Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] KCC (Knowledge Consistency Checker) KDC (Key Distribution Center), Kerberos KeepAliveTime setting (security baseline templates) Kerberos 2nd 3rd 4th 5th 6th Authenticator domain use 2nd KDC (Key Distribution Center) logon process 2nd 3rdmonoculture dangers of policy configuration 2nd resource access 2nd 3rd 4th constrained delegation 2nd 3rd 4th 5th delegation 2nd 3rd domain forest 2nd 3rd protocol transition 2nd 3rd S4U2Self (Service-for-User-to-Self) extension 2nd 3rd tickets Referral ticket Service ticket TGT (Ticket Granting Ticket)trusts inter-domain Kerberos trusts 2nd 3rd Kerberos Policy 2nd 3rd Key Distribution Center (KDC), Kerberos Key Recovery Agent Certificate 2ndkey recovery agentsencrypted files openingkeysarchiving EFS (Encrypting File System) 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24thbacking up Certificates console 2nd 3rd certutil command 2nd EFS (Encrypting File System) 2nd 3rdimporting EFS (Encrypting File System) 2nd 3rd keyspaces PKI (Public Key Infrastructure) 2nd 3rd 4th archivingprivate key removal EFS (Encrypting File System)private keys disabling public key cryptographypublic keys strength of keyspaces Knowledge Consistency Checker (KCC)Ksecdd EFS (Encrypting File System) |