F 
   fallback to clear, 270271 
     FAT file system, 172, 190 
     Federal Information Processing Standard (FIPS), 124, 206 
     file authorization, ASP.NET, 389 
     File Encryption Key (FEK), 554 
     file permissions, Server 2003, 500 
     file recovery agent.  see  Data Recovery Agent 
     file servers, 123, 129, 131132 
        File Transfer Protocol (FTP) 
  anonymous access and, 403 
  certificate authentication and, 404 
  IIS, securing, 383384 
     files.  see also  data access control 
  EFS encryption of, 556557 
  encrypted, overview of, 570571 
  offline, encrypting, 559 
  recovering with EFS, 580 
      filter actions 
  configuring IPSec policy, 285 
  IPSec, predefined, 264265 
  predefined, 270272 
  recommendations, 289290 
     filter lists 
  configuring IPSec policy, 285 
  IPSec, predefined, 264265 
  in IPSec process, 274275 
  predefined, 269270 
  recommendations, 289290 
     filtering 
  IP packet, 272, 438 
  IP, designing, 289292 
  stateful filtering during startup, 282 
     filters 
  IPSec filters update IP configurations, 281 
  peer, RIP and, 419 
  route, RIP and, 418 
     FIPS.  see  Federal Information Processing Standard 
     firewalls.  see also  Internet Connection Firewall 
  authentication, 224 
  configuration, 292293 
  for POP3 servers, 117118 
  PPTP and, 450451 
  for secure boundaries, 243244 
  SSL/TLS and, 309 
  VPN servers placement and, 443 
  VPNs and, 447 
  Web servers and, 448449 
     firmware console redirection, 603 
     firmware environment variables , 469 
     flexible caching, 355, 405 
       Force Shutdown from a Remote System right, 467 
      forest functional levels 
  described, 498 
  with Windows Server 2000/2003, 494, 495 
     forests 
  delegation structure at, 488489, 498 
  functionality of, 229230 
  models for trust relationships, 221226 
  security in trusts between, 500 
  trust relationships and, 217221 
     framework for security implementation 
  corporate network risks, addressing, 2325 
  data types, security analysis for, 2526 
  external attack motivations, 22 
  overview of, 13, 40 
  predicting network threats, 1315 
  recognizing external threats, 1521 
  risk analysis implementation, 23 
      FTP.  see  File Transfer Protocol