| < Day Day Up > |
|
/l update parameter, 6-28
L2TP (Layer Two Tunneling Protocol), 12-6—12-8, 12-32
LAN Manager (LM) authentication, 1-10—1-12
domain controllers, 1-26
levels of, 1-24
password disabling, 1-12
password storage, 1-11—1-12
latency, 1-19
LDAP
encrypting queries, 11-26—11-27, 11-34—11-37
LDAPS (LDAP over SSL), 11-26
port numbers for, 11-7
least privilege, 2-38
length, password, 1-21
license agreements, remote access, 12-35
life cycles
certificates, 7-6—7-7, 7-64
product, 5-10—5-11
lifetime, Kerberos tickets, 1-22—1-23
List Folder Contents permission, 2-7
List Folder permission, 2-8
lists, access control (ACLs), 2-3, 16-21
Account Group/ACL method of access control, 2-39—2-40
certificate templates, 7-20
multiple ACEs for users, 2-4
SIDs (security identifiers), 1-46—1-47
User/ACL method of access control, 2-39
LM authentication, 1-10—1-12
domain controllers, 1-26
levels of, 1-24
password disabling, 1-12
password storage, 1-11—1-12
LMHash weaknesses, 1-11
local groups, 2-21, 16-13
Local Intranet zone, 4-6
local IPSec policies, 8-17, 8-21
local policies, 3-10—3-11
Local Security Authority. See LSA (Local Security Authority)
local security authority subsystem (lsass.exe), 1-46
Local Service group, 2-30
Local Users and Groups tool, 2-32
lockouts (account)
IAS feature, 4-41
policies, 1-21—1-22, 3-10
/log update parameter, 6-29
Log Visits permission (Web sites), 4-38
logging
Active Directory, 4-29, 4-30
analyzing events, 2-52—2-54
DHCP servers, 4-25—4-26
DNS service, 4-28
dropped packets, IPSec (exercise), 9-26—9-28, 9-36
event log policies, 3-11
Exchange Server, 4-45
IAS servers, 4-42
IIS, 4-35—4-37
IKE tracing log, 9-28—9-29
SQL Server security, 4-49—4-50
long term key, Kerberos, 1-13
lost certificates, recovering, 7-46
archival process and, 7-49—7-50, 7-54
exporting keys, 7-47—7-49, 7-52
key recovery basics, 7-46—7-47
process of, 7-50—7-52, 7-54
LSA (Local Security Authority), 1-15
lsass.exe process, 1-46
| < Day Day Up > |
|