Index
T
tampering with data threats, 42, 43 Task Scheduler service, 252 tasklist /svc command, 50, 50 TCP/IP Filtering dialog box, 81, 81 technical constraints, 21–23 Telephony service, 252 Telnet tool, 39–41, 40–41, 389, 390 templates, certificate, 196–197 templates, security. See client; server terminal concentrators, 394, 395 Terminal Services. See Remote Desktop threats. See security analysis; security threats three-pronged configurations, 53, 53 TLS (Transport Layer Security), 70, 71 , 72, 195 tree-root trusts, 130 Trojan horse attacks, 5 trust models in Active Directory, 129–131, 130 trusted computing base, 288 Trusted Publishers Properties dialog box, 334, 335 two-factor authentication, 217