Index_C


C

CA infrastructure, 256 “64
building PKI with Certificate Services, 257 “58
certificate hierarchy, 258 “63
how many CAs needed, 261 “62
outsourcing PKI, 256 “57
stand-alone vs. enterprise, 260 “61
trusts and cross-certification, 263 “64
Calendar feature, OWA, 351 “53
CAs (certificate authorities), 216 “23, 250 “91. See also Certificate Services
backing up and restoring, 288 “89
defining, 23
delegation and segregation , 286 “87
enrollment into PKI environment, 268 “70
fine-tuning security, 290
issuing certificates, 264 “68
online CAs, 217 “19
overview of, 250
pending requests , 223
PKCS#10 requests, 219 “22
PKI goals, 253 “56
requesting certificates, 314 “15
requesting SSL certificate, 216 “17
revocation and, 270 “72
root CAs, 258 “59, 261, 264 “65
server performance guidelines, 273
trusts and trust lists, 287 “88
CAST-128 algorithm, 19
CCITT (Comit Consultatif International T l graphique et T l phonique), 23
CDOs (Collaboration Data Objects), 308
cell phones. See OMA (Outlook Mobile Access)
certificate authorities. See CAs (certificate authorities)
certificate mapping, OWA
client-side certificates, 346
defined, 340
Certificate Renewal Wizard, 268
certificate revocation lists (CRLs)
IPSec and, 227 “28
overview of, 22 “23
revoking certificates with, 270 “72
Certificate Services, 273 “86
backing up and restoring CAs, 288 “89
building PKI with, 257 “58
building trusts and trust lists, 287 “88
configuring for Exchange 2000, 278 “80
delegation and segregation, 286 “87
enrolling users, 282 “84
enrollment into PKI environment, 268
installing, 273 “77
managing for Exchange 2000, 280 “82
migrating to Windows Server 2003, 284 “86
Web enrollment, 277 “78
certificates
digital ( see digital certificates (digital IDs))
publishers, 23
Secure Sockets Layer ( see SSL certificates)
X.509 ( see X.509 certificates)
certificate trust lists (CTLs)
building, 287 “88
cross-certification and trusts, 263 “64
Certification Authority Restore Wizard, 289
Certification Authority snap-in, 223
Certified Information Security Systems Professional (CISSP), 4
challenge-response protocols
Kerberos, 37 “38
NTLM and LM protocols, 36 “37
CheckAdminSettings values, 309
Child Online Protection Act, 450
child pornography, 456
CIFS (Common Internet File System) ports, 113
CISSP (Certified Information Security Systems Professional), 4
clean desktop policy, 85
clear-signed messages, 27, 300
Client (Respond Only) policy, 229
client security, auditing, 443
client security, OWA, 358 “64
attachments, 361 “63
passwords, 359 “61
S/MIME, 363 “64
CMS (Crytptographic Message Syntax), 300
CN (Common Name ), 244
code, malicious, 11 “13
CodeRed worm, 63
Collaboration Data Objects (CDOs), 308
collaborative filtering engines, 165
Comit Consultatif International T l graphique et T l phonique (CCITT), 23
command line, MBSA, 99 “103
Common Internet File System (CIFS) ports, 113
common laws, privacy, 450 “51
Common Name (CN), 244
communications security. See COMSEC (communications security)
compliance
archiving/retaining existing messages, 411
controls and review for, 419
key players in, 409 “10
overview of, 407
computers, securing environment, 77 “79
COMSEC (communications security), 215 “48
additional reading, 248
IPSec. ( see IPSec (Internet Protocol Security Extension))
MAPI RPCs with ISA server, 239 “42
RPCs tunneling over HTTPS. ( see RPCs (remote procedure calls) over HTTPS)
security auditing, 441
SMTP and. ( see SMTP (Simple Mail Transfer Protocol), with TLS/SSL)
confidentiality
defined, 8
lost mobile devices and, 401
privacy vs., 8 “9
protecting, 9 “11, 85
conforming notifications (takedown notices), 455
connections
filtering, 173 “76
IPSec, 226
connectors, SMTP
accepting or rejecting messages on, 161 “62
blocking or allowing, 157 “58
creating, 160 “61
constrained delegation, 343 “44
Contacts feature, OWA, 351, 353
content control, 181 “98
additional reading, 198
disclaimers, 182 “84
filtering inbound and outbound content, 184 “85
filtering products, 186 “87
message tracking for, 192 “94
overview of, 181
reading other people s mail, 187 “92
searching for specific content, 194 “98
security auditing, 441
Content Restrictions tab, SMTP connector, 162
cookies, 342
copyright protection, Internet, 453
credential caching, mobile devices, 400
CRLs (certificate revocation lists)
checking for IPSec, 227 “28
overview of, 22 “23
revocation, 270 “72
cross-certification
hierarchy, 263
overview of, 256
trusts and, 263 “64
Crytptographic Message Syntax (CMS), 300
cryptographic service providers (CSPs)
issuing digital certificates, 264
private key protection, 267 “68
cryptography
additional reading, 40 “41
public-key encryption ( see public- key encryption)
S/MIME and, 300
secret-key encryption ( see secret- key encryption)
CSPs (cryptographic service providers)
issuing digital certificates, 264
private key protection, 267 “68
CTLs (certificate trust lists)
building, 287 “88
cross-certification and trusts, 263 “64
Custom Installation Wizard, 308 “10
Custom Maintenance Wizard, 312



Secure Messaging with Microsoft Exchange Server 2003
Secure Messaging with MicrosoftВ® Exchange Server 2003 (Pro-Other)
ISBN: 0735619905
EAN: 2147483647
Year: 2004
Pages: 189

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net