|
|
IAS, securing, 106-107
ICANN, 711
IDS (intrusion detection system), 609
IEEE 8095 standard, and wireless networking technology, 388
IIS
auditing, 630-631
password control, 508
requesting server certificate for server, 504
securing servers, 99
stopping, 216
Unicode translation problems, 101
updating, importance of, 101
IIS 5.0-supported authentication methods (table), 503
IIS Lockdown tool
locking down Exchange servers with, 98
locking down IIS servers with, 102-106
securing SQL Server with, 93-95
IIS servers
locking down with IIS Lockdown tool, 102-106
locking down with URLScan tool, 100-102
IIS Web Publishing Service, disabling, 700
IKE, 336, 372
'I Love You' bug, 659
impersonating users, 295
impersonation, spoofing and, 322
implementing new security policies, 356-359
importing
certificate from Trust Root CA, 225-226
security templates, 55-57
security templates at domain level, 59-60
security templates at OU level, 57-58
templates (fig.), 91
incident response plans, 654, 672-673
Industrial, Scientific, and Medical (ISM) band, 390
installations, upgrade, 112
installing
Automatic Updates, 177-180
Certificate Services, 213-216
directory services client, 491
MBSA, 147-148
PGP, 706
remote access server, 535-540
RIS, 158-162
Software Update Services, 173-177
SSH, 705
updates on new computers, 155
VPN servers, 547-556
Integrated Services Digital Network (ISDN), 529
Integrated Windows Authentication (IWA), 500
integrity, message, 329
IntelliMirror, 177
interference, multipath, 390
International Telecommunications Union (ITU), X.509v3 standard, 207-208
International Telecommunications Union (ITU-T), 11
Internet, importance of updates, hotfixes, 152
Internet Access Servers. See IAS
Internet Control Message Protocol (ICMP), SMURF attacks and, 325
Internet Corporation for Assigned Names and Numbers (ICANN), 711
Internet Engineering Task Force (IETF), 480
Internet Information Services. See IIS
Internet Key Exchange (IKE), 558
Internet pornography, 674
Internet Protocol Security (IPSec), 558-559
Internet Security Association Key Management Protocol. See ISAKMP/Oakley Protocol
Internet Service Providers. See ISPs
interoperability
configuring UNIX server, 489-490
configuring with legacy Windows clients, 490-491
intrusion detection system (IDS), 609
IP addresses, port numbers and, 711
IP Filter List dialog box (fig.), 351, 362
IP Filter Wizard, 362
IPSec, Policy Agent, 562
IPSec cryptographic services, 329-333
IPSec (Internet Protocol Security), 558-559
IPSec key management, 335
ipsecmon.exe, 338
IPSec Policies snap-in and tasks (fig.), 338
IPSec Policy Agent service, 340-341
IP security
authentication header (AH), 335
compatibility notes, 369
confidentiality, 334
custom IPSec Management console (fig.), 347
deploying with certificates, 342
DNS names and, 349
ESP protocol, 336
filter actions, 351
flexible negotiation policies, 353
IPSec cryptographic services, 329
IPSec policies, built-in (fig.), 348
message authentication, 331-334
message integrity, 329-331
overview, 328
policies, 337, 341, 345-347
rules, 350
security associations and key management procedures, 335-337
security levels, determining, 345
Security Log, 342
TCP/IP Advanced options, 341
troubleshooting, 343-371
IP Security Filter Action Wizard, 365
IP Security Monitor, 338-340
IP Security Policy Wizard, 359-360
IP spoofing, 322
ISAKMP/Oakley protocol, 558
ISAKMP/Oakley Protocol SA process, 336, 337
ISAKMP SA, 336, 372
ISDN (Integrated Services Digital Network), 529
ISPs, VPN problems due to, 584
IWA. See Integrated Windows Authentication (IWC)
|
|