Index - MCSE Designing Security for a Windows Server 2003 Network [Electronic resources] : Exam 70-298 Study Guide نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

MCSE Designing Security for a Windows Server 2003 Network [Electronic resources] : Exam 70-298 Study Guide - نسخه متنی

Elias N. Khnaser, Susan Snedak, Chris Peiris, Rob Amini

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
توضیحات
افزودن یادداشت جدید




Index

R


radio frequency (RF), 314, 315–316

RADIUS. see Remote Authentication Dial-In User Service


RAID-1, 510


RAID-5, 510

random password generators, 398

rapid-fail protection, 388, 398

RAS. see Remote Access Servers

RC4 stream cipher, 329

RDA. see Remote Desktop for Administration

RDU (Remote Desktop Users) group, 206

Read permissions, 215

realm trusts, 224–225

real-time protection, 630

record layer, 304

recovery. see disaster recovery

recovery agent. see also Data Recovery Agent

importing, 624

overview of, 554–555

policy, removing, 579–580

Recovery Console

vs. Automated System Recovery/Emergency Management Console, 621

described, 605

for disaster recovery, 599

overview of, 610

securing, 610–612

recursion, 298

redirection, 121, 294

redundancy, 620

/refreshpolicy, 94

registry

access control strategy overview, 541

access permissions via Group Policy, 546–552

modifications for IAS server performance, 375

objects, permission structure for, 552–553

viewing access permissions, 542–546

Registry Policy, 73

REGKEYS, 89

remote access

conditions, 655–656

of internal resources for clients, 662

overview of, 671, 672–673

permissions, 657

plan overview, 651

policy design, 654–662

profiles, 657–659

selecting method for, 652

selecting protocol for, 652–654

SSL/TLS for, 308


Remote Access Account Lockout, 670, 673

Remote Access Policies, 439–442, 445


Remote Access Servers (RAS)

template for, 132

configuration overview, 125–126

network traffic security, 126

server security, 126

strong authentication, 127

Remote Assistance, 207–208, 238

Remote Authentication Dial-In User Service and Internet Authentication Service (RADIUS/IAS)

authentication process, 320–321

support for 802.1x authentication, 331

for wireless network infrastructure, 328

WLAN network infrastructure requirement, 322


Remote Authentication Dial-In User Service (RADIUS)

authentication, 369–375

described, 400

viability of, 344

IAS and, 662–663, 678

networks switches and, 312

for RAS, 127


Remote Desktop for Administration (RDA)

network security management and, 205–206

Terminal Services and, 202

for terminal servers, 123–124

Remote Desktop Users (RDU) group, 206

Remote Desktop Web Connection, 125

remote management process, 608

removable media, 108

Remove Computer from Docking Station right, 469

renewal of keys, 183–184

renewal, EFS certificates, 565–566

Replace a Process Level Token right, 469

repudiation, 14

request process, security group, 522

Request Security (Optional) filter action, 270–271

Require Security filter action, 271–272

Reset account lockout counter after setting, 479

resource groups, 515, 619

Resource Records, DNS, 302–303

resources

access to, 516–521

group strategy for accessing, 490–495

network, providing access to, 662

restore events, 108

Restore Files and Directories right, 469

restores, 595. see also backup

Restricted groups

configuring in Active Directory, 470–472

example of use of, 497, 502

overview of, 69–71

using, 470

Restricted Groups node, 72


Resultant Set of Policies (RSoP)

for IPSec, 281

using, 9–12

reviewing result of, 82–85

retirement, policies, 526

reversible encryption, 475–476

RF (radio frequency), 314, 315–316

rights

assigning, 458–460

for user accounts, 496

user rights assignments, 463–470

RIP. see Routing Information Protocol

risk analysis

for data, 509–511

disaster recovery and, 600

implementing, 23

risk management, administrator, 195–196

risks

acceptance, 24–25

assessment for network infrastructure security, 245

define security policies based on, 245–246

to directory services, 457–458

of IIS, 381–383

rogue wireless networks, 317

role-based authorization, 519

roles. see server roles

root CA

arrangement of, 159

design considerations, 158, 186

in geographical hierarchy, 162–163

issuing certificates, 187

network trust hierarchy and, 164, 165, 188

in organizational hierarchy, 163–164

PKI design and, 188–189

security for, 167–169

in three-tier CA, 185

root hints, 298

rootsec.inf template, 62–63, 145–146

route filters, 418

router, Server 2003, 411–423

routes, 415–416, 449–450


Routing and Remote Access Services (RRAS)

security, 250

certificate-based authentication and, 451–452

configuring, 412–415

demand dial routing and, 420–423

described, 446

DHCP and, 450

routing design between internal networks, 442


Routing Information Protocol (RIP), 416–419, 447

routing tables, 414–415

routing, demand dial, 420–423

RRAS. see Routing and Remote Access Services

RSA, 154

RSoP. see Resultant Set of Policies

rules

configuring IPSec policy, 285

filters for, 272

IPSec, 264–265

RunAs function, 223

/ 122