Index[SYMBOL][A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z] V2 certificates requestingvalidity periods certificates verbose logging 2nd 3rd Verisignviewing EFS certificates inherited permissionsvirtual directoriescreating WebDAV 2nd 3rdsecurity configuration WebDAV 2nd 3rd Volume Shadow Copy Volume Shadow Copy Service 2nd 3rdshadow copy volumes command-line administration creating 2nd 3rd 4th 5th 6th 7th 8th restoring 2nd 3rd VPNs 2nd auditing 2nd 3rd 4th 5th 6th 7th demand-dial VPNsprotocols firewall ports 2ndremote access L2TP/IPSec 2nd 3rd 4th 5th NAT-T 2nd PPTP (Point-to-Point Tunneling Protocol) 2ndRRAS (Routing and Remote Access Service) enabling for 2nd 3rd 4th requiring 2nd 3rd 4thvunerabilitiesassessing MBSA (Microsoft Baseline Security Analyzer) 2nd 3rd 4th 5th 6th 7th 8th 9th scanning for 2nd 3rd 4th 5th 6th 7th 8th 9th vunerability announcements best practices |