Apple Training Series: Mac OS X System Administration Reference, Volume 1

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Safari browsers

     as proxy client

     IP address resolution and

     on public access Mac

     provided with Mac OS X

     security preferences

salpindex

SALTED-SHA 1

Samba

SASL (Simple Authentication and Security Layer)

     adding pluggable authentication to Password Server

     Kerberos and

     single-sign on and

schema

     data structure defined by

     LDAP

     mapping with Open Directory servers

     modifying directory schema and creating new attributes

schg

scope, LDAP search parameters

SCP (Secure Copy)

screen saver passwords

scripts

     network settings and

     shell scripts

scutil

search base, LDAP 2nd

search parameters, LDAP

search protocol, LDAP

search transactions, LDAP

searches

     permissions

     policies

     text files

     vi editor

SearchNodeConfig.plist

Secure Copy (SCP)

Secure Empty Trash

secure FTP (SFTP)

secure hash algorithm (SHA) 2nd

Secure Shell. [See SSH (Secure Shell)]

Secure Sockets Layer. [See SSL (Secure Sockets Layer)]

secure.log

security

     audits

     directory services deployment and

     Kerberos multiple service integration and

     LDAP

     NFS (network file system)

     Web security preferences

Security Framework, Keychain Services in

Security pane, System Preferences

security policies

     documenting

     establishing

security, local system

     account security

     administrative access

     Apple Remote Desktop

     choosing Open Firmware password

     client network configuration

     disabling Open Firmware password

     enabling FileVault

     enabling Open Firmware passwords

     FileVault

     firewalls

     FTP access

     installation type and

     Internet Sharing

     layers of Mac OS X security model

     login process

     Mac OS 9 classic security options

     master password for resetting lost account passwords

     Open Firmware startup security

     operating system security

     other security-related settings

     package customization and

     personal file sharing

     Personal Web Sharing

     physical security

     preinstallation issues

     Printer Sharing

     references

     Remote Apple events

     Remote Login

     review

     secure Mac OS X installation

     services

     Setup Assistant and

     unattended computers

     updates and patches

     Windows Sharing

     Xgrid

security, Mac OS X

     authorization API

     breach response plan

     CDSA and

     certificate and trust management

     keychains

     Layered Services

     monitoring network

     Open Directory authorization

     overview

     policies

     references

     review

     risk analysis

     security model

     solutions

     threat levels

     user accounts and

     user needs and skills and

security, mobile

    Bluetooth. [See Bluetooth]

     choosing mobile technologies

     lesson review

     overview

     references

     risk analysis

    WLANs. [See WLANs (Wireless LANs)]

security, network

     designing secure network

     DoS (Denial of Service) attacks

     firewall address groups

     firewall rules and capabilities

     firewall setup for Mac OS X Server

     Gateway Setup Assistant for routing and NAT configuration

     host firewalls vs. network firewalls

     ipfw for showing firewall rules

     locking down access to private network services

     locking down access to public servers

     locking down and logging traffic from private network

     locking down DNS zone transfers

     locking down pings and ping replies

     locking down remote administration

     logging firewall activity

     monitoring

     NAT Services

     overview 2nd

     references

     review

     security mechanisms

     Services and Advanced Panes for firewall configuration

     stateless vs. stateful firewalls

     stealth mode, enabling

     threat assessment and

     VPN overview

     VPN services 2nd

security, network connection

     advanced SSH

     disabling root SSH logins

     enabling sshd

     network services and

     overview

     references

     replacing telnet with SSH

     review

     SCP

     sftp

     SSH and

     SSH tunneling and

     telnet for testing connectivity

     VPN authentication modes

     VPN service, connecting to

     VPN service, provided with Mac OS X Server

     VPN transport protocols

     VPNs

security, Open Firmware

     choosing Open Firmware password

     disabling Open Firmware password

     enabling Open Firmware passwords

     in Mac OS X security model

     startup security

security, Web

     overview

     proxy servers

     references

     review

     Safari on public access Macs

     server security

     setting security preferences

     setting up secure Website

     SSL for secure website

     viewing certificates

     WebDAV configuration

     WebDAV file permissions

     WebDAV realms and access

sendmail

serial port, PDA sync security options

Server Admin adding WebDAV realms

     as interface for ipfw

     backing up Open Directory master

     configuring email service

     defining Mac OS X server as a replica

     disk image of Open Directory master

     enabling firewall logging

     LDAP protocol settings

     modifying NetInfo settings

     preventing eavesdropping

     promoting standalone server to Open Directory master

     setting up address groups

     setting up secure website

     setting up trusted binding

     troubleshooting replicas

server directory services. [See directory services, server]

Server Message Block/Common Internet File System (SMB/CIFS)

server registration, Kerberos

server roles, Open Directory

servers, email

     authentication requirements and

     overview

     setting up

     spam control

     virus protection

servers, log

servers, Web

service discovery

Service Location Protocol (SLP)

services

     certificates for securing

     disabling unneeded

     discovering on Windows network

     DNS Service Discovery

     file-sharing

     local system security and

     network connection security and

     starting/stopping

     troubleshooting network services

Services pane, for firewall configuration

session permissions

set goup ID (setGID) 2nd

set group ID (SGID)

set user ID (setUID)

set user ID (SUID)

SetFile command 2nd

setGID (set goup ID) 2nd

setUID (set user ID)

Setup Assistant

sftp

SFTP (secure FTP)

SGID (set group ID)

SHA (secure hash algorithm) 2nd

shadow files

shadow hash files

shadow passwords 2nd

sharing directory data

shell accounts, Active Directory

shell commands

shell scripts

shell wildcards

showmount

Sidebar, Network icon in

Simple Authentication and Security

    Layer. [See SASL (Simple Authentication and Security Layer)]

Simple Mail Transfer Protocol. [See SMTP (Simple Mail Transfer Protocol)]

single-sign-on. [See SSO (single-sign-on)]

Sites folder, file and folder permissions

slap tools, OpenLDAP

slapadd

slapcat

slapconfig

     creating replicas

     Open Directory and

     Password Server and

     replica troubleshooting

slapd 2nd

slapd.conf

slapd_macosxserver.conf

slappasswd

sleep/screen saver passwords

SLP (Service Location Protocol)

slurpd

smart cards, in multifactor authentication

SMB (Server Message Block) Active Directory plug-in and

     authentication with Active Directory

     configuring with Directory Access

     configuring with smb.conf

     discovery protocols supported in Mac OS X

     locking down access to public servers

     mount command

     smbclient

     starting

     troubleshooting

     Windows file sharing and

SMB-LAN-MANAGER

     hash types supported in Mac OS X

     removing

     weaknesses of

SMB-NT

     hash types supported in Mac OS X

     removing

     strength of

smb.conf

SMB/CIFS (Server Message Block/Common Internet File System)

smbclient

smbd

SMTP (Simple Mail Transfer Protocol)

     enabling

     locking down access to public servers

     sending/receiving email

SMTP relay

sniffing. [See also packet sniffers]

     mobile security and

     network connection security and

social engineering attacks

sockets

software

     checksums for auditing

     security policies

Software Update

     local system security and

     performing security updates

     Web security and 2nd

spam

     controlling

     two email addresses for control of

     WLANs and

Spam Assassin

spoofing

spyware

srm command

ssh

     dscl utility and

     examples of ssh login

     remote monitoring

     viewing log files with

SSH (Secure Shell)

     advanced SSH

     authentication

     disabling root SSH logins

     enabling sshd

     keytab transfer via

     overview

     replacing telnet with SSH

     replica creation and

     replica troubleshooting and

     security issues with

     SFTP (secure FTP) and

     tunneling

     versions

ssh1

ssh2

sshd

SSL (Secure Sockets Layer)

     authentication

     certificates for email security

     e-mail security

     email providers supporting

     enabling 2nd

     LDAP configuration and

     LDAP protocol settings for SSL certificates

     port security

     preventing eavesdropping

     service security

     Web security

     website security

SSO (single-sign-on)

     for network services

    Kerberos. [See Kerberos]

     Open Directory master and

     open source components

    Password Server. [See Password Server]

     references

     review

     troubleshooting

standalone servers

     Open Directory configured as

     Open Directory server roles

     promoting to Open Directory master

standard users, types of user accounts

startup items

     adding monitoring to

     adding volume to

startup security, Open Firmware security

startup, Active Directory plug-in

stateless vs. stateful firewalls

static IP addresses

static mappings

stealth mode, enabling

sticky bits

     chmod for setting on a folder

     CLI for setting sticky bit on folders

     collaboration and

     for controlling file deletion

strong authentication

su

subnet masks

     firewall address groups and

     IP addresses and

sudo command

     rootkits and

     setting higher privilege levels

     troubleshooting network services

sudo killall

SUID (set user ID)

Sun

SunOne

super server [See also xinetd]

swap files

symbolic links

     comparing aliases and symbolic links

     creating

     moving original files

     overview

     recreating an original path

symmetric cryptography

SYN flood attacks

system accounts

system administrators

     Internet security

     managing networking

     reference information for

     types of user accounts

System Preferences

     Active Directory password policies

     Network pane

     Security pane

System Profiler

system usage, managing from command line

system.log 2nd

system_profiler

Категории