Professional Windows Server 1002003 Security A Technical Reference [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Professional Windows Server 1002003 Security A Technical Reference [Electronic resources] - نسخه متنی

Roberta Bragg

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید







Index

[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]

S4U2Self (Service-for-User-to-Self) extension, Kerberos 2nd 3rd

SACL (System Access Control List)

Safe Mode

Software Restriction Policies

SafeDllSerachMode setting (security baseline templates)

SAM (Security Account Manager)

SAM (security accounts manager)

password hash storage

scanning

vunerabilities 2nd 3rd 4th 5th 6th 7th 8th 9th

Schema Admins group

forest-wide permissions

Schema Master FSMO

scope

groups 2nd

Scope of Managements (SOMs)
[See SOMs (Scope of Management)]

scopes

Authorization Manager 2nd 3rd 4th 5th 6th

ScreenSaverGracePeriod setting (security baseline templates)

scripts

Authorization Scripts 2nd 3rd 4th 5th 6th 7th 8th 9th

Scripts shutdown subfolder (GPO)

Scripts startup subfolder (GPO)

Scripts subfolder (GPO)

secedit command

security templates

applying 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

Secure Sockets Layer (SSL)
[See communication;SSL (Secure Sockets Layer)]

Securedc security template

Securews security template

security

information security

goal of 2nd 3rd

principles 2nd

attack surface reduction

auditing 2nd 3rd

availability

complete mediation 2nd

confidentiality 2nd 3rd 4th

defense in depth 2nd 3rd

diversity of mechanism 2nd

economy of mechanism

fail-safe defaults

integrity 2nd 3rd

least privilege 2nd

open designs

psychological acceptability 2nd

relevance

security policy

separation of duties 2nd

training and awareness

Security Account Manager (SAM)

security accounts manager (SAM)

password hash storage

security areas (networks)

segmenting

security assessment

security awareness

security baseline configuration

domain controllers 2nd

security boundaries (forests)

trusts 2nd 3rd 4th 5th 6th 7th 8th 9th

Security Descriptors

security filtering

GPOs

checking 2nd

security groups

security identifier (SID)
[See SID (security identifier)]

security levels

COM/COM+ applications

setting 2nd

Software Restriction Policies

hacking levels 2nd 3rd

setting 2nd

security logs

monitoring

security monitoring 2nd 3rd 4th 5th

Active Directory 2nd 3rd

dcdiag 2nd 3rd 4th

Group Policy 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th

replication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th

DHCP 2nd 3rd

DNS 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

event logs 2nd 3rd 4th 5th 6th 7th

Group Policy 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st

dcdiag 2nd 3rd 4th

replication 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th

network connectivity 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

performance monitoring 2nd 3rd 4th 5th 6th 7th 8th 9th

PKI (public key infrastructure) 2nd 3rd

remote access 2nd 3rd 4th

routing 2nd 3rd 4th

shares 2nd 3rd

Security Options 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th

baseline templates 2nd 3rd 4th 5th 6th 7th 8th 9th 10th

TCP/IP settings 2nd 3rd 4th

Domain controllers 2nd 3rd 4th 5th

establishing

Security Options (Group Policy)

Security permission (event logs)

security policies

implementing

security policy boundaries

Active Directory 2nd

security principals

anonymous access 2nd

Security Principals (authorization)

Security Reference Monitor (SRM) [See SRM (Security Reference Monitor)]

Security Support Provider Interface (SSPI). SSPI (Security Support Provider Interface)

Security Support Providers (SSP)
[See SSP (Security Support Providers)]

security template consoles

creating

security templates 2nd 3rd 4th 5th 6th 7th

applying 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th

baseline templates 2nd 3rd 4th 5th

Account Policies 2nd

categories

dowloading

reviewing

Security Options 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

services 2nd 3rd 4th

user rights 2nd 3rd 4th

computer roles

securing by 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st

configuring 2nd 3rd

creating 2nd 3rd

default security templates 2nd

GPOs

importing into

incremental templates 2nd 3rd 4th

DHCP servers 2nd 3rd 4th

DNS clients

DNS servers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th

DNS zones

downloading

infrastructure servers 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd

port blocking 2nd

service accounts

well-known account protection 2nd

WINS servers

modifying 2nd 3rd 4th 5th 6th

permissions

setting 2nd

testing

testing of

hacking contests

security updates 2nd 3rd 4th 5th

non-Internet computers

patches

Automatic Updates 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

directly applying

Software Update Services 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th

Windows Update Site 2nd 3rd

proactive updates

implementing 2nd 3rd 4th

reactive updates

implementing

security vunerability announcements

best practices

security vuneralibility announcements

Select Users or Groups dialog box 2nd

selective authentication

trusts 2nd

self-signed certificates 2nd 3rd

separation of duties security principle 2nd

Server Operators group

servers

DHCP servers

securing 2nd 3rd 4th

DNS servers

securing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

domain controllers

promoting to 2nd 3rd 4th 5th 6th 7th

infrastructure servers

securing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd

installing

as domain controllers 2nd 3rd

network authentication

configuring for 2nd

promoting to domain controller 2nd

WINS servers

securing

service accounts

securing

incremental templates

service administration

secure configuration 2nd 3rd

service logons

Service ticket (Kerberos)

Service-for-User-to-Self (S4U2Self) extension, Kerberos 2nd 3rd

services

baseline templates 2nd 3rd 4th

locking down services

session security

NTLM

NTLMv2 2nd 3rd

Set Value permission (registry)

