Index
E
e-mail relaying/spamming attacks, 5 EAP (Extensible Authentication Protocol), 85 Edit Rule Properties dialog box, 78, 78 EFS (Encrypting File System), 173, 173–174
EMS (Emergency Management Services), See also remote network defined, 390 design scenario, 396–397 direct serial connections, 392–393, 392 intelligent UPSes, 394–396, 395–396 modem serial connections, 393, 393 overview, 368, 372, 379 real world scenario, 395 Special Administration Consoles, 390–392, 391 terminal concentrators, 394, 395 Windows components, 390 encrypting data, See also network in demand-dial routing, 95–96 design scenarios, 72–73, 74, 91 enabling reversible encryption, 86–87, 86 files, 173–174, 173 folders, 174 in IIS, 245 using IP Security, 70, 71, 75–78, 76, 78, 89 using Layer 2 Tunneling Protocol/IPSec, 74, 75, 88–89 MMC snap-ins and, 381 using Point-to-Point Tunneling Protocol, 73–74, 73, 88 in remote transfers, 375 using Secure Sockets Layer, 70, 71–73, 71 using Server Message Block signing, 78–79 using Transport Layer Security, 70, 71, 72 in virtual private networks, 71, 88–91 Encrypting File System (EFS), 173, 173–174 Enforcement Properties dialog box, 332–334, 333 enforcing security policies, See also security policies overview, 10–11 real world scenario, 11 software restriction policies, 332–334, 333–335 on Windows Server 2003, 11–17, 13–15, 17 enterprise CAs (certificate authorities), 207 Enterprise Client environments, 292 Error Reporting Service, 251 escalation of privilege threats, 42, 43 ESP (Encapsulating Security Payload) headers, 75 Event Log settings, 330–331 Event Viewer, 48, 48 extended rights to AD objects, 162 Extensible Authentication Protocol (EAP), 85 external trusts, 130 external user accounts, 131, 133