P
pass-through authentication, 341
passwords
account management events, 434
administrator, 112 “13
configuring KMS for Exchange 2000, 279
laws of security, 466, 472 “73
MBSA scanning, 94, 98
mobile device security, 82 “83, 401
OWA client security, 359 “61
policy settings, 113 “14
stealth SMTP AUTH attacks, 154
strong, 111 “12
patches, 89 “107
automatically distributing, 103 “7
checklist, 107 “8
creating and distributing, 90 “91
MBSA and. ( see MBSA (Microsoft Baseline Security Analyzer))
overview of, 89
security bulletins , 91 “92
perimeter
antivirus scanners at, 203 “5
spam filtering at, 168
perimeter networks
FE/BE architecture, 336 “37
opening firewall ports, 366 “67
security features of, 364 “65
permissions, 50 “60
additional reading, 60, 146
configuration tree, 480 “83
defining, 44
Exchange, 51 “55
Exchange and Explorer, 55 “56
installation, 132 “33, 144 “46
mailbox, 58 “60, 188 “90
overview of, 50 “51, 53
rights management, 251
roles and, 56 “58
table of, 54 “55
permissions setup guide, 477 “90
ACL entries, 477 “78
domain naming objects, 486 “89
Exchange configuration objects, 480 “83
file system objects, 489 “90
other configuration objects, 485 “86
overview of, 478 “79
server objects, 484 “85
personal identification numbers (PINs), 400 “401
physical access controls, 5 “6
physical integrity attacks, 76 “77
physical security, 75 “86
additional reading, 86
assessing threats to, 76 “77
confidentiality and, 9
of environment, 77 “79
of hardware, 79 “82
of laptops, 82
laws of security, 464 “65
of mobile devices, 82 “83
overview of, 75 “76
security auditing, 439
USB drive attacks, 81 “82
PINs (personal identification numbers), 400 “401
PKCS#10 requests , 219 “22
PKI (public-key infrastructure)
additional reading, 291
building with Certificate Services, 257 “58
digital certificates, 264 “68
enrollment, 268 “70
Exchange with, 249 “50
goals, 253 “56
hierarchy design, 258 “59
history of, 249
infrastructure, 253
outsourcing, 256 “57
overview of, 23 “24
revocation, 270 “72
security auditing, 441 “42
server performance, 273
Pocket PCs
additional reading, 401
with EAS, 395
losing, 400 “401
Point-to-Point Protocol (PPP), 39
policies
account, 111 “13
auditing, 110 “11
combining technology with, 469, 475
filtering product evaluation, 186
group , 109 “10
IPSec FE/BE communications, 370
network use, 447, 456 “60
Outlook cryptographic, 320 “24
password, 111 “15
predefined templates, 119 “23
revocation list, 271
policies, IPSec, 231 “39
assigning, 229 “30
creating, 233 “39
exemptions, 231
finding, 232
identifying what needs protection, 232 “33
types of, 228 “29
POP3 (Post Office Protocol version 3), 383 “90
access by IP address, 385 “86
access to protocol server, 386 “87
additional reading, 390
authentication methods , 384 “85
IPSec protecting, 233
overview of, 383 “84
relaying and, 149
security auditing, 443
with SSL, 387 “90
ports
firewalls, 366 “69
RPC over HTPPS, 245 “46
Web listener, 374
Post Office Protocol version 3. See POP3 (Post Office Protocol version 3)
PPP (Point-to-Point Protocol), 39
PPS (Product Support Services), 209
predefined groups, 48 “49
predefined policy templates, 119 “23
Print Operators group, 48
privacy
confidentiality vs., 8 “9
defined, 8
e-mail monitoring, 456 “58
legal issues, 446, 448 “51
monitoring employees Internet use, 459 “60
Privacy Protection Act, 450
private keys
protecting, 267 “68
public-key encryption and, 20 “21
smart cards affect on, 272
privilege use events, 436
Product Support Services (PPS), 209
Programmatic Settings tab, Outlook, 307 “8
programs, running/downloading, 470 “76
properties
delegating by property set, 140 “43
granting access to individual, 143 “44
protocols, 30 “40
additional reading, 40 “41
authentication-only, 36 “40
IPSec, 31 “34
overview of, 15 “16
S/MIME, 34 “35
SSL, 30 “31
TLS, 30 “31
public folders
for Outlook, 303 “4
OWA, 352 “53
permissions, 53, 59 “60
removing stores, 378
public-key encryption, 20 “26
algorithms, 25 “26
defined, 20
digital certificates, 21 “23
how it works, 24 “25
overview of, 20 “21
plumbing for digital certificates, 23 “24
public-key infrastructure. See PKI (public-key infrastructure)
publishing
MAPI RPCs with ISA server, 239 “42
OWA with ISA Server, 373 “78
RMS server license, 251 “52