Setup security template

Shadow Copy volumes 2nd 3rd

command-line administration

creating 2nd 3rd 4th 5th 6th 7th 8th

restoring 2nd 3rd

shared folders

Shadow Copy volumes 2nd 3rd

command-line administration

creating 2nd 3rd 4th 5th 6th 7th 8th

restoring 2nd 3rd

shares 2nd 3rd

anonymous access

limiting

best practices 2nd

creating 2nd 3rd 4th 5th 6th 7th

default permissions 2nd 3rd 4th

default shares 2nd 3rd

File and Printer Sharing mode 2nd 3rd

permissions

combining 2nd

remote administration

security monitoring 2nd 3rd

SMB shares

remote storage 2nd

sharing

encrypted files

EFS 2nd 3rd 4th 5th

shortcut trusts 2nd 3rd 4th 5th 6th

SID

relative identifiers

well-known SIDs

SID (security identifier)

SIDs

filtering 2nd 3rd

well-known SIDs

anonymous access 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th

signing (message)

SMB (server message block) signing 2nd 3rd

signing (server)

LDAP 2nd 3rd

silent decryption

EFS (Encrypting File System)

Simple Certificate Enrollment Protocol (SCEP) Add on for Certificate Services

single (symmetric) key encryption

EFS (Encrypting File System) 2nd 3rd 4th 5th 6th 7th 8th 9th

sites

Active Directory 2nd

small offices

domain controllers

physical security 2nd 3rd 4th 5th 6th 7th

smart cards

authentication 2nd

Certificate Services 2nd

SMB

WebDAV

compared

SMB (server message block) signing 2nd 3rd

SMB shares

remote storage 2nd

SMB signing

requiring

SMS (Systems Management Server)

software

authorization

Authorization Manager 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st 62nd 63rd 64th 65th 66th 67th 68th

Component Services 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th

Software Restriction Policy 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th 30th 31st 32nd 33rd 34th 35th 36th 37th 38th 39th 40th 41st 42nd 43rd 44th 45th 46th 47th 48th 49th 50th 51st 52nd 53rd 54th 55th 56th 57th 58th 59th 60th 61st

cryptographic software

Federal Information Processing Standard (FIPS) 140-1

legacy application permissions 2nd 3rd 4th

Software Restriction Policies 2nd 3rd 4th 5th 6th

anti-virus protection

compared

automatic path rules

best practices 2nd 3rd

COM+ applications

setting 2nd 3rd

creating 2nd 3rd

designated file types

establishing 2nd 3rd

enforcement

determining 2nd 3rd

example

software restriction policies

Group Policy

Software Restriction Policies

limitations 2nd 3rd

Local Security Policy

rules

certificate rules 2nd 3rd

creating 2nd 3rd 4th 5th

hash rules 2nd 3rd 4th 5th

Internet zone rules 2nd

path rules 2nd 3rd 4th 5th

registry rules 2nd 3rd 4th 5th

Safe Mode

security levels

hacking levels 2nd 3rd

setting 2nd

troubleshooting 2nd 3rd

trusted publishers 2nd 3rd

Software Update Services 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th

SOMs (Scope of Management)

sonar

FRS functionality

checking 2nd

Sonar

FRS traffic levels

monitoring 2nd 3rd 4th

spoofs

SID spoofs

catching 2nd 3rd

SPOOLSS named pipe

anonymous access

SQLnamed pipe

anonymous access

SRM (Security Reference Monitor) 2nd

SRV (Service Locator) resource records (DNS) 2nd

SSL 2nd 3rd 4th

(Secure Sockets Layer)

implementing

IIS 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

SSP

(Security Support Providers)

SSPI (Security Support Provider Interface)

standalone root CAs

configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th

Standalone Root Certification Authority

standalone servers

built-in groups

groups

managing 2nd 3rd 4th 5th 6th 7th 8th 9th

users

managing 2nd 3rd 4th 5th 6th 7th 8th 9th

Standalone Subordinate Certification Authority

standar template types

certificate templates

standards

auditing

backups

Startup Key dialog box

startup mode

basline template services

Store password using reversible encryption user account restriction

Store passwords using reversible encryption option (Password Policy)

subfolders

GPOs

subordinate CAs

autoenrollment

configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th

configuring 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th

installing 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th 17th 18th 19th 20th 21st 22nd 23rd 24th 25th 26th 27th 28th 29th

role separations

establishing 2nd 3rd 4th 5th 6th

superceding

certificate templates 2nd

Support Tools group (Windows 2003 Server installation CD)

Group Policy

troubleshooting

SUS servers

Automatic Update clients

configuring 2nd 3rd 4th

configuring 2nd 3rd 4th 5th 6th

hierarchies 2nd 3rd

installing 2nd 3rd 4th 5th 6th 7th 8th

offline SUS servers

preparing 2nd

securing 2nd

symmetric (single) key encryption

EFS (Encrypting File System) 2nd 3rd 4th 5th 6th 7th 8th 9th

symmetric key cryptography

public key cryptography

compared

SynAttackProtect setting (security baseline templates)

synchronization

external timeservers 2nd 3rd 4th 5th 6th

synchronization (time)

trust relationships

Synchronize file/folder permission (NTFS)

Syskey

syskey

Syskey

account database

protecting 2nd 3rd 4th 5th

syskey

configuring

starting

System Access Control List (SACL)
[See SACL (System Access Control List)]

System File Checker

System log permission (event logs)

System Restore

EFS (Encrypting File System)

system services

domain controllers 2nd 3rd

system services (Group Policy)

system state backups

ntbackup tool 2nd 3rd 4th

system user accounts

systems state backups

restoring 2nd

Sysvol share


/ 194