| < Day Day Up > |
|
hardening computers for roles. See client roles
hardware SSL accelerators, 11-11
hash, password, 1-11
hash rules (software restriction policy), 4-5
Help and Support Center, 3-35
/help update parameter, 6-29
HFNetChk mode, MBSACLI utility, 6-6, 6-9—6-11
hierarchies, CA (certificate authority), 7-9—7-11, 7-13—7-16
Hisecdc.inf template, 3-5
Hisecws.inf template, 3-5, 4-7
history, passwords, 1-21
HKEY_LOCAL_MACHINE hive, access to (example), 13-17
host-based firewalls, 4-16
host-to-host communications, IPSec with, 8-4—8-5
host-to-network communications, IPSec with, 8-6—8-8, 15-51—15-54
hot spot security (wireless), 10-1—10-40, 15-40—15-49
configuring, 10-17—10-36
disabling SSID broadcasts, 10-14
MAC address filtering, 10-13
remote access, 8-6—8-8, 10-8, 10-10, 10-22—10-24, 12-1—12-46, 15-51—15-54
threats and risks, list of, 10-3—10-4
VPN clients, 10-14
WEP (Wired Equivalent Privacy), 10-4—10-11, 10-20, 12-12, 15-42
WPA (Wi-Fi Protected Access), 10-11—10-13
hotfixes, 5-3, 5-8—5-9, 5-44
assessing current status, 5-15—5-16, 5-29—5-30, 14-15—14-26
deploying, in general, 14-27—14-33
deploying on existing clients, 6-27—6-53
deploying on new clients, 6-15—6-26
deployment planning, 14-4—14-13
patch management, 5-1—5-44, 6-3—6-53, 14-1, 14-4—14-13, 14-15—14-33
rolling back (example), 14-9
HTML, port numbers for, 11-7
HTTPS (Hypertext Transfer Protocol Secure)
IIS support, 4-37—4-38, 11-10—11-25, 15-50
requiring, 11-15
| < Day Day Up > |
|