| < Day Day Up > |
|
Feature that, when enabled, logs every request received by the virtual server. You can use this information to track the user’s activities or to determine what an attack affected.
The traditional tools that you use to manage your server, such as Terminal Services For Remote Administration or Active Directory Users And Computers.
Mode in which the wireless clients are required to use an access point to access the network and not use ad hoc connections to other clients.
Authentication method that uses the mechanism that Windows uses to authenticate computers and users in a domain. Either the NT LAN Manager (NTLM) protocol or Kerberos v5 will be used for authentication, depending on the client operating system. If you are using Windows 2000 or greater, Kerberos v5 will be used. Otherwise, the client will use NTLM authentication.
This can form two connections to the server for use by EMS. It can connect using the standard serial connection and it can connect to the server through the AC power line. This means that not only can you manage the servers, you can remotely control the power to the servers.
Also known as a policy CA, this is the CA that approves client requests for certificates, which are known as enrollment requests.
Potential attacks that would be initiated from within the organization.
A rule within a software restriction policy that will grant or deny access to software by evaluating its origin in relation to the Internet zones specified in Windows.
Restrictions brought on when two applications cannot communicate with each other and therefore cannot support the security protocols used to authenticate users on a network.
This involves filtering traffic based on the IP address of the client computer. You have two options to enable IP filtering: you can enable all traffic except traffic from the IP addresses listed, or you can exclude all IP addresses and allow only the IP addresses listed.
Filtering that prevents specific packets from reaching their destined ports on the server. This can be effective in guarding against packets for specific services that would not represent legitimate traffic to the server.
A set of standards that will verify, authenticate, and encrypt data at the IP packet level. IPSec accomplishes this by authenticating the client and the server and exchanging keys that are used to encrypt and sign data.
This is a CA that enrolls, deploys, and renews the certificates. The issuing CA is the CA that will communicate with the client applications and computers. It is the server that needs to be available all of the time for proper CA functionality.
| < Day Day Up > |
|