EBCD-Emergency Boot CD, 163
ebook files, 197
.edt files, 197
effective permissions, determining, 129–131
EFS (Encrypting File System)
best practices for, 477
certificates for, 462–464
decrypting files and folders, 461
definition of, 459
enabling and disabling, 459, 476
enabling on Windows Explorer context menu, 461
encrypting files or folders, 460–461
FEK (File Encryption Key) for, 464–465
file permissions and, 462
file sharing of encrypted files, 466–467
keys for, backing up individually, 471–473
limitations of, 460, 477
new features in Windows XP, 465–469
offline file encryption, 467–469
password changes affecting, 464
permissions and, 130
recovery policy for
backing up keys individually, 471–473
Certificate Services (Microsoft), 475–476
comparison of methods for, 475–476
DRA (Default Recovery Agent), 473–475
on remote servers, 469–471
resources for, 478
for web files, 468
Efs0.log file, 461
Efs0.tmp file, 461
Elk Cloner virus, 12
e-mail. See also Outlook; phishing attacks; spam; viruses; worms
attacks using
bulk e-mailing programs for, 394–395
cross-site scripting (XSS), 393
malicious file attachments, 391–392
malicious links, 7–8, 392–393
malware executed using, 7
pharming, 397
phishing, 396–397
spam, 393–396
unauthorized reading of e-mail, 397
authentication, lack of, vulnerabilities from, 389–390
defending against attacks
antivirus scanning for, 406–407
authenticating e-mail links, 405
authentication and encryption, 417–418
blocking malicious file attachments, 398–401
blocking spam, 407–417
blocking unauthorized e-mail, 405
configuring client for, 403–404
disabling AutoPreview and Reading panes, 404–405
disabling HTML content, 401–403
DNS security, 418
end-user training, 418
not following links, 366
HTML content
disabling, 401–403
vulnerabilities from, 389–390
prevalence of attacks using, 5, 7
security providers for, 57
e-mail addresses, harvesting, 395
.email files, 197, 248
embedded files, 21, 191
embedded links, 191
embedded scripts, 21
.eml files, 197, 248
Encapsulating Security Payload (ESP) protocol, 299
Encrypting File System. See EFS
Encrypting File System in Windows XP and Windows Server 2003, 478
encryption. See also EFS (Encrypting File System); hashes for passwords; IPSec (IP Security) protocol
AES (Advanced Encryption Standard), 299, 464
Blowfish encryption, 299
Cryptographic Services, 270
Data Decryption Field (DDF), 465
Data Encryption Standard (DES), 299
Data Encryption Standard XOR (DESX), 464
of e-mail, 417–418
system cryptography, security options for, 510
end users. See users
enemy, knowing, 3. See also attackers
Enterprise Admins group
default GPO permissions for, 535
definition of, 106
protecting, 74
SID for, 85
Enterprise Domain Controllers group
computer accounts in, 116
definition of, 106
SID for, 85
Enumerate Subkeys permission, registry keys, 241
enumeration, SID, 6, 75, 89
Error Reporting Service, 271
ESP (Encapsulating Security Payload) protocol, 299
Event Log service, 271
event log settings, group policy, 511
Event service, Microsoft Exchange, 285
Everyone group
Anonymous SID and, 113
avoiding assigning permissions to, 136
computer accounts in, 115, 116
definition of, 106
replacing with Authenticated Users group, 219
SID for, 84
Windows trusts and, 117
e-worms, 391
Excel files, 202, 248
Excel SLK data-import files, 201
Excel11.adm template, 516
exception rules, SRP, 222–224
exceptions, firewall using, 66
Exchange Authority, 86
Exchange Domain Servers group, 107
Exchange Enterprise group, 107
Exchange (Microsoft)
file blocking mechanisms in, 399–401
services, 285
.exe files, 197
executable files. See also software
restricting execution of, 221–224
vulnerabilities of, 20–21, 195, 197
Execute File permission, 124, 126
execute permissions, IIS, 435
Exploits Block List (XBL), 410
Explorer Stylesheet files, 198
Expobot worm, 24
external trusts, 523