| < Day Day Up > |
|
Phase 2 of the IP Security (IPSec) negotiation process. Quick Mode negotiation occurs after Main Mode negotiation to establish a session key to be used for encryption until the next Quick Mode negotiation is scheduled to occur.
A standardized service that network equipment, such as a Wireless Access Protocol (WAP), can use to authenticate users.
An open standard for encrypting network communications and authenticating clients or servers.
A collection of security patches, critical updates, other updates, and hotfixes released as a cumulative offering or targeted at a single product component, such as Internet Information Services (IIS) or Microsoft Internet Explorer. Allows for easier deployment of multiple software updates.
A physical file representation of a security configuration that can be applied to a local computer or imported to a Group Policy Object (GPO) in Active Directory. When you import a security template to a GPO, Group Policy processes the template and makes the corresponding changes to the members of that GPO, which can be users or computers.
A broadly released fix that addresses a security vulnerability for a specific product. A security patch is often described as having a severity, which actually refers to the Microsoft Security Response Center (MSRC) severity rating of the vulnerability that the security patch addresses.
A cumulative set of hotfixes, security patches, critical updates, and other updates that have been released since the release of the product, including many resolved problems that have not been made available through any other software updates. Service packs might also contain a limited number of customer- requested design changes or features. Service packs are broadly distributed and are more thoroughly tested by Microsoft than any other software updates.
The name of the wireless network that is used by the client to identify the correct settings and credential type to use for the wireless network.
The password that the wireless clients, the Wireless Access Protocol (WAP), and often the RADIUS server have access to. The shared secret is used to build the encryption key.
A two-way, reversible encryption mechanism for authenticating Point to Point Protocol (PPP) connections employed by Shiva remote access servers.
A certificate template that is highly restricted and can only be used for a single function.
The process of integrating a service pack into operating system setup files so that new computers immediately have the service pack installed.
Groups created by Windows Server 2003 whose membership is dynamic and determined by the way a user interacts with the system.
A term used to describe the traditional implementation of Wired Equivalent Privacy (WEP), in which a shared secret is manually configured and does not change on a regular basis.
The subject name listed in an Secure Socket Layer (SSL) certificate. If the subject name in the certificate does not exactly match the name in the user’s browser, the browser will display a warning message.
Used by system administrators to control user and computer configurations for operating systems prior to Windows 2000 from a single location on a network. System policies propagate registry settings to a large number of computers without requiring the administrator to have detailed knowledge of the registry.
A method for encrypting tunneled traffic to protect the privacy of communications.
An IP Security (IPSec) mode wherein only a portion of the packet, including the Transport and Application layer data, is encapsulated by IPSec. Used to provide IPSec protection for communications between two hosts.
The mechanisms that ensure that users who are authenticated in their own domains can access resources in any trusted domain.
An IP Security (IPSec) mode wherein IPSec encapsulates entire packets. Used to provide IPSec protection for communications to a network with multiple hosts.
| < Day Day Up > |
|