namespace, contiguous nesting of groups configuring correctly .NET Passport authentication 2nd NetBIOS domain names (Active Directory) Netdiag tool and IP Security Monitor netsh ipsec command netsh tool, verifying IPSec operation with network access to domain controllers, restricting network adapters, IPSec-capable network bandwidth, consumed by publishing CRLs network cards and IPSec performance issues network communications security, controlling network footprinting restricting attacks on servers Network Monitor and IP Security Monitor Network Quarantine network traffic analyzing with Network Monitor disallowing bypass of filter rules encrypting vs. signing IPSec component interaction with monitoring DHCP for denial-of-service attacks Secure Server (Require Security) configuration and sending domain controller communication with IPSec tunnels verifying IPSec operation networks cables as risk factors disabling unnecessary services monitoring for unauthorized DHCP servers physical security vulnerabilities and security for transmissions, securing new files, encrypting NNTP (Network News Transport Protocol) noncompliance describing penalties for setting penalties for nonexpiring passwords for service accounts nontransitive trusts (Windows NT) Nordahl attacks NTFS file permissions configuring protecting files with securing web pages with using with EFS vs. share permissions working with NTLM (NT LAN Manager) accessing resources on client computers disabling NTLM variants history of how it works logon process pros and cons of security tokens vs. Kerberos NTLM authenticated trusts (Windows NT) NTLMv2 (NTLM Version 2) configuring clients to use NTLMv2 authentication