|
|
CAB format, and XML files, 140
cache, credentials, 478
Carrier Sense Multiple Access with Collision Detection (CSMA/CD), 392-394
CAs. See certification authorities (CAs)
Cerberus, 463
certificate authorities (CAs)
advanced management issues, 240-246
backing up, restoring CA server, 237-238
choosing type (fig.), 214
configuring automatic certificate enrollment, 234-235
configuring public key Group Policy, 234
configuring Trusted Root, 236-237
described, 208, 332
identifying information (fig.), 215
installing certificate services, 213-217
need for stand-alone, 217
reasons for support model containing multiple, 210
selecting database storage, 215
trust and validation, 212
types, 209, 216
Windows 2000, 212-213
Certificate Distribution Lists (CDLs), viewing current, 230
Certificate Distribution Points (CDPs), 229, 231
Certificate Export Wizard, 108-110
certificate hierarchies, 211
Certificate Import Wizard, 226
Certificate Management snap-in, adding for local computer (fig.), 347
certificate mapping, client, 500-502
Certificate Request Wizard, 217, 286
certificate revocation list (CRL), 209, 229-231
certificates
adding to root store (fig.), 226
advanced management issues, 240-246
described, 207
exporting, importing, 222-226
hierarchies, 211
listing issued (fig.), 227
publishing in Active Directory, 241
requesting, 217-222
revoking, 226-229
smartcards and, 533
templates, configuring, 231-233
Windows XP auto-enrollment of, 244-246
X.509v3 properties (table), 208
Certificate Services
installing, 213-216
using Web interface, 220-222
Certificates Snap-in, 341
certificate templates, 231-233
chain of custody, evidence in crimes, 678
Challenge Handshake Authentication Protocol (CHAP), 530
channels, 391
CHAP (Challenge Handshake Authentication Protocol), 530
Chargen attacks, 712
checking connected VPN port status, 561
chips, 391
cipher block chaining (CBC), 334-335
ciphers and compromised key attacks, 327
ciphertext, 201
Cipher Utility
command switches (table), 281
summary of, 304
using in Windows 2000, 280-282
cleartext authentication, 489
click kiddies, 656, 696
client certificate mapping, 500-501
Client (Respond Only) IPSec policy, 348
clients
legacy, issues, 113-114
requesting server access (fig.), 465
clocks, synchronizing, 633
CMAK (Connection Manager Administration Kit), 576, 580, 596
Code Red worm, 136, 152, 327
command line
analyzing updates with MBSA, 150-151
starting IP Security Monitor at, 338
tools, 30-31
commands
cipher, 281-282
secpol.msc, 108
Common Internet File System (CIFS), 490
companion viruses, 659
compatibility, applications and updates, 182
compatws.inf, 22
compression, encryption and, 309
compromised key attacks, 327
computer forensics, 674
computers
analyzing your, 137-139
installing updates on new, 155
IP Security Policies, 337
Computer Security Incident Response Team (CSIRT), 651, 654
confidentiality
IP security and, 334
and secure communications, 372
confidentiality of data, 268
configurations, wireless LAN, 386
configuring
Account Lockout settings, 54
anonymous, basic, digest, and integrated Windows Web site authentication, 506
automatic certificate enrollment, 234
Automatic Updates, 177-180
basic Windows 2000 security with templates, 32-52
certificate templates, 231-233
domain account service for Kerberos delegation, 477
domain-level security policy (fig.), 25
File System security, 51-52
IIS log files, 631
interoperability with legacy Windows clients, 490-492
L2TP ports, 561-562
local host service for Kerberos delegation, 476
network clients for secure remote access, 573-582
Password History setting (fig.), 54
publication of CRLs, 229-231
public key Group Policy, 234-237
Registry Security, 48-50
remote access policies, 562-563
remote access profiles, 567-571
remote access server, 534-541
Restricted Groups, 45-46
role-based server security, 86-107
script maps, 103-104
security for the enterprise (fig.), 88
security templates, 54-55
servers to require NTLMv2, 492-493
SMB signing (fig.), 119
Software Update Services, 173-177
System Services security, 47-48
Trusted Root CAs, 236-237
trusts with Active Directory domains and trusts, 486-487
trusts with Netdom, 487-488
UNIX server interoperability, 489
user authentication, 488-496, 515-516
user for Kerberos delegation (fig.), 475
VPN servers, 546-556
Web authentication, 497-511, 516
Web authentication using SSL, 508-510
Web site authentication, 502
Windows 9.x clients to use NTLMv2, 496
Windows NT 4.0 clients to use NTLMv2, 495
Connection Manager Administration Kit (CMAK), 576, 580, 596
Connection Manager, allowing users to use, 582
connections
making new, 577
wired network, 385
container objects, described, 17
contiguous namespace, 10
copying encrypted files, 276
cordless phones, 390
corporate assets, categorizing (table), 344
Corporate Windows Update, 172
crackers, cracking described, 323, 655
creating
dynamic phone books, 579
EFS recovery agent, 285
filters, 356-359
IPSec MMC console, 346
remote access policies, 563-567
RIS CD-based installation image, 162-166
secure workstations, 107-112
Security Configuration Tool Set user interface, 31
security console, 32
security policies, 356-369
static phone book, 578
credentials cache, 478
crime scenes and forensics, 673-680
cross-domain authentication (fig.), 468
cryptanalysts, 266
CryptoAPI, 294
Cryptographic Service Provider (CSP), 215, 294
cryptography
described, 200, 264
function types, 247
IP security. See IP security
public key, 201-202
public key (asymmetric), 268
secret key algorithm (fig.), 269
secret key (symmetric), 269
CSIRT (Computer Security Incident Response Team), 651
CSMA/CD and CSMA/CA, 393-394
Cult of the Dead Cow (CDC), 665
Custom Security Method Settings dialog box (fig.), 354
Cybercrime: Computer Forensics Handbook (Shinder), 264
|
|