Index
F
fallback to clear, 270–271
FAT file system, 172, 190
Federal Information Processing Standard (FIPS), 124, 206
file authorization, ASP.NET, 389
File Encryption Key (FEK), 554
file permissions, Server 2003, 500
file recovery agent. see Data Recovery Agent
file servers, 123, 129, 131–132
file sharing, 250–251
file structure, 382
File System node, 74
File Transfer Protocol (FTP)anonymous access and, 403
certificate authentication and, 404
IIS, securing, 383–384
files. see also data access control
EFS encryption of, 556–557
encrypted, overview of, 570–571
offline, encrypting, 559
recovering with EFS, 580
FILESTORE, 89
filter actionsconfiguring IPSec policy, 285
IPSec, predefined, 264–265
predefined, 270–272
recommendations, 289–290
filter listsconfiguring IPSec policy, 285
IPSec, predefined, 264–265
in IPSec process, 274–275
predefined, 269–270
recommendations, 289–290
filteringIP packet, 272, 438
IP, designing, 289–292
stateful filtering during startup, 282
filtersIPSec filters update IP configurations, 281
peer, RIP and, 419
route, RIP and, 418
FIPS. see Federal Information Processing Standard
firewalls. see also Internet Connection Firewall
authentication, 224
configuration, 292–293
for POP3 servers, 117–118
PPTP and, 450–451
for secure boundaries, 243–244
SSL/TLS and, 309
VPN servers placement and, 443
VPNs and, 447
Web servers and, 448–449
firmware console redirection, 603
firmware environment variables, 469
flexible caching, 355, 405
floppy drives, 598
footprinting, 121, 294
Force Shutdown from a Remote System right, 467
forensics, computer, 30
forest functional levelsdescribed, 498
with Windows Server 2000/2003, 494, 495
forestsdelegation structure at, 488–489, 498
functionality of, 229–230
models for trust relationships, 221–226
security in trusts between, 500
trust relationships and, 217–221
framework for security implementationcorporate network risks, addressing, 23–25
data types, security analysis for, 25–26
external attack motivations, 22
overview of, 13, 40
predicting network threats, 13–15
recognizing external threats, 15–21
risk analysis implementation, 23
free-loading, 317
FTP. see File Transfer Protocol