racks, securing servers in RADIUS (Remote Authentication for Dial-in User Services) 2nd readers, smart card realms, Kerberos record types available in DNS recovering data, strategies for recovery agents ensuring safety of private keys identifying recursive queries, restricting on DNS servers registry editor (regedit.exe) disabling hash storage forcing clients to use NTLMv2 securing network traffic remote access security centralizing authentication management considerations for written policies controlling access policies for RADIUS and IAS setting up authentication for dial-in users Remote Authentication for Dial-in User Services (RADIUS) 2nd Remote Desktop 2nd removable media as risk factors controlling security vulnerabilities required by Syskey mode 3 renewals of user tickets, maximum life for renewing CA certificates replication between domain controllers configuring IPSec for communication controlled by sites opening firewalls on trusted networks replication boundary for domain naming context Request for Comments [See entries under RFC] Request message (DHCP) resources on client computers, accessing restoring archived private keys Resultant Set of Policy (RSoP) IP Security Monitor and verifying application of Group Policy retinas, scanned by biometric devices revoked certificates [See CRLs] revoking issued certificates RFC 1510 standard (Kerberos) 2nd RFC 2131 (Dynamic Host Configuration Protocol) RFC 2527 (Internet X.509 PKI Certificate Policy and Certification Practices Framework) RFC 3280 (Internet X.509 Public Key Infrastructure) 2nd RFCs 2401-2412 (IPSec) rogue administrator scenario rogue DHCP servers automated monitoring packages, using DHCP server authorization and monitoring the network for role holders, certificates owned by role separation in certification authority management root CA (certificate authority) configuring CDP list for deciding to use dedicated hardware for deploying certificate to clients as trusted root installing protecting private keys without HSMs Root Directory Security template rootsec.inf template routers as network filters Routing and Remote Access snap-in (MMC) 2nd 3rd RSoP (Resultant Set of Policy) IP Security Monitor and verifying application of Group Policy