|
|
FEK key, 296, 304
File Encryption Key (FEK), 269, 304
file information, EFS, 7, 38-47
files
accessing encrypted, 275
compressed, and encryption, 273
decrypting, 279
encrypting, 272
exported certificate (fig.), 224
removing options to hide (fig.), 662
File System ACLs, upgrading from Windows NT to Windows 2000, 112
File System node, configuring, analyzing with Security Configuration and Analysis snap-in, 29, 30
File System Security node, 50-52
File Transfer Protocol (FTP), authentication and, 456
filter actions, 351
filter lists, 350
filters, IP Security, 354-355
Filter Wizard, 354-355
Finger service, and attack vunerabilities, 713
firewalls
configuring for IPSec traffic, 369
remote access issues, 589
fixes, Web site for download, 153
flexible negotiation policies, 353
folders, encrypting, 272
forensics of security incidents, 673-680
forests
in Active Directory domain (fig.), 10
described, 12-13, 481
forwarded tickets, Kerberos delegation, 469-470
freeware tools, 697
frequency-hopping spread-spectrum (FHSS), 391
Fresnel zone, 389
FTP protocol
attack vulnerabilities, 713
authentication and, 456
FTP service, disabling, 700
|
|