Protect Your Windows Network: From Perimeter to Data

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

UMO (useless management overhead)

unbelieveable software claims 2nd

uninstalling

        unnecessary components 2nd 3rd

uniqueness (of keys)

universal groups

UNIXdependencies 2nd

unnecessary components, uninstalling 2nd 3rd

unnecessay features, disabling

unnecessay interfaces, blocking 2nd

unsafe security settings

        troubleshooting

unsolicited ARP requests

unused components (turning off functionality)

update.exe tool

updates

        applications

        rollup

       security

                testing 2nd 3rd

                tools 2nd 3rd

        WSUS (Windows Software Update Services)

updating

       automatic updates

                controlling

                enabling

       software

                controlling automatic updating

                for small businesses 2nd

UPP ( user password policy)

URL Scan (IIS)

usability

        security management 2nd

USB (universal serial bus)

        diabling

useless management overhead (UMO)

user password policy (UPP)

usernames

        storage

users

        anonymous restrictions 2nd 3rd 4th

       applications

                patches 2nd 3rd

                running as nonadmin 2nd

       security

                exploits against 2nd

                involvement vs. influence 2nd

                protecting 2nd 3rd 4th 5th 6th 7th 8th

                social engineering 2nd 3rd 4th 5th 6th 7th

                value of passwords 2nd

                vulnerabilities 2nd

utility

Категории