Index
R
RADIUS (Remote Authentication Dial-In User Service) in demand-dial connections, 95 RADIUS authentication, 264–265 in wireless connections, 104 RDP (Remote Desktop Protocol), 382, 384–386, 384 realm trusts, 130 recovering services/data. See security threats Registry security, 174, 175, 331 Remote Access Auto Connection Manager, 251 Remote Access Connection Manager, 252 remote access security, See also network authentication protocols Challenge Handshake Authentication Protocol, 83–84 choosing, 86, 87–88 Extensible Authentication Protocol, 85 Microsoft CHAP, 84 Microsoft CHAP version 2, 84–85 Password Authentication Protocol, 83 Shiva Password Authentication Protocol, 83 choosing encryption methods, 88–91 design scenarios, 88, 91 enabling reversible encryption, 86–87, 86 overview, 82 virtual private networks in, 82, 88–91
remote network management, 368–409, See also server security case study, 404–406 case study answers, 408–409 case study questions, 407 exam essentials, 398 using in-band management tools command-line tools, 372, 389–390, 390 defined, 370, 379 design scenario, 388–389 Microsoft Management Console, 371, 380–381, 380 real world scenarios, 382, 385, 388 Remote Assistance, 372, 386–389, 387
Remote Desktop, 252, 371, 382–386, 383–384 Secure Shell, 390 Telnet, 389, 390 Web Interface for Remote Administration, 372 Windows Script Host, 371 key terms, 398 versus local management, 368, 369–370 using out-of-band Emergency Management Services defined, 390 design scenario, 396–397 direct serial connections, 392–393, 392 intelligent UPSes, 394–396, 395–396 modem serial connections, 393, 393 overview, 368, 372, 379 real world scenario, 395 Special Administration Consoles, 390–392, 391 terminal concentrators, 394, 395 Windows components, 390 overview, 397 remote management plans auditing tool use, 375 benefits, 369–370 configuring network support, 376–377 defined, 368–369 design scenarios, 371, 377, 379 determining tool/hardware needs, 370–372 encrypting data, 375 evaluating management needs, 369–370 machine authentication, 374 physical security, 374 planning deployment, 377–378 real world scenario, 376 using secondary networks, 375 securing software/hardware, 372–376 threats, 370 user authentication, 373–374 review question answers, 402–403 review questions, 399–401 Remote Procedure Call (RPC) Locator, 252 Removable Storage service, 252 Remove File menu from Windows Explorer Properties dialog box, 338, 339 renewing certificates, 218–219, 224 replay attacks, 5 repudiation threats, 42, 43 Reschedule Automatic Updates scheduled installations setting, 348–349, 350 resources, network. See access control
restoring data, 180–181, See also security threats Restricted Groups settings, 331 revoking certificates, 218, 220–221, 220–221 RFC 2196, 9–10 RFC 2535, 309 risks. See security analysis; security threats root CA role, 206–208, 208 RPC (Remote Procedure Call) Locator, 252 RRAS. See demand-dial routing runas command, 135