Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] L2TP/IPSec 2nd 3rd 4th 5thlabeling physical controlsLAN Manager (LM) [See passwords;LM (LAN Manager)]launch permissionsCOM/COM+ applications setting 2nd 3rd 4th 5th 6thLDAP server signing 2nd 3rdLDAP portsdomain controllers checking 2nd LDAP query groups (Authorization Manager)LDPdomain controller LDAP ports troubleshooting 2nd least privilege security principle 2ndlibrary applicationsCOM+ applications privilege limitationlifecycles certificates 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37thlinking GPOslinksGPOs enabling 2nd List Folder/Read Data file/folder permission (NTFS)LLSRPC RPC named pipe anonymous access LM 2nd 3rd 4th (LAN Manager) configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11thlegacy clients security improvementspassword hashes creatingpasswords requirements varaiations weakened security LMCompatibilty registry value 2ndlocal account policy (Group Policy) authentication management 2nd 3rd 4thlocal accountsaccess recovering 2nd 3rd 4th 5th local firewallslocal lognsdomain logons compared local logon authenticationlocal logons rights Local Policy 2nd 3rd 4th Local Security Authority (LSA) [See LSA (Local Security Authority)]Local Security Authority Subsystem (LSASS) [See LSASS (Local Security Authority Subsystem)] Local Security Policy Local Security Policy (Software Retriction Policy)LOCATOR named pipe anonymous access lockdowns 2nd 3rd 4th 5th locking down servicesLockoutstatus.exeevent logs monitoring 2nd Log On To user account restrictionloggingDHCP servers enablingevent logs baseline establishment 2nd Logon as a Batch Job right 2nd Logon as a Service right Logon Hours user account restrictionlogon process authentication anonymous logons domain logons interactive logons 2nd 3rd 4th network logons Kerberos authentication 2nd 3rd logon rights 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th local logons Logon as a Batch Job right 2nd Logon as a Service right Terminal Serviceslogon scriptsusers restricting and provisioning 2ndlogonsanonymous logons authentication batch logons cachedInteractive logons domain logons authenticationinteractive logons authentication 2nd 3rd 4th local logons network cleartext logonsnetwork logons authentication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd new credentials logons remote interactive logons service logons unlock logonslogsevent logs access control 2nd 3rd security monitoring 2nd 3rd 4th 5th 6th 7th verbose logging 2nd 3rd Loopback property (GPE) 2nd 3rd 4thloopbacksGPOs configuring 2nd 3rd 4thLSA (Local Security Authority) LSA (Local Security Authority) EFS (Encrypting File System) LSADUMP2LSASS (Local Security Authority Subsystem) |