TCP/IP port filtering, configuring TCP/IP stack and IIS (Internet Information Services) TechNet, decrypting descriptions for logged entries technology-based security mechanisms telephone lines as risk factors controlling security vulnerability for templates, security [See security templates] temporary remote access TGTs (ticket-granting tickets) accessing resources on file servers forwardable tickets theft of computers, reality of ticket-granting tickets (TGTs) accessing resources on file servers tickets forwardable maximum life for renewals of user tickets service tickets user tickets proxiable tokens, security traffic, network [See network traffic] transitive trusts Active Directory Windows NT transmissions, securing Transport Layer Security (TLS) and public key encryption traveling with laptops, educating users about trees (Active Directory) triple-DES (3DES) encryption algorithm trojan horses, installed by unsigned code trust relationships, securing trusted forests trusted root certificates Trusted Root Certification Authorities store trusts Active Directory Windows NT two-way trusts (Active Directory)