Secure Messaging with MicrosoftВ® Exchange Server 2003 (Pro-Other)

R

RADIUS (Remote Authentication Dial-In User Service), 39

RAID (Redundant Array of Independent Disks), 273

RBLs (real-time block lists), 173 “76, 180

RC n algorithms, 19

readings , additional. See information resources

Really Simple Syndication (RSS), 91

real-time block lists (RBLs), 173 “76, 180

recipient address filtering, 171

records management, 458 “59. See also DCAR (discovery, compliance, archive, and retrieval)

Redundant Array of Independent Disks (RAID), 273

rekeying, 265

relaying. See SMTP (Simple Mail Transfer Protocol) relaying

Remote Authentication Dial-In User Service (RADIUS), 39

remote procedure calls. See RPCs (remote procedure calls)

remote procedure calls over HTTPS. See RPCs (remote procedure calls) over HTTPS

renewal process, certificates, 266 “67

replication, Active Directory, 130

repudiation , STRIDE model, 71

Request Security (Server) policy, 229

Require Security (Secure Server) policy, 229

resource controls, 5 “7

resources. See information resources

Respond Only (Client) policy, 229

Restricted Sites zone, 299 “300

restrictions

attachments and OWA, 362 “63

filtering spam by recipient address, 171

relaying, 159 “60

securing mobile devices, 400

SMTP connector, 161 “62

resultant set of policies (RSoP), 109

retention

archival policy and, 408

expiring materials and, 419

express policies and, 459

government records and, 459

key players in, 409

litigation and, 420

overview of, 406 “7

retrieval. See DCAR (discovery, compliance, archive, and retrieval)

Return Status Code, 174 “75

revocation, certificate, 284, 288

rights management. See RM (rights management)

Rights Management Services. See RMS (Rights Management Services)

RIM Blackberry software, 395

risk assessment. See also threats

additional reading, 74

antivirus protection, 210 “11

asset inventories and, 72 “74

laws of security administration, 474 “75

operational security, 76 “77, 84

overview of, 61 “62

physical security, 76 “77

STAVE model, 67 “70

STRIDE model, 70 “72

Rivest-Shamir-Adelman (RSA) algorithm, 25

RM (rights management)

components , 251

e-mail security, 249 “50

overview of, 13

securing Outlook with IRM, 302, 324 “27

S/MIME compared to, 252 “53

working with, 251 “52

RMS (Rights Management Services)

additional reading, 334

licensing, 251 “52

overview of, 250

rights management, 251

securing Outlook with IRM, 302, 324 “27

working with Windows RM, 251 “52

roles, 56 “58

root CAs

designing certificate hierarchy, 258 “59

key lengths, 264 “65

protecting, 261

taking offline, 261

RPCs (remote procedure calls)

encrypting traffic, 333

firewall ports, 368 “69

RPCs (remote procedure calls) over HTTPS, 242 “47

configuring ports, 245 “46

defined, 44

disabling DCOM, 246 “47

mobile Exchange access with, 393

opening correct firewall ports, 368

Outlook and, 301, 310 “12

Outlook security, 301

overview of, 242 “44

setting up, 244 “45

troubleshooting, 247

RSA (Rivest-Shamir-Adelman) algorithm, 25

RSoP (resultant set of policies), 109

RSS (Really Simple Syndication), 91

RSVP protocol, 231

rules

IPSec security, 229 “30, 234 “35

legal ( see legal issues)

publishing MAPI RPCs with ISA server, 240 “41

Web publishing, 377 “78

Категории