| < Day Day Up > |
|
Take Ownership permission, files and folders, 2-9
tampering with data over wireless, 10-4
TCP/IP communications, 8-1
TCP/IP traffic flow, 4-17
templates for certificates, 7-19—7-30, 7-64
ACLs and permissions, 7-20
how to use, 7-21—7-24
permissions, 7-24—7-25, 7-65
superseding, 7-26—7-29
updating, 7-25—7-27
versions of, 7-21
Temporal Key Integrity Protocol (TKIP), 10-12
Terminal Server License Servers group, 2-27
Terminal Server Users group, 2-31
testing IPSec infrastructure, 8-21—8-22
testing updates (patches), 5-24—5-25, 5-33
TGT (Ticket-Granting Ticket), 1-13
third-party CAs, IPSec authentication, 8-20
This Organization group, 2-31
threats and vulnerabilities
dictionary attacks, 1-19, 10-10, 13-41
DNS attacks, 11-11
on public Web sites, 4-36
remote networking, 12-4
risks for, 7-48, 7-51, 10-3, 12-4
SID spoofing, 1-46
Trojan horses, 5-3
vulnerabilities to, 5-3, 6-3—6-15
wireless network threats, 10-3
threshold, account lockout, 1-22
Ticket-Granting Ticket, 1-13
TKIP (Temporal Key Integrity Protocol), 10-12
TLS vs. SSL, 11-31
Total Acquire parameter, 9-21
tracing for IKE negotiations, 9-28—9-29
Transport Bytes Sent/Received parameters, 9-23
Transport Layer Security (TSL), 4-44—4-45
transport mode, IPSec, 8-5, 8-7
Traverse Folder permission, 2-8
tree/root trusts, 1-43
Trojan horses, 5-3
troubleshooting
auditing, 2-50—2-54, 3-10, 4-45, 4-49—4-50, 5-35—5-36, 6-3—6-14, 7-13, 9-23—9-25
authentication, tools for, 1-16
authorization, 2-47—2-55, 2-57
IPSec protocol, 9-40—9-46
IPSec protocol suite, 15-32—15-39
publishing CRLs, 7-38
security templates, 3-31—3-45, 3-48—3-55, 13-24
SSL-encrypted connections, 11-19—11-20
update testing (patches), 5-24—5-25, 5-33
Trust List Signing certificate template, 7-22
Trust This Computer For Delegation options, 1-35
Trusted Sites zone, 4-6
trusts, 1-43—1-55
authentication protocols for, 1-44—1-45
creating, 1-47—1-48
group structure, planning, 16-13—16-20
SID filtering, 1-46—1-47
types of, 1-43
TSL (Transport Layer Security), 4-44—4-45
tuning security
analyzing configurations, 4-55—4-61
client roles, 4-3—4-14
performance issues, 1-19, 2-11, 2-20, 2-25, 5-16, 11-11, 12-4
server roles, 4-15—4-54
tunnel mode, IPSec, 8-5, 8-6—8-8
tunneling protocols, 12-4
L2TP (Layer Two Tunneling Protocol), 12-6—12-8, 12-32
PPTP (Point-to-Point Tunneling Protocol), 12-5—12-6
| < Day Day Up > |
|