Oakley protocol, 300
Object Access auditing, 224–225, 455
objects. See also group policy object (GPO)
access control for, 80–81
ACL (Access Control List) for, 126
Browser Helper Objects (BHOs), exploitation of, 364–365
COM objects
registry listing, 42
unregistering, 332–334
container objects, in Active Directory, 481
DACL (Discretionary Access Control List) for, 126
global objects, creating, 498, 499
GUID for, 82–83
permanent shared objects, creating, 498
RDP (Remote Desktop Protocol) connection objects, 181
Shell scrap objects, 201, 248
Shockwave Flash objects, 201, 249
system objects, security options for, 503, 511
token object, creating, 498
obscurity attacks, 17–18, 355–357
.ocx files, 199
Office (Microsoft), Administrative templates for, 516
Office Source Engine service, 286
Office11.adm template, 516
Offline NT Password & Registry Editor, 161–163
.oft files, 199
OLE2 documents, 26
Oleview utility, 335
O&O BlueCon XXL, 163
Opera browser, 350, 351
operating systems, exploitations of, 52–53. See also Windows
Opposum worm, 24
opt-in execution. See software restriction policies
organizational unit (OU), in Active Directory
default, list of, 520
definition of, 481, 520–521
role-based structure for, 537–538
OS X operating system, exploitations of, 53
OSI model, defense strategy for layers of, 56–57
Other Organization group, 85, 108
Outlk11.adm template, 516
Outlook Express (Microsoft)
configuration for, 403–404
disabling, without disabling Outlook, 218
files, vulnerabilities in, 197, 199
Outlook (Microsoft)
configuration for, 403–404
disabling HTML content, 401–403
file blocking mechanisms in, 399–401
files, vulnerabilities in, 200
malicious links and, 392
malware used to manipulate, 21
Template files, vulnerabilities in, 199
.ovl files, 199