Securing Windows Server 2003

     
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z]

EAP (Extensible Authentication Protocol)

eavesdropping (electronic), protecting from 2nd

educating

        employees about security

        users about traveling with laptops

Effective Permissions tab

EFS (Encrypting File System)

        benefits of

        configuring with Group Policy

        correct use of

        data recovery strategies

        drawbacks of

        laptop security and

        new files, encrypting

        protecting data with

        using with NTFS

        in Windows Server 2003 2nd

                improvements to

electronic eavesdropping, protecting from 2nd

email

       attachments

                refrain from opening

                use caution when opening

        configuring secure email clients

        enrolling clients for certificates

        issuing certification authority certificates

        secure [See secure email]

emergency response working groups

employees as risk factors

encapsulating HTTP requests

Encapsulating Security Payload (ESP) protocol 2nd

Encrypting File System [See EFS]

encryption

        configuring certificate templates

        data directories

        downsides to using in email

        protecting sensitive data 2nd

        protocols 2nd

        providing secure email

        public key cryptography and

        sending digitally signed email

        sending email using

        shared secret key cryptography and

        signed code and

        Syskey utility

        vs. signing packets

end-entity (personal) certificates

enforcement mechanisms

enrolling

        for certificates

        users of smart cards

enrollment officers

Enterprise Admins group

enterprise CA (certification authority)

Enterprise Server Edition of Windows Server 2003, security enhancements in

Equifax certification authority

ESP (Encapsulating Security Payload) protocol 2nd

event logs used for auditing 2nd 3rd

        clearing when full 2nd

        configuring

        not practical for DNS activities

        verifying IPSec operation

        viewing events of Active Directory management

Event Viewer tool

EventComb tool

Everyone group, disallowing anonymous logon

expiration dates of certificates and CRLs

exporting certificates without private keys

Extensible Authentication Protocol (EAP)

extensible database (Active Directory)

 

Категории