[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z] CA [See certification authority] cable plants as risk factors securing cables as risk factors securing transmissions cameras , securing data centers with 2nd CAPI (Cryptographic API) requesting certificates and writing custom PKI-aware software CAPICOM (CAPI Component Object Model) card key systems controlling security vulnerabilities 2nd CDPs (CRL distribution points) choosing for private certification hierarchies configuring for root CA publishing CRL of offline root CA centralizing remote access authentication Cert Publishers group Certificate Export Wizard certificate hierarchy certificate policy (CP), constructing certificate practice statement (CPS), constructing certificate revocation lists [See CRLs] certificate rules best practices suggest using creating new rules for identifying applications Certificate Services issuing email certificates with in Windows Server 2003 certificate templates 2nd configuring digital signature certificates configuring encryption certificates certificate-based authentication, configuring IPSec for certificates 2nd [See also private certification hierarchies] archiving private keys and 2nd backing up private keys and benefits of deploying client certificates distributing enrollment applications expiration dates of exporting to floppy disks without private keys formatting importing received certificates issued by certification authorities origins of processing requests for publishing requesting supported by Windows Server 2003 for IPSec communication types of Windows Certificates snap-in Certificates MMC snap-in 2nd certification authority commercial vendors configurable certificate templates and configuring clients to trust your certificates functions of how it works improvements to private processing requests for certificates public requesting certificates from role separation and sending digitally signed email using your own certification authority certificates certification hierarchies choosing between public/private CAs private [See private certification hierarchies] CGI (Common Gateway Interface) applications, supported by IIS checklist, security checksum identifying applications using sending digitally signed email used with signed code cipher.exe /w command 2nd clearing full security logs client autoenrollment , obtaining certificates using client certificates, deploying client interactions with servers (DHCP) clock synchronization, maximum tolerance for Code Red (Internet worm) commercial certification authorities Compatible Workstation Security template compatws.inf template computer accounts Account Policies at OU level Active Directory and cleaning up, if stale deploying software with GPOs computer certificates computer clock synchronization, maximum tolerance for computers, stolen configuration context (Active Directory forest) 2nd Configure Automatic Updates setting containers vs. OUs (organizational units) contiguous namespace of Active Directory trees CP (certificate policy), constructing CPS (certificate practice statement), constructing CRL distribution points (CDPs) choosing for private certification hierarchies configuring for root CA publishing CRL of offline root CA CRLs (certificate revocation lists) architecture of delta CRLs expiration dates of implementing a public PKI importing publishing 2nd for offline root CA 2nd how often two-tier vs. three- tier PKI cryptographic accelerators vs. hardware security modules (HSMs) Cryptographic API (CAPI) requesting certificates and writing custom PKI-aware software cryptographic hardware for private certification hierarchies cryptography key-based shared secret keys smart cards and |