| < Day Day Up > |
|
A collection of out-of-band management tools that enable the ability to manage a Windows Server 2003 machine when it is no longer responding to in-band management tools. You can access the EMS through a terminal emulator, like HyperTerminal, that connects to a serial port on the server.
The process of requesting and installing the certificates for the user, computers, or services that participate in the PKI.
This takes advantage of Active Directory to control the enrollment process. This means that you can use Group Policy to manage and distribute client certificates. You can also use the certificate templates to create a certificate.
Rights used for special operations that apply to specific types of Active Directory objects.
A standard way of adding additional authentication protocols to Point-to-Point Protocol (PPP). EAP provides support for certificate-based authentication, smart cards, and other protocols like RSA’s SecurID. It allows third-party companies to provide even stronger authentication protocols to meet your company’s security needs.
Threats that represent the potential for an attack to be initiated from outside of your organization, such as threats originating from the Internet.
A nontransitive trust between an Active Directory domain and an external Windows domain, such as an NT 4 domain or a domain that is in a separate forest and doesn’t have a forest trust with the source domain.
| < Day Day Up > |
|