Secure Messaging with MicrosoftВ® Exchange Server 2003 (Pro-Other)

E

EAP (Extensible Authentication Protocol), 39

EAS (Exchange Server ActiveSync), 395, 396 “99

ECC( elliptic-curve cryptography) algorithms, 26

Economic Espionage Act of 1996, 455

ECPA (Electronic Communications Privacy Act of 1986), 449 “50

EFF (Electronic Frontier Foundation), 460

EFS (Encrypting File System), 81

electrical power, 79

Electronic Communication Privacy Act of 1986 (ECPA), 449 “50

Electronic Frontier Foundation (EFF), 460

Electronic Funds Transfer Act, 450

Electronic Privacy Information Center (EPIC), 460

ElGamal algorithm, 26

elliptic-curve cryptography (ECC) algorithms, 26

e-mail, 249 “92

additional reading, 291

Certificate Services installation, 273 “77

Certificate Services management, 286 “90

content control ( see content control)

Exchange-PKI and, 249 “50

Internet crime and, 453 “56

monitoring, 456 “58

privacy laws, 448

rights management and, 251 “52

S/MIME encryption ( see S/MIME (Secure/Multipurpose Internet Mail Extensions), encryption infrastructure)

S/MIME vs. RM, 252 “53

security auditing, 441 “42

Encapsulating Security Payload (ESP), 32

Encrypting File System (EFS), 81

encryption

confidentiality and, 9

laws of security and, 467

mobile devices, 83

Outlook, 318 “20

public-key. ( see public-key encryption)

rights management, 251

RPC traffic between Outlook and Exchange, 333

S/MIME. ( see S/MIME (Secure/Multipurpose Internet Mail Extensions), encryption infrastructure)

S/MIME document and message, 254

secret-key ( see secret-key encryption)

viruses, 200 “201

Encryption Configuration, KMS, 280

end-to-end security, S/MIME, 35

end user license agreement (EULA), 95

end users, security laws. See security laws, for end users

enrollment

KMS, 282 “84

overview of, 268 “70

smart card, 272

Web, 277 “78, 290

Enterprise Admins group

danger of, 49

Exchange permissions granted to, 53

enterprise CAs

overview of, 260 “61

revocation and, 270 “72

smart card enrollment, 272

EPIC (Electronic Privacy Information Center), 460

escalation of privilege attacks, 66, 71

ESE (Extensible Storage Engine), 208 “9

ESP (Encapsulating Security Payload), 33

Ethernet, 39 “40

ETRN, 160

EULA (end user license agreement), 95

EumpEl.exe, 433

EventCombMT, 430 “32

Event Log service, 299 “300

event logs

additional reading, 437

analysis tools, 430 “33

setting auditing policies, 110

Windows 2003 systems, 425

EventQuery.vbs, 433

events

account logon events, 435

account management, 434 “35

logon, 435 “36

privilege use, 436

event sink

additional reading, 190

archive sink as, 190 “92

overview of, 177

perimeter antivirus scanners as, 204

writing, 182 “83

EVERYONE pseudo-group, 49

Exchange 2000 Server. See Microsoft Exchange 2000 Server

Exchange Administration Delegation Wizard, 56 “58

Exchange Administrator role, 57

Exchange canonical ACL format, 51 “52

Exchange Full Administrator role, 57

Exchange installation, 440

Exchange Server 2003. See Microsoft Exchange Server 2003

Exchange Server 5.5. See Microsoft Exchange Server 5.5

Exchange Server ActiveSync (EAS), 395 “99

Exchange System Manager

installing SSL certificate, 216 “17

online CA, 217 “19

OWA access control, 347

Exchange View Only permission, 57, 138

Exclaimer, 184

exemptions, IPSec policy, 231

ExIFS (Exchange Installable File System) driver, 55 “56

Exmerge

additional reading, 190

searching for specific content with, 195 “96

explicit logon, OWA, 338 “39

exploits, 70

exporting digital certificates, 315 “16

express policies retention, 459

Extensible Authentication Protocol (EAP), 39

Extensible Markup Language (XML) file, 93, 95

Extensible rights Markup Language (XrML)

digital IDs as, 250

securing Outlook with IRM, 302

working with Windows RM, 251 “52

Extensible Storage Engine (ESE) APIs, 208 “9

external CAs, 314 “15

Категории