WAIK. See Windows Automated Installation Kit
web servers, 293-294
buffer overflows, 296
DoS attacks, 298-299
OS vulnerabilities, 295
password guessing attacks, 299
sniffing attacks, 297-298
threats, 293-299
list of, 294
Web sites in less privileged web content zone can navigate into this zone (setting), 275, 281
Wecsvc service. See Windows Event Collector service
WEP. See Wired Equivalent Privacy
wetware, 546. See also information security
wf.msc, 422
WFP. See Windows File Protection; Windows Filtering Program
Whoami /all command, 114
security token and, 125
Wi-Fi, 461-471. See also wireless networks
Ad-Hoc mode, 462-463
Alliance, 462
best practices, 482
802.11 network technologies, 461
802.11 standards, 463-464
comparison of, 464
types, 463
Infrastructure mode, 462-463
security standards, 464-471
setup diagram, 462
terminology/technologies, 461-471
Wi-Fi Protected Access. See WPA
Wi-Fi Protected Setup (WPS), 466, 467
Window Stations (winsta), 211
Windows authentication, 322-323, 324
other authentication methods v., 325
Windows Automated Installation Kit (WAIK), 549, 550. See also Windows Pre-Installation Environment
Windows Backup. See Backup, Windows
Windows CardSpace. See CardSpace
Windows Defender, 13, 14, 230, 231-238. See also Windows Live OneCare subscription service
accuracy, 236-237
heuristic scanning, 235
OneCare and, 238, 239
real-time scanning, 232
areas of, 232-233
Software Explorer feature, 235, 236
startup program information by, 236
Windows Event Collector (Wecsvc) service, 30
Windows Explorer, 154
elevation motions for, 154-156
deletion and, 154-156
Windows Fax and Scan service, 215
Windows File Protection (WFP), 25, 26, 209. See also Windows Resource Protection
WRP v., 209
Windows Filtering Program (WFP), 405-407
architecture diagram of, 406
Windows Firewall. See Firewall, Windows
Windows infrastructure, 73-117
Windows Installer 4.0, 28
Windows Live ID, 34
Windows Live Mail, 352
Windows Live Messenger, 214
Windows Live OneCare subscription service, 238-239
anti-virus scanning, 238
firewall, 238
Windows Defender and, 238
Windows Mail, 31. See also e-mail
domain blocking, 387-390
e-mail storage in, 390
introduction, 384-390
junk mail detection, 386-387
phishing detection, 385-386
security features, 384-390
Windows Meeting Space, 214, 215
Windows Messenger, 214. See also Office Live Communicator
Windows Modules Installer, 181. See also Trusted Installer service
Windows Name Service (WINS), 90
Windows NT file system. See NTFS
Windows Pre-Installation Environment (WinPE), 10-11, 549
bootable USB flash drive, 549
building, 549-554
features, 10-11
packages in, 551
Windows Presentation Foundation (WPF) platform, 264
Windows Protected Media Path (WMPM), 7
Windows Recovery Environment (WinRE), 10
Windows Remote Management (WinRM) service, 30
Windows Resource Protection (WRP), 26, 209-210
Web information on, 210
WFP v., 209
Windows Shared View, 37
Windows Sidebar, 215
Windows Terminal Services, 148. See also Remote Desktop
Windows Vista. See also access control lists; Group Policy; information security; security features, Vista; wireless networks
ACLs, 114-117, 171-201
client protection, 225-241
components
new, 215
optional, 213-214, 214
reduction of, 213-214
removed, 214-215
undesirable, 215-216
information security, 519-547
security features, 3-42
Security Guide, 510-513
security options, 498-504
wireless improvements in, 476-477
Windows XP, 178. See also access control lists
ACL UI, 197
ACLs, 178-179
default, 179
problems in, 178-179
firewall, 403, 404
WindowsSystem32 files
protection of, 23
Winload.exe, 9, 75, 76
Winlogon, 496. See also Group Policy
Group Policy and, 496-497
WinPE. See Windows Pre-Installation Environment
WinRE. See Windows Recovery Environment
Winresume.exe, 10
WinRM service. See Windows Remote Management service
WINS. See Windows Name Service
winsta. See Window Stations
Wired AutoConfig, 467
Wired Equivalent Privacy (WEP), 465-466, 480-481
Dynamic, 480-481
Wireless Fidelity, 462. See also Wi-Fi
wireless networks, 482. See also Wi-Fi
best practices, 482
securing, 37, 477-481
threats, 471-475
DoS attacks, 475
eavesdropping, 472-474
malware, 474-475
unauthorized access, 474
Vista improvements for, 476-477
Wireshark, 57
WMF worm, 228, 229
WMI filters, 440-441
version specification, 441
Work network domain, 35
worker processes, 309
working set, privilege for, 141
Workstation service, 98, 99, 205
disabling, 98-99
worms, 62. See also specific worms
WPA (Wi-Fi Protected Access), 466, 481
Enterprise Mode, 467-471
Personal Mode, 466-477
using, 481
WPA2 Enterprise Mode, 467-471
WPA2/802.11i, 466, 481, 482
WPF platform. See Windows Presentation Foundation platform
WPS. See Wi-Fi Protected Setup
write-restricted tokens, 207
services with, 207
WRP. See Windows Resource Protection