Index
R
radio frequency (RF), 314, 315–316
RADIUS. see Remote Authentication Dial-In User Service
RAID-1, 510
RAID-5, 510
random password generators, 398
rapid-fail protection, 388, 398
RAS. see Remote Access Servers
RC4 stream cipher, 329
RDA. see Remote Desktop for Administration
RDU (Remote Desktop Users) group, 206
Read permissions, 215
realm trusts, 224–225
real-time protection, 630
record layer, 304
recovery. see disaster recovery
recovery agent. see also Data Recovery Agent
importing, 624
overview of, 554–555
policy, removing, 579–580
Recovery Consolevs. Automated System Recovery/Emergency Management Console, 621
described, 605
for disaster recovery, 599
overview of, 610
securing, 610–612
recursion, 298
redirection, 121, 294
redundancy, 620
/refreshpolicy, 94
registryaccess control strategy overview, 541
access permissions via Group Policy, 546–552
modifications for IAS server performance, 375
objects, permission structure for, 552–553
viewing access permissions, 542–546
Registry Policy, 73
REGKEYS, 89
remote accessconditions, 655–656
of internal resources for clients, 662
overview of, 671, 672–673
permissions, 657
plan overview, 651
policy design, 654–662
profiles, 657–659
selecting method for, 652
selecting protocol for, 652–654
SSL/TLS for, 308
Remote Access Account Lockout, 670, 673
Remote Access Policies, 439–442, 445
Remote Access Servers (RAS)template for, 132
configuration overview, 125–126
network traffic security, 126
server security, 126
strong authentication, 127
Remote Assistance, 207–208, 238
Remote Authentication Dial-In User Service and Internet Authentication Service (RADIUS/IAS)authentication process, 320–321
support for 802.1x authentication, 331
for wireless network infrastructure, 328
WLAN network infrastructure requirement, 322
Remote Authentication Dial-In User Service (RADIUS)authentication, 369–375
described, 400
viability of, 344
IAS and, 662–663, 678
networks switches and, 312
for RAS, 127
Remote Desktop for Administration (RDA)network security management and, 205–206
Terminal Services and, 202
for terminal servers, 123–124
Remote Desktop Users (RDU) group, 206
Remote Desktop Web Connection, 125
remote management process, 608
removable media, 108
Remove Computer from Docking Station right, 469
renewal of keys, 183–184
renewal, EFS certificates, 565–566
Replace a Process Level Token right, 469
repudiation, 14
request process, security group, 522
Request Security (Optional) filter action