| < Day Day Up > |
|
e-mail relaying/spamming attacks, 5
EAP (Extensible Authentication Protocol), 85
Edit Rule Properties dialog box, 78, 78
EFS (Encrypting File System), 173, 173–174
EMS (Emergency Management Services),
See also remote network
defined, 390
design scenario, 396–397
direct serial connections, 392–393, 392
intelligent UPSes, 394–396, 395–396
modem serial connections, 393, 393
overview, 368, 372, 379
real world scenario, 395
Special Administration Consoles, 390–392, 391
terminal concentrators, 394, 395
Windows components, 390
encrypting data,
See also network
in demand-dial routing, 95–96
design scenarios, 72–73, 74, 91
enabling reversible encryption, 86–87, 86
files, 173–174, 173
folders, 174
in IIS, 245
using IP Security, 70, 71, 75–78, 76, 78, 89
using Layer 2 Tunneling Protocol/IPSec, 74, 75, 88–89
MMC snap-ins and, 381
using Point-to-Point Tunneling Protocol, 73–74, 73, 88
in remote transfers, 375
using Secure Sockets Layer, 70, 71–73, 71
using Server Message Block signing, 78–79
using Transport Layer Security, 70, 71, 72
in virtual private networks, 71, 88–91
Encrypting File System (EFS), 173, 173–174
Enforcement Properties dialog box, 332–334, 333
enforcing security policies,
See also security policies
overview, 10–11
real world scenario, 11
software restriction policies, 332–334, 333–335
on Windows Server 2003, 11–17, 13–15, 17
enterprise CAs (certificate authorities), 207
Enterprise Client environments, 292
Error Reporting Service, 251
escalation of privilege threats, 42, 43
ESP (Encapsulating Security Payload) headers, 75
Event Log settings, 330–331
Event Viewer, 48, 48
extended rights to AD objects, 162
Extensible Authentication Protocol (EAP), 85
external trusts, 130
external user accounts, 131, 133
| < Day Day Up > |
|