Index
W
W3C log file, 390–391
/wait:, 95
WAPs. see wireless access points
wardriving, 315
Web Distributed Authoring and Versioning (WebDAV), 386
Web Enrollment Support System, 166
Web Folders. see Web Distributed Authoring and Versioning
Web Server Certificate Wizard, 305
Web servers, patching, 237
Web Service Extensions, 377
Web sitesfor Gravity Storm Software Service Pack Manager 2000, 216–217
for HP OpenView, 216
IANA list of TCP/UDP ports, 290
IEEE, 316
for incremental policies, 102
for NetIQ Security Manager, 216
for Network Access Quarantine Control, 674
Passport Authentication and, 642–645
for security access token buffer, 520
for Server 2003 snap-ins, 65
for URLScan/IISLockdown, 114
WEP. see Wired Equivalent Privacy
Wi-Fi Protected Access (WPA), 316
Windows, 604–605
Windows 2000domain/forest functional levels, 494–495
Mixed mode, 494
Native mode, 495
Windows 2000 templates, 54
Windows Components Wizard, 172–176
Windows Internet Naming Service (WINS), 250
Windows Internet Naming Service (WINS) serversconfiguring, 122–123
IPSec and, 146–147
summary of services for, 129
Windows logon authenticationbasic, 364–365
described, 400
digest, 366–367
integrated Windows authentication, 367–369
overview of, 362–364
Windows Media servers, 128
Windows NT 4.0, 57–58, 107
logon security and, 34
VPNs and, 34
Windows Server 2003 upgrade and trusts, 500
Security Configuration and Analysis snap-in and, 143
SUS and, 212, 633
trust relationships and, 226, 234
Windows Server 2003anonymous access in, 109–110
control strategy of, 455
DNS and BIND servers, 47
domain/forest functional levels, 229–230, 494–495
domain functional levels, 227–228, 495, 500
EFS features of, 558–560
file encryption and, 556
hardware requirements for, 32–33
implementing EFS on, 560–563
improvements to network security in, 339
installing CA on, 172–176
integrating UNIX DNS with, 37–38
IPSec changes in, 280–283
as KDC for MIT Kerberos, 35–37
Kerberos and, 646–648
NAT traversal and, 654
new CA features of, 190
RADIUS clients/servers and, 663
remote access and, 672
remote connectivity with, 410
role-based administration in, 195
as router, 411–423
routing protocols and, 445
security templates, 53–56
server roles, 139–140, 141
Terminal Services and, 205
UNIX and, 677
VPN protocols and, 433
VPNs and, 438–439
Windows Server 2003 Interim level, 495
Windows Server 2003 Resource Kit, 486
Winnt32.exe, 610
WINS. see Windows Internet Naming Service
Wired Equivalent Privacy (WEP)encryption for wireless networks, 329
flaws/threat/countermeasures, 335–336
reasons to use, 343–344
security provided by, 316
in wireless network policy creation, 325
wireless access, 669
wireless access infrastructure, 336–338
wireless access points (WAPs)IAS and, 669
wireless network authentication and, 331
for WLAN, 314
wireless access policies, 337
wireless local area networks (WLANs)described, 314
wireless networks, authentication for, 328–336
network infrastructure, designing, 321–328
security, 349
threats to, 317–318
for wireless access infrastructure, 337–338
wireless metropolitan area networks (WMANs), 314
wireless network infrastructure, 347
wireless network policy, 322–326
wireless networksaccidental connection to, 343
authentication for, 328–336
PKI and RADIUS/IAS, 319–321
security, designing, 313, 341–342, 347–348
security of, 242
summary of, 339–340
threats to, 317–318
types of, 314
wireless access infrastructure, 336–338
wireless history, 315–316
WLAN network infrastructure, 321–328
wireless personal area networks (WPANs), 314
wireless wide area networks (WWANs), 314
WLANs. see wireless local area networks
WMANs (wireless metropolitan area networks), 314
worker processvs. IIS 5.0 isolation mode, 354–355
IIS 6.0, 353, 388, 401
workstations. see also clients
Add Workstations to the Domain right, 464
templates application with Group Policy Editor, 77–80
World Wide Web (WWW), 559
wormsclients and, 630, 672
overview of, 18–19
risk analysis and, 510–511
WPA (Wi-Fi Protected Access), 316