Index_T

 < Day Day Up > 



T

Take Ownership permission, files and folders, 2-9

tampering with data over wireless, 10-4

TCP/IP communications, 8-1

TCP/IP traffic flow, 4-17

templates for certificates, 7-19—7-30, 7-64

ACLs and permissions, 7-20

how to use, 7-21—7-24

permissions, 7-24—7-25, 7-65

superseding, 7-26—7-29

updating, 7-25—7-27

versions of, 7-21

Temporal Key Integrity Protocol (TKIP), 10-12

Terminal Server License Servers group, 2-27

Terminal Server Users group, 2-31

testing IPSec infrastructure, 8-21—8-22

testing updates (patches), 5-24—5-25, 5-33

TGT (Ticket-Granting Ticket), 1-13

third-party CAs, IPSec authentication, 8-20

This Organization group, 2-31

threats and vulnerabilities

dictionary attacks, 1-19, 10-10, 13-41

DNS attacks, 11-11

on public Web sites, 4-36

remote networking, 12-4

risks for, 7-48, 7-51, 10-3, 12-4

SID spoofing, 1-46

Trojan horses, 5-3

vulnerabilities to, 5-3, 6-3—6-15

wireless network threats, 10-3

threshold, account lockout, 1-22

Ticket-Granting Ticket, 1-13

TKIP (Temporal Key Integrity Protocol), 10-12

TLS vs. SSL, 11-31

Total Acquire parameter, 9-21

tracing for IKE negotiations, 9-28—9-29

Transport Bytes Sent/Received parameters, 9-23

Transport Layer Security (TSL), 4-44—4-45

transport mode, IPSec, 8-5, 8-7

Traverse Folder permission, 2-8

tree/root trusts, 1-43

Trojan horses, 5-3

troubleshooting

auditing, 2-50—2-54, 3-10, 4-45, 4-49—4-50, 5-35—5-36, 6-3—6-14, 7-13, 9-23—9-25

authentication, tools for, 1-16

authorization, 2-47—2-55, 2-57

IPSec protocol, 9-40—9-46

IPSec protocol suite, 15-32—15-39

publishing CRLs, 7-38

security templates, 3-31—3-45, 3-48—3-55, 13-24

SSL-encrypted connections, 11-19—11-20

update testing (patches), 5-24—5-25, 5-33

Trust List Signing certificate template, 7-22

Trust This Computer For Delegation options, 1-35

Trusted Sites zone, 4-6

trusts, 1-43—1-55

authentication protocols for, 1-44—1-45

creating, 1-47—1-48

group structure, planning, 16-13—16-20

SID filtering, 1-46—1-47

types of, 1-43

TSL (Transport Layer Security), 4-44—4-45

tuning security

analyzing configurations, 4-55—4-61

client roles, 4-3—4-14

performance issues, 1-19, 2-11, 2-20, 2-25, 5-16, 11-11, 12-4

server roles, 4-15—4-54

tunnel mode, IPSec, 8-5, 8-6—8-8

tunneling protocols, 12-4

L2TP (Layer Two Tunneling Protocol), 12-6—12-8, 12-32

PPTP (Point-to-Point Tunneling Protocol), 12-5—12-6



 < Day Day Up > 



MCSA(s)MCSE Self-Paced Training Kit Exam 70-299 (c) Implementing and Administering Security in a M[.  .. ]twork
MCSA/MCSE Self-Paced Training Kit (Exam 70-299): Implementing and Administering Security in a MicrosoftВ® Windows Server(TM) 2003 Network (Pro-Certification)
ISBN: 073562061X
EAN: 2147483647
Year: 2004
Pages: 217

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net