|
EAP (Extensible Authentication Protocol), 38
ECC (elliptic-curve cryptography), 26
ECDSA (elliptic-curve digital signature algorithm), 29
EDSLock, 137
EFS, 78
electrical power, securing, 76
Electronic Frontier Foundation Web site, 13
Electronic Privacy Information Center (EPIC), 13
ElGamal algorithm, 26
elliptic-curve cryptography (ECC), 26
elliptic-curve digital signature algorithm (ECDSA), 29
confidentiality and privacy, 8–11
security bulletins, 86
E-Mail Accounts dialog box, 328
E-Mail Accounts Wizard, 280
e-mail encryption, 222–51
additional reading, 255–56
CA design, 225–32
certificate services management, 251–55
digital certificates, 232–36
enrollment, 236
Exchange KMS, 237–38, 246–51
Exchange-PKI, 221–22
overview of, 241–44
PKI and, 222–25
revocation, 238–40
server performance, 240–41
Web enrollment, 244–46
Encapsulating Security Payload (ESP), 32–34
encryption
confidentiality and, 9
e-mail. See e-mail encryption
hardware protection with EFS, 78
IM traffic, 344–45
Outlook messages, 278–79, 280
public-key. See public-key encryption
secret-key, 16–20
S/MIME options, 276–78
virus codes and, 178
Encryption Configuration object, KMS, 247–48
end user license agreement (EULA), 90
enrollment
Certificate Services installation and, 242, 244–46
KMS, 249–51
options for, 236
Web, 236, 244–46, 255
Enrollment tab, KMS, 249–50
Enterprise Admins group
Active Directory Connector installation, 121
auditing management of, 348
Exchange installation, 119
overview of, 46
enterprise CAs
Group-Policy auto-enrollment of, 236
smart cards and, 240
standalone vs., 227–28
environment, server, 75–77
EPIC (Electronic Privacy Information Center) Web site, 13
Error Mapping Properties dialog box, 299
ESE (Extensible Storage Engine) APIs, 185
ESP (Encapsulating Security Payload), IPsec, 32–34
Eudora, 329
EULA (end user license agreement) page, 90
Event Log service, 348
event logs, 104, 348–49
event sinks, 162–64
Event Viewer, 357–59
EventCombMT, 354–56
events
auditing account logon, 358–59
auditing account management, 357–58
auditing privilege use, 359–60
logon, 359
EVERYONE security principal, 46
Exchange 2000
Active Directory authentication, 5
certificate publisher, 23
IM security. See IM (Instant Messaging)
key management. See KMS (Key Management Service)
permissions, 50–52
spam control, 156–58
Exchange 2000, installing, 117–38
Active Directory design, 118–20
additional reading, 137
finishing touches, 135–37
migration preparation, 120–21
Exchange 2000, continued
organization/domain preparation, 121–24
overview of, 117
performing, 124
required permissions, 125
server upgrade, 124–25
Exchange 5.5
authentication mechanisms, 5
certificate publisher, 23
migrating to Exchange 2000, 120–21, 137
open relays in, 142
Exchange Administration Delegation Wizard, 53, 129–31
Exchange Administrator role, 53–54
Exchange canonical ACL format, 48
Exchange Domain Servers, 123
Exchange Enterprise Servers group, 123
Exchange Features tab, 336–37
Exchange Full Administrator role, 53–54, 124–25
Exchange Installable File System (ExIFS) driver, 52
Exchange server
Active Directory design and, 118
allowing to proxy to authenticate traffic, 217
antivirus scanners, 182–86
finding versions, 86
installing Exchange on, 119–20
MBSA checking vulnerabilities in, 89
perimeter antivirus scanners, 181–82
upgrading, 124–25
Exchange System Manager
access control and, 289–91
Exchange installation and, 124
server version located with, 86
SSL certificate requested from, 192–93
TLS enablement, 200–1
Exchange View-Only Administrator role, 53–54
Exclaimer, 163–64
exemptions, IPsec policies, 207
ExIFS (Exchange Installable File System) driver, 52
Exmerge tool, 172–74, 175
exploits, 67
Explorer, 52
exporting, certificates, 275–76
Extensible Authentication Protocol (EAP), 38
Extensible Markup Language (XML) blobs, 333
Extensible Storage Engine (ESE) APIs, 185
|