Index_R


R

RADIUS (Remote Authentication Dial-In User Service), 39
RAID (Redundant Array of Independent Disks), 273
RBLs (real-time block lists), 173 “76, 180
RC n algorithms, 19
readings , additional. See information resources
Really Simple Syndication (RSS), 91
real-time block lists (RBLs), 173 “76, 180
recipient address filtering, 171
records management, 458 “59. See also DCAR (discovery, compliance, archive, and retrieval)
Redundant Array of Independent Disks (RAID), 273
rekeying, 265
relaying. See SMTP (Simple Mail Transfer Protocol) relaying
Remote Authentication Dial-In User Service (RADIUS), 39
remote procedure calls. See RPCs (remote procedure calls)
remote procedure calls over HTTPS. See RPCs (remote procedure calls) over HTTPS
renewal process, certificates, 266 “67
replication, Active Directory, 130
repudiation , STRIDE model, 71
Request Security (Server) policy, 229
Require Security (Secure Server) policy, 229
resource controls, 5 “7
resources. See information resources
Respond Only (Client) policy, 229
Restricted Sites zone, 299 “300
restrictions
attachments and OWA, 362 “63
filtering spam by recipient address, 171
relaying, 159 “60
securing mobile devices, 400
SMTP connector, 161 “62
resultant set of policies (RSoP), 109
retention
archival policy and, 408
expiring materials and, 419
express policies and, 459
government records and, 459
key players in, 409
litigation and, 420
overview of, 406 “7
retrieval. See DCAR (discovery, compliance, archive, and retrieval)
Return Status Code, 174 “75
revocation, certificate, 284, 288
rights management. See RM (rights management)
Rights Management Services. See RMS (Rights Management Services)
RIM Blackberry software, 395
risk assessment. See also threats
additional reading, 74
antivirus protection, 210 “11
asset inventories and, 72 “74
laws of security administration, 474 “75
operational security, 76 “77, 84
overview of, 61 “62
physical security, 76 “77
STAVE model, 67 “70
STRIDE model, 70 “72
Rivest-Shamir-Adelman (RSA) algorithm, 25
RM (rights management)
components , 251
e-mail security, 249 “50
overview of, 13
securing Outlook with IRM, 302, 324 “27
S/MIME compared to, 252 “53
working with, 251 “52
RMS (Rights Management Services)
additional reading, 334
licensing, 251 “52
overview of, 250
rights management, 251
securing Outlook with IRM, 302, 324 “27
working with Windows RM, 251 “52
roles, 56 “58
root CAs
designing certificate hierarchy, 258 “59
key lengths, 264 “65
protecting, 261
taking offline, 261
RPCs (remote procedure calls)
encrypting traffic, 333
firewall ports, 368 “69
RPCs (remote procedure calls) over HTTPS, 242 “47
configuring ports, 245 “46
defined, 44
disabling DCOM, 246 “47
mobile Exchange access with, 393
opening correct firewall ports, 368
Outlook and, 301, 310 “12
Outlook security, 301
overview of, 242 “44
setting up, 244 “45
troubleshooting, 247
RSA (Rivest-Shamir-Adelman) algorithm, 25
RSoP (resultant set of policies), 109
RSS (Really Simple Syndication), 91
RSVP protocol, 231
rules
IPSec security, 229 “30, 234 “35
legal ( see legal issues)
publishing MAPI RPCs with ISA server, 240 “41
Web publishing, 377 “78



Secure Messaging with Microsoft Exchange Server 2003
Secure Messaging with MicrosoftВ® Exchange Server 2003 (Pro-Other)
ISBN: 0735619905
EAN: 2147483647
Year: 2004
Pages: 189

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net