nd firewalls 2nd 3rd 4th 5th 6th IPsec 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th passwords 2nd 3rd 4th 5th 6th 7th 8th 9th security guides ARP (Address Resolution Protocol) attacks 2nd ASR (attack surface reduction) 2nd 3rd 4th 5th 6th 7th assessment penetration tests associations (security) atatcks DoS (denial-of-service) attachments management 2nd 3rd attack surface reduction (ASR) 2nd 3rd 4th 5th 6th 7th attackers Warez attacks ARP (Address Resolution Protocol) 2nd cached credentials casual attackers cross-site scripting 2nd damage (types of) 2nd 3rd DDoS detecting DoS protecting availability elevation-of-privilege hacking analyzing 2nd cleaning atatckers 2nd detecting initial compromise of 2nd elevating privileges 2nd 3rd footprinting networks 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th null sessions 2nd 3rd 4th 5th 6th taking over 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th passwords 2nd 3rd 4th 5th 6th 7th penetration testing [See penetration testing] reflection spoofing preventing 2nd target networks hacking types of 2nd 3rd 4th AU (Automatic Update) 2nd Audit Collection Services (ACS) audit settings 2nd auditing enabling 2nd full privilege audits CrashOnAuditFail AUP (acceptable use policy) authentication challenge-response transactions 2nd 3rd 4th LAN Manager 2nd 3rd mutual passwords 2nd applying 2nd 3rd 4th 5th 6th 7th 8th 9th attacks 2nd 3rd 4th 5th 6th 7th best practices 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th management 2nd 3rd 4th 5th 6th 7th 8th 9th multifactor authenticaiton 2nd overview of 2nd 3rd policies physcial security SQL Server IIS (Internet Information Services) SQL Servers customizing 2nd troubleshooting Authentication Header (AH) authenticity authorization automated attacks worms Automated Deployment Services [See ADS] Automatic Update [See AU, updates] automatic updates controlling enabling availability protecting 2nd 3rd avoiding hacking viruses AVP (antivirus policy) awareness (security) 2nd awareness of security policies, creating 2nd
|