Securing Windows Server 2003

     
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [X] [Z]

TCP/IP port filtering, configuring

TCP/IP stack and IIS (Internet Information Services)

TechNet, decrypting descriptions for logged entries

technology-based security mechanisms

telephone lines

        as risk factors

        controlling security vulnerability for

templates, security [See security templates]

temporary remote access

TGTs (ticket-granting tickets)

        accessing resources on file servers

        forwardable tickets

theft of computers, reality of

ticket-granting tickets (TGTs)

        accessing resources on file servers

tickets

        forwardable

       maximum life for

                renewals of user tickets

                service tickets

                user tickets

        proxiable

tokens, security

traffic, network [See network traffic]

transitive trusts

        Active Directory

        Windows NT

transmissions, securing

Transport Layer Security (TLS) and public key encryption

traveling with laptops, educating users about

trees (Active Directory)

triple-DES (3DES) encryption algorithm

trojan horses, installed by unsigned code

trust relationships, securing

trusted forests

trusted root certificates

Trusted Root Certification Authorities store

trusts

        Active Directory

        Windows NT

two-way trusts (Active Directory)

 

Категории