| < Day Day Up > |
|
WAPs (wireless access points)
access policies, 10-17—10-18
configuring, 10-29, 10-33
physical security, 10-18
war driving (walking), 15-40
/warnrestart update parameter, 6-28
weak passwords, 1-19
Web authentication, 1-33
Web browsers, locking down, 13-40
Web Enrollment application, 7-33, 7-39
Web Server certificate template, 7-23
Web Server Certificate Wizard, 11-12—11-16
Web service extensions, 4-32
Web services
authorization settings for, 3-12
certificates. See Certificate Services
disabling for domain controllers, 13-9
permissions, 2-12
Web sites
SSL certificates with, 11-10—11-12
permissions, IIS, 4-38
public, 4-36
Web (external) users, authenticating, 1-32—1-40
anonymous access, 1-25—1-26, 1-32—1-39, 2-29
delegated authentication, 1-34—1-35
Web authentication, 1-33
WEP (Wired Equivalent Privacy), 10-4—10-11, 15-42
802.1X authentication, 10-7—10-9
dynamic WEP, 10-5, 10-7, 10-11
EAP-TLS authentication, 10-10, 10-20, 12-12
open and shared network authentication, 10-6
PEAP authentication, 10-9—10-10, 10-20, 12-12
RADIUS service, 10-8, 10-10
Whoami tool, 2-32
Wi-Fi Protected Access (WPA), 10-11—10-13
Windows Authentication Mode, 4-47—4-48
Windows Authorization Access group, 2-27
Windows Installer files, 5-21
Windows operating system, IPSec and, 8-13—8-15
packet filtering, 8-14—8-15, 9-43
Windows Server 2003
authentication features, 1-9
authentication protocols, 1-9—1-10, 1-12—1-15, 8-19, 15-20. See also LM authentication
IP security policies, built-in, 8-31, 15-1
IPSec with, 8-14
Windows Server 2003 Certificate Services, 7-8—7-13. See also Certificate Services
auditing, 7-13
disaster recovery, 7-12, 16-31
Windows setup files, integrating updates into (slipstreaming), 6-19—6-24
Windows Update service, 5-17, 5-19
Windows Update Web site, 6-29
Winver.exe utility, 5-23
Wired Equivalent Privacy (WEP), 10-4—10-11, 15-42
802.1X authentication, 10-7—10-9
dynamic WEP, 10-5, 10-7, 10-11
EAP-TLS authentication, 10-10, 10-20, 12-12
open and shared network authentication, 10-6
PEAP authentication, 10-9—10-10, 10-20, 12-12
RADIUS service, 10-8, 10-10
wireless network security, 10-1—10-40, 15-40—15-49
configuring, 10-17—10-36
disabling SSID broadcasts, 10-14
MAC address filtering, 10-13
remote access, 8-6—8-8, 10-8, 10-10, 10-22—10-24, 12-1—12-46, 15-51—15-54
threats and risks, list of, 10-3—10-4
VPN clients, 10-14
WEP (Wired Equivalent Privacy), 10-4—10-11, 10-20, 12-12, 15-42
WPA (Wi-Fi Protected Access), 10-11—10-13
Wireless Zero Configuration service, 10-24
WMI filters, 3-23—3-24
analyzing, 3-36—3-37
Workstation Authentication certificate template, 7-23
WPA (Wi-Fi Protected Access), 10-11—10-13
WQL queries, 3-23
Write Attributes permission, 2-9
Write Data permission, 2-8
Write Extended Attributes permission, 2-9
Write permission
Active Directory, 2-11
certificate templates, 7-24
files and folders, 2-8, 2-9
services, 2-13
Web sites, 4-38
WUServer registry value, 6-35
WUStatusServer registry value, 6-35
| < Day Day Up > |
|