EAP (Extensible Authentication Protocol) eavesdropping (electronic), protecting from 2nd educating employees about security users about traveling with laptops Effective Permissions tab EFS (Encrypting File System) benefits of configuring with Group Policy correct use of data recovery strategies drawbacks of laptop security and new files, encrypting protecting data with using with NTFS in Windows Server 2003 2nd improvements to electronic eavesdropping, protecting from 2nd email attachments refrain from opening use caution when opening configuring secure email clients enrolling clients for certificates issuing certification authority certificates secure [See secure email] emergency response working groups employees as risk factors encapsulating HTTP requests Encapsulating Security Payload (ESP) protocol 2nd Encrypting File System [See EFS] encryption configuring certificate templates data directories downsides to using in email protecting sensitive data 2nd protocols 2nd providing secure email public key cryptography and sending digitally signed email sending email using shared secret key cryptography and signed code and Syskey utility vs. signing packets end-entity (personal) certificates enforcement mechanisms enrolling for certificates users of smart cards enrollment officers Enterprise Admins group enterprise CA (certification authority) Enterprise Server Edition of Windows Server 2003, security enhancements in Equifax certification authority ESP (Encapsulating Security Payload) protocol 2nd event logs used for auditing 2nd 3rd clearing when full 2nd configuring not practical for DNS activities verifying IPSec operation viewing events of Active Directory management Event Viewer tool EventComb tool Everyone group, disallowing anonymous logon expiration dates of certificates and CRLs exporting certificates without private keys Extensible Authentication Protocol (EAP) extensible database (Active Directory)