| < Day Day Up > |
|
RADIUS (Remote Authentication Dial-In User Service)
in demand-dial connections, 95
RADIUS authentication, 264–265
in wireless connections, 104
RDP (Remote Desktop Protocol), 382, 384–386, 384
realm trusts, 130
recovering services/data. See restoring; security threats
Registry security, 174, 175, 331
Remote Access Auto Connection Manager, 251
Remote Access Connection Manager, 252
remote access security,
See also network
authentication protocols
Challenge Handshake Authentication Protocol, 83–84
choosing, 86, 87–88
Extensible Authentication Protocol, 85
Microsoft CHAP, 84
Microsoft CHAP version 2, 84–85
Password Authentication Protocol, 83
Shiva Password Authentication Protocol, 83
choosing encryption methods, 88–91
design scenarios, 88, 91
enabling reversible encryption, 86–87, 86
overview, 82
virtual private networks in, 82, 88–91
remote network management, 368–409,
See also server security
case study, 404–406
case study answers, 408–409
case study questions, 407
exam essentials, 398
using in-band management tools
command-line tools, 372, 389–390, 390
defined, 370, 379
design scenario, 388–389
Microsoft Management Console, 371, 380–381, 380
real world scenarios, 382, 385, 388
Remote Assistance, 372, 386–389, 387
Remote Desktop, 252, 371, 382–386, 383–384
Secure Shell, 390
Telnet, 389, 390
Web Interface for Remote Administration, 372
Windows Script Host, 371
key terms, 398
versus local management, 368, 369–370
using out-of-band Emergency Management Services
defined, 390
design scenario, 396–397
direct serial connections, 392–393, 392
intelligent UPSes, 394–396, 395–396
modem serial connections, 393, 393
overview, 368, 372, 379
real world scenario, 395
Special Administration Consoles, 390–392, 391
terminal concentrators, 394, 395
Windows components, 390
overview, 397
remote management plans
auditing tool use, 375
benefits, 369–370
configuring network support, 376–377
defined, 368–369
design scenarios, 371, 377, 379
determining tool/hardware needs, 370–372
encrypting data, 375
evaluating management needs, 369–370
machine authentication, 374
physical security, 374
planning deployment, 377–378
real world scenario, 376
using secondary networks, 375
securing software/hardware, 372–376
threats, 370
user authentication, 373–374
review question answers, 402–403
review questions, 399–401
Remote Procedure Call (RPC) Locator, 252
Removable Storage service, 252
Remove File menu from Windows Explorer Properties dialog box, 338, 339
renewing certificates, 218–219, 224
replay attacks, 5
repudiation threats, 42, 43
Reschedule Automatic Updates scheduled installations setting, 348–349, 350
resources, network. See access control
restoring data, 180–181,
See also security threats
Restricted Groups settings, 331
revoking certificates, 218, 220–221, 220–221
RFC 2196, 9–10
RFC 2535, 309
risks. See security analysis; security threats
root CA role, 206–208, 208
RPC (Remote Procedure Call) Locator, 252
RRAS. See demand-dial routing
runas command, 135
| < Day Day Up > |
|