Index_E


E

EAP (Extensible Authentication Protocol), 39
EAS (Exchange Server ActiveSync), 395, 396 “99
ECC( elliptic-curve cryptography) algorithms, 26
Economic Espionage Act of 1996, 455
ECPA (Electronic Communications Privacy Act of 1986), 449 “50
EFF (Electronic Frontier Foundation), 460
EFS (Encrypting File System), 81
electrical power, 79
Electronic Communication Privacy Act of 1986 (ECPA), 449 “50
Electronic Frontier Foundation (EFF), 460
Electronic Funds Transfer Act, 450
Electronic Privacy Information Center (EPIC), 460
ElGamal algorithm, 26
elliptic-curve cryptography (ECC) algorithms, 26
e-mail, 249 “92
additional reading, 291
Certificate Services installation, 273 “77
Certificate Services management, 286 “90
content control ( see content control)
Exchange-PKI and, 249 “50
Internet crime and, 453 “56
monitoring, 456 “58
privacy laws, 448
rights management and, 251 “52
S/MIME encryption ( see S/MIME (Secure/Multipurpose Internet Mail Extensions), encryption infrastructure)
S/MIME vs. RM, 252 “53
security auditing, 441 “42
Encapsulating Security Payload (ESP), 32
Encrypting File System (EFS), 81
encryption
confidentiality and, 9
laws of security and, 467
mobile devices, 83
Outlook, 318 “20
public-key. ( see public-key encryption)
rights management, 251
RPC traffic between Outlook and Exchange, 333
S/MIME. ( see S/MIME (Secure/Multipurpose Internet Mail Extensions), encryption infrastructure)
S/MIME document and message, 254
secret-key ( see secret-key encryption)
viruses, 200 “201
Encryption Configuration, KMS, 280
end-to-end security, S/MIME, 35
end user license agreement (EULA), 95
end users, security laws. See security laws, for end users
enrollment
KMS, 282 “84
overview of, 268 “70
smart card, 272
Web, 277 “78, 290
Enterprise Admins group
danger of, 49
Exchange permissions granted to, 53
enterprise CAs
overview of, 260 “61
revocation and, 270 “72
smart card enrollment, 272
EPIC (Electronic Privacy Information Center), 460
escalation of privilege attacks, 66, 71
ESE (Extensible Storage Engine), 208 “9
ESP (Encapsulating Security Payload), 33
Ethernet, 39 “40
ETRN, 160
EULA (end user license agreement), 95
EumpEl.exe, 433
EventCombMT, 430 “32
Event Log service, 299 “300
event logs
additional reading, 437
analysis tools, 430 “33
setting auditing policies, 110
Windows 2003 systems, 425
EventQuery.vbs, 433
events
account logon events, 435
account management, 434 “35
logon, 435 “36
privilege use, 436
event sink
additional reading, 190
archive sink as, 190 “92
overview of, 177
perimeter antivirus scanners as, 204
writing, 182 “83
EVERYONE pseudo-group, 49
Exchange 2000 Server. See Microsoft Exchange 2000 Server
Exchange Administration Delegation Wizard, 56 “58
Exchange Administrator role, 57
Exchange canonical ACL format, 51 “52
Exchange Full Administrator role, 57
Exchange installation, 440
Exchange Server 2003. See Microsoft Exchange Server 2003
Exchange Server 5.5. See Microsoft Exchange Server 5.5
Exchange Server ActiveSync (EAS), 395 “99
Exchange System Manager
installing SSL certificate, 216 “17
online CA, 217 “19
OWA access control, 347
Exchange View Only permission, 57, 138
Exclaimer, 184
exemptions, IPSec policy, 231
ExIFS (Exchange Installable File System) driver, 55 “56
Exmerge
additional reading, 190
searching for specific content with, 195 “96
explicit logon, OWA, 338 “39
exploits, 70
exporting digital certificates, 315 “16
express policies retention, 459
Extensible Authentication Protocol (EAP), 39
Extensible Markup Language (XML) file, 93, 95
Extensible rights Markup Language (XrML)
digital IDs as, 250
securing Outlook with IRM, 302
working with Windows RM, 251 “52
Extensible Storage Engine (ESE) APIs, 208 “9
external CAs, 314 “15



Secure Messaging with Microsoft Exchange Server 2003
Secure Messaging with MicrosoftВ® Exchange Server 2003 (Pro-Other)
ISBN: 0735619905
EAN: 2147483647
Year: 2004
Pages: 189

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net