G


GAL (Global Address List), 96

Gal11.adm template, 516

Gartner Research report, November 2004, 9

Gateway Services for Netware, 284

Gibson, Steve (account of DoS attack), 15

.gif files, 197

global catalog, 88, 96

Global groups, 96, 97

global objects, creating, 498, 499

Globally Unique Identifier (GUID), 82–83

Gopher URI handler, 250

Gpedit.msc program, 144, 483

GPMC (Group Policy Management Console), 483

GPO. See group policy object

Gpresult.exe program, 535

Gpupdate.exe program, 221

graphics files, 194, 197, 198, 200, 248

"The Great Password Debates: Pass Phrases vs. Passwords" (Microsoft), 145

Greenborder virtual environment, 387

group policy

in Administrative templates, 481, 485

application of, 486–487, 529–536

applying

with GPOs in Active Directory, 481, 482–483

with Local Computer Policy object, 481, 483–484, 528, 539

Computer Configuration section of, 487

definition of, 481

Fully Managed policies, 486–487

history of, 525–526

preferences, 486–487

in Security templates, 481, 485, 492, 538–539

settings for

Administrative templates, 515–517

event log settings, 511

file system settings, 513–514

IPSec policies, 514

recommendations for, 517–518

registry settings, 513

restricted group settings, 512

script settings, 490

security settings, 491–511

software restriction policies (SRPs), 514

Software settings, 488–490

system services settings, 513

Windows settings, 490–514

software publishing and, 488–490

True policies, 486–487

User Configuration section of, 487

Group Policy Administrator (NetIQ), 224, 346

Group Policy Creator group, 107

Group Policy Creator Owners group, 74, 85

Group Policy Management Console (GPMC), 483

Group Policy Object Editor console, 483–484

group policy object (GPO)

application priorities for, 529–531

blocked inheritance of, 532

categories of, enforced or disabled based on, 531–532

configuring in Active Directory, 481, 482–483

default, 528–529

determining effective policy for, 535–536

disabling, 531

for file permissions, 220–221

location of, 485–486

Loopback Policy Processing setting, 533

No Override attribute, 533

password complexity enforced by, 144

permissions for, 533–535

version number for, 539

WMI filtering of, 532

groups. See also specific groups

action-based groups, 95–96

assigning permissions to, 97–99, 135

built-in, list of, 102–113

definition of, 95

naming convention for, 95

nesting, 96–97

scope of, 96

types of, 96

Guest account

definition of, 100

security options for, 502–503

Guests group, 86, 107

GUI skins, embedded links in, 192

GUID (Globally Unique Identifier), 82–83

Guid2obj tool, 82

guide to hacker personas (Hensing), 11

.gz files, 197

.gzip files, 197



Professional Windows Desktop and Server Hardening
Professional Windows Desktop and Server Hardening (Programmer to Programmer)
ISBN: 0764599909
EAN: 2147483647
Year: 2004
Pages: 122

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net