Protect Your Windows Network: From Perimeter to Data
Index
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]
SafeDllSearchMode 2nd 3rd 4th sahres built-in 2nd salting SAM (security accounts manager) SBS (Small Business Server) scanners patches vulnerability scanning patches scans SYN SCE (Security Configuration Editor) 2nd 3rd 4th SCM (Services Control Manager) screened subnets scripting XSS (cross-site scripting) scripts cross-site scripting 2nd PUBLIC persmissions 2nd SCW (Security Configuration Wizard) SeBCAK (security between chair and keyboard) secedit.exe tool second-level zombies secrets LSA 2nd 3rd SecurID security 10 immutable laws of 2nd 3rd 4th 5th 6th 7th applications baselining systems 2nd 3rd 4th evaluating reviewing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th awareness 2nd bulletins registering for client tweaks anonymous restrictions blank passwords enabling auditing 2nd LAN Manager authentication liniting malicious code 2nd password policies removable media SafeDllSearchMode 2nd 3rd 4th SMB message signing configuration false information about guides 2nd 3rd 4th 5th 6th 7th tools 2nd 3rd 4th databases troubleshooting 2nd dependencies [See dependencies] descriptors ACLs (access control lists) 2nd 3rd 4th 5th 6th 7th EFS 2nd firewalls configuring for small businesses 2nd for small businesses [See computers;small businesses] groups reviewing guides applying necessity of high 2nd HTML e-mail 2nd information security [See information security] management administrator responsibilities receiving feedback 2nd 3rd 4th 5th usability 2nd vendor design tradeoffs 2nd 3rd 4th 5th 6th MBSA (Microsoft Baseline Security Analyzer) objectives passgen tool passwords 2nd applying 2nd 3rd 4th 5th 6th 7th 8th 9th attacks 2nd 3rd 4th 5th 6th 7th best practices 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th management 2nd 3rd 4th 5th 6th 7th 8th 9th multifactor authenticaiton 2nd overview of 2nd 3rd policies patches [See patches] penetration tests physical [See physical security] security tweaks 2nd policies [See also policies] analyzing security needs 2nd 3rd 4th 5th 6th 7th 8th 9th creating awareness of 2nd developing enforcing 2nd failure of identifying threats modifying necessity of structure of 2nd process service accounts 2nd 3rd 4th 5th stored procedures 2nd 3rd tweaks anonymous restrictions 2nd 3rd 4th audit settings 2nd avoiding 2nd defense in depth model 2nd IPsec filters LAN Manager authentication 2nd LM hash value storage 2nd necessity of 2nd number of settings 2nd password policies 2nd physical security 2nd restricted groups 2nd restricting access SMB message signing 2nd SRPs (software restriction policies) 2nd stopping worms/viruses TCP hardening 2nd updates testing 2nd 3rd tools 2nd 3rd users exploits against 2nd involvement vs. influence 2nd protecting 2nd 3rd 4th 5th 6th 7th 8th social engineering 2nd 3rd 4th 5th 6th 7th value of passwords 2nd vulernabilities 2nd VPN clients WLANs (wireless LANs) 2nd security accounts manager (SAM) security administration 2nd security administrators security associations security between chair and keyboard (SeBCAK) Security Configuration Editor [See SCE] Security Configuration Wizard [See SCW] Security Guidance Center security identifier (SID) SeDebugPrivilege segmentation network threat modeling processes 2nd 3rd selection of access controls (physical security) 2nd 3rd of firewalls 2nd 3rd 4th 5th 6th of passwords 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th of patch management solutions senior management [See also management] security policies servers applications analyzing 2nd ASR (attack surface reduction) 2nd 3rd 4th 5th 6th 7th removing service privileges 2nd 3rd back-end structure of enforcement Exchange Server Best Practices Analyzer Tool for small businesses protecting 2nd storing client information on 2nd 3rd IPsec protecting 2nd ISA (Internet Security and Acceleration) Server privileges proxy dependencies SBS (Small Business Server) SQL Server customizing authentication 2nd dropping stored procedures 2nd 3rd hardening 2nd IIS (Internet Information Services) securing service accounts 2nd 3rd 4th 5th VPN placement of Windows Server 2003 VPN quarantine 2nd serves DNS lookup requests service level agreement (SLA) troubleshooting Service Pack 1 Service Pack 2 service packs 2nd Windows XP Service Pack 2 services accounts dependencies 2nd securing 2nd 3rd 4th 5th ACS (Audit Collection Services) administrative security dependencies mitigating 2nd 3rd 4th 5th 6th 7th Alerter ASR (attack surface reduction) blocking unnecessay interfaces 2nd disabling unnecessay features uninstalling unnecessary components 2nd 3rd Messenger MSN Bill Payer privileges removing 2nd 3rd Web-based protecting Services Control Manager (SCM) sessions null 2nd 3rd 4th 5th 6th showaccs.exe tool SID (security identifier) SLA (service level agreement) troubleshooting slipstreaming 2nd 3rd 4th 5th 6th 7th small business computers applying anti-spyware/antivirus software 2nd configuring firewalls 2nd controlling automatic updating protecting 2nd 3rd 4th updating software 2nd data protection 2nd networks securing WLANs (wireless LANs) 2nd selecting passwords 2nd servers protecting 2nd storing client information on 2nd 3rd Web sites navigating safely 2nd Small Business Server (SBS) smart cards SMB message signing 2nd reflection attacks SMB message signing SMB Message Signing switches, enabling Smith, Ben SMS (Microsoft Systems Management Server) sniffers packets sniffing 2nd social engineering 2nd 3rd 4th 5th 6th 7th SOCKS 2nd software firewalls 2nd for small businesses applying anti-spyware/antivirus software 2nd configuring firewalls 2nd controlling automatic updating updating 2nd software restriction policies [See SRPs] malicious code limiting software restriction policies (SRPs) source code release of Microsoft spoofing preventing 2nd spyware anti-spyware software applying 2nd blocking SQL injection 2nd 3rd 4th 5th 6th input validations 2nd 3rd SQL (Structured Query Language) injection SQL Security.com (http://www.sqlsecurity.com) SQL Server hardening 2nd customizing authentication 2nd dropping stored procedures 2nd 3rd securing service accounts 2nd 3rd 4th 5th IIS (Internet Information Services) SRPs (software restriction policies) 2nd SRPS (software restriction policies) SSCP (system sensitivity classification policy) SSL transactions stacks networks RRAS with ISA Servers installed starting service accounts startup keys, enabling 2nd storage client information on servers 2nd 3rd passwords 2nd 3rd 4th 5th 6th 7th 8th stored procedures dropping 2nd 3rd strengthening passwords STRIDE structure of security policies 2nd structure of applications and back-end servers substitution (of passwords) supplicants supportability SYN scans SYSKEY system administration 2nd system sensitivity classification policy (SSCP) systems analyzing existing baselining 2nd 3rd 4th hiding LM hash value storage 2nd quarantine 2nd 3rd 4th 5th rights management 2nd 3rd 4th
|