Protect Your Windows Network: From Perimeter to Data

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

SafeDllSearchMode 2nd 3rd 4th

sahres

        built-in 2nd

salting

SAM (security accounts manager)

SBS (Small Business Server)

scanners

        patches

        vulnerability

scanning

        patches

scans

        SYN

SCE (Security Configuration Editor) 2nd 3rd 4th

SCM (Services Control Manager)

screened subnets

scripting

        XSS (cross-site scripting)

scripts

        cross-site scripting 2nd

        PUBLIC persmissions 2nd

SCW (Security Configuration Wizard)

SeBCAK (security between chair and keyboard)

secedit.exe tool

second-level zombies

secrets

        LSA 2nd 3rd

SecurID

security

        10 immutable laws of 2nd 3rd 4th 5th 6th 7th

       applications

                baselining systems 2nd 3rd 4th

                evaluating

                reviewing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th

        awareness 2nd

        bulletins

                registering for

       client tweaks

                anonymous restrictions

                blank passwords

                enabling auditing 2nd

                LAN Manager authentication

                liniting malicious code 2nd

                password policies

                removable media

                SafeDllSearchMode 2nd 3rd 4th

                SMB message signing

       configuration

                false information about guides 2nd 3rd 4th 5th 6th 7th

                tools 2nd 3rd 4th

       databases

                troubleshooting 2nd

       dependencies [See dependencies]

       descriptors

                ACLs (access control lists) 2nd 3rd 4th 5th 6th 7th

        EFS 2nd

       firewalls

                configuring for small businesses 2nd

       for small businesses [See computers;small businesses]

       groups

                reviewing

       guides

                applying

                necessity of

        high 2nd

        HTML e-mail 2nd

       information security [See information security]

       management

                administrator responsibilities

                receiving feedback 2nd 3rd 4th 5th

                usability 2nd

                vendor design tradeoffs 2nd 3rd 4th 5th 6th

        MBSA (Microsoft Baseline Security Analyzer)

        objectives

        passgen tool

        passwords 2nd

                applying 2nd 3rd 4th 5th 6th 7th 8th 9th

                attacks 2nd 3rd 4th 5th 6th 7th

                best practices 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

                management 2nd 3rd 4th 5th 6th 7th 8th 9th

                multifactor authenticaiton 2nd

                overview of 2nd 3rd

                policies

       patches [See patches]

        penetration tests

       physical [See physical security]

                security tweaks 2nd

        policies [See also policies]

                analyzing security needs 2nd 3rd 4th 5th 6th 7th 8th 9th

                creating awareness of 2nd

                developing

                enforcing 2nd

                failure of

                identifying threats

                modifying

                necessity of

                structure of 2nd

        process

        service accounts 2nd 3rd 4th 5th

        stored procedures 2nd 3rd

        tweaks

                anonymous restrictions 2nd 3rd 4th

                audit settings 2nd

                avoiding 2nd

                defense in depth model 2nd

                IPsec filters

                LAN Manager authentication 2nd

                LM hash value storage 2nd

                necessity of 2nd

                number of settings 2nd

                password policies 2nd

                physical security 2nd

                restricted groups 2nd

                restricting access

                SMB message signing 2nd

                SRPs (software restriction policies) 2nd

                stopping worms/viruses

                TCP hardening 2nd

       updates

                testing 2nd 3rd

                tools 2nd 3rd

       users

                exploits against 2nd

                involvement vs. influence 2nd

                protecting 2nd 3rd 4th 5th 6th 7th 8th

                social engineering 2nd 3rd 4th 5th 6th 7th

                value of passwords 2nd

                vulernabilities 2nd

        VPN clients

        WLANs (wireless LANs) 2nd

security accounts manager (SAM)

security administration 2nd

security administrators

security associations

security between chair and keyboard (SeBCAK)

Security Configuration Editor [See SCE]

Security Configuration Wizard [See SCW]

Security Guidance Center

security identifier (SID)

SeDebugPrivilege

segmentation

        network threat modeling processes 2nd 3rd

selection

        of access controls (physical security) 2nd 3rd

        of firewalls 2nd 3rd 4th 5th 6th

        of passwords 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

        of patch management solutions

senior management [See also management]

        security policies

servers

        applications

                analyzing 2nd

                ASR (attack surface reduction) 2nd 3rd 4th 5th 6th 7th

                removing service privileges 2nd 3rd

       back-end

                structure of

        enforcement

        Exchange Server Best Practices Analyzer Tool

       for small businesses

                protecting 2nd

                storing client information on 2nd 3rd

        IPsec protecting 2nd

        ISA (Internet Security and Acceleration) Server

        privileges

       proxy

                dependencies

        SBS (Small Business Server)

       SQL Server

                customizing authentication 2nd

                dropping stored procedures 2nd 3rd

                hardening 2nd

                IIS (Internet Information Services)

                securing service accounts 2nd 3rd 4th 5th

       VPN

                placement of

       Windows Server 2003

                VPN quarantine 2nd

serves

       DNS

                lookup requests

service level agreement (SLA)

        troubleshooting

Service Pack 1

Service Pack 2

service packs 2nd

        Windows XP Service Pack 2

services

        accounts

                dependencies 2nd

                securing 2nd 3rd 4th 5th

        ACS (Audit Collection Services)

       administrative security dependencies

                mitigating 2nd 3rd 4th 5th 6th 7th

        Alerter

        ASR (attack surface reduction)

                blocking unnecessay interfaces 2nd

                disabling unnecessay features

                uninstalling unnecessary components 2nd 3rd

        Messenger

        MSN Bill Payer

       privileges

                removing 2nd 3rd

       Web-based

                protecting

Services Control Manager (SCM)

sessions

        null 2nd 3rd 4th 5th 6th

showaccs.exe tool

SID (security identifier)

SLA (service level agreement)

        troubleshooting

slipstreaming 2nd 3rd 4th 5th 6th 7th

small business

       computers

                applying anti-spyware/antivirus software 2nd

                configuring firewalls 2nd

                controlling automatic updating

                protecting 2nd 3rd 4th

                updating software 2nd

        data protection 2nd

       networks

                securing WLANs (wireless LANs) 2nd

                selecting passwords 2nd

       servers

                protecting 2nd

                storing client information on 2nd 3rd

       Web sites

                navigating safely 2nd

Small Business Server (SBS)

smart cards

SMB

        message signing 2nd

        reflection attacks

SMB message signing

SMB Message Signing switches, enabling

Smith, Ben

SMS (Microsoft Systems Management Server)

sniffers

        packets

sniffing 2nd

social engineering 2nd 3rd 4th 5th 6th 7th

SOCKS 2nd

software

        firewalls 2nd

       for small businesses

                applying anti-spyware/antivirus software 2nd

                configuring firewalls 2nd

                controlling automatic updating

                updating 2nd

software restriction policies [See SRPs]

       malicious code

                limiting

software restriction policies (SRPs)

source code

        release of Microsoft

spoofing

        preventing 2nd

spyware

       anti-spyware software

                applying 2nd

        blocking

SQL

        injection 2nd 3rd 4th 5th 6th

        input validations 2nd 3rd

SQL (Structured Query Language)

        injection

SQL Security.com (http://www.sqlsecurity.com)

SQL Server

        hardening 2nd

                customizing authentication 2nd

                dropping stored procedures 2nd 3rd

                securing service accounts 2nd 3rd 4th 5th

        IIS (Internet Information Services)

SRPs (software restriction policies) 2nd

SRPS (software restriction policies)

SSCP (system sensitivity classification policy)

SSL

        transactions

stacks

        networks

        RRAS

        with ISA Servers installed

starting

        service accounts

startup keys, enabling 2nd

storage

        client information on servers 2nd 3rd

        passwords 2nd 3rd 4th 5th 6th 7th 8th

stored procedures

        dropping 2nd 3rd

strengthening passwords

STRIDE

structure

        of security policies 2nd

structure of applications and back-end servers

substitution (of passwords)

supplicants

supportability

SYN scans

SYSKEY

system administration 2nd

system sensitivity classification policy (SSCP)

systems

        analyzing existing

        baselining 2nd 3rd 4th

        hiding

        LM hash value storage 2nd

        quarantine 2nd 3rd 4th 5th

        rights management 2nd 3rd 4th

Категории