I

 < Day Day Up > 



IIS protocol logging

Feature that, when enabled, logs every request received by the virtual server. You can use this information to track the user’s activities or to determine what an attack affected.

In-band remote management tools

The traditional tools that you use to manage your server, such as Terminal Services For Remote Administration or Active Directory Users And Computers.

infrastructure mode

Mode in which the wireless clients are required to use an access point to access the network and not use ad hoc connections to other clients.

integrated Windows authentication

Authentication method that uses the mechanism that Windows uses to authenticate computers and users in a domain. Either the NT LAN Manager (NTLM) protocol or Kerberos v5 will be used for authentication, depending on the client operating system. If you are using Windows 2000 or greater, Kerberos v5 will be used. Otherwise, the client will use NTLM authentication.

intelligent UPS (uninterruptable power supply)

This can form two connections to the server for use by EMS. It can connect using the standard serial connection and it can connect to the server through the AC power line. This means that not only can you manage the servers, you can remotely control the power to the servers.

intermediate CA

Also known as a policy CA, this is the CA that approves client requests for certificates, which are known as enrollment requests.

internal threats

Potential attacks that would be initiated from within the organization.

Internet zone rule

A rule within a software restriction policy that will grant or deny access to software by evaluating its origin in relation to the Internet zones specified in Windows.

interoperability constraints

Restrictions brought on when two applications cannot communicate with each other and therefore cannot support the security protocols used to authenticate users on a network.

IP address filtering

This involves filtering traffic based on the IP address of the client computer. You have two options to enable IP filtering: you can enable all traffic except traffic from the IP addresses listed, or you can exclude all IP addresses and allow only the IP addresses listed.

IP packet filtering

Filtering that prevents specific packets from reaching their destined ports on the server. This can be effective in guarding against packets for specific services that would not represent legitimate traffic to the server.

IP Security (IPSec)

A set of standards that will verify, authenticate, and encrypt data at the IP packet level. IPSec accomplishes this by authenticating the client and the server and exchanging keys that are used to encrypt and sign data.

Issuing CA

This is a CA that enrolls, deploys, and renews the certificates. The issuing CA is the CA that will communicate with the client applications and computers. It is the server that needs to be available all of the time for proper CA functionality.



 < Day Day Up > 



MCSE. Windows Server 2003 Network Security Design Study Guide Exam 70-298
MCSE: Windows(r) Server 2003 Network Security Design Study Guide (70-298)
ISBN: 0782143296
EAN: 2147483647
Year: 2004
Pages: 168

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net