walls, of data center, 90
wardriving, 271-272
water alarms, 85, 97
weather threats, 89
web applications auditing, 213-220, 222
Web Inspect, 221
web servers auditing, 207-222
background, 207-208
knowledge base, 221
master checklist, 222
overview, 207
tools and technology, 220-221
web auditing components, 208
Web Sleuth, 221
website, of audit department, 14
WFT (Windows Forensic Toolchest), 138
Windows Client
master checklist, 163
simplified audit, 157-161
Windows Forensic Toolchest (WFT), 138
Windows Messenger Service, 145
Windows operating systems auditing, 135-163
See also Windows Server
background, 135-136
basics, 136-139
command-line tips, 137
common commands, 138
essential command-line tools, 137-138
overview, 136-137
Windows Server administrative tools, 138-139
knowledge base, 161-162
overview, 135
performing audit, 139-140
tools and technology, 161
Windows Client
master checklist, 163
simplified audit, 157-161
Windows Server, 140-156
account management and password controls, 146-149
administrative tools, 138-139
master checklist, 162-163
network security and controls, 151-156
host-based vulnerability scanning, 155-156
intrusion detection, 154
intrusion prevention, 154
network vulnerability scanning, 154-155
overview, 151-154
overview, 140
reviewing services, installed applications, and scheduled tasks, 143-146
reviewing user rights and security options, 150-151
setting up and general controls, 140-143
wireless local-area networks (LAN) auditing, 267-274
See also mobile device auditing background, 263-265
knowledge base, 280
master checklists, 280
operational audit, 273-274
overview, 267
technical audit, 267-273
commercial WLAN security monitoring tools, 270
overview, 267-270
searching through MAC OUIs, 272-273
wardriving, 271-272
tools and technology, 279-280
wording, standard, 302
wscui.cpl tool, 139
wtmp log, 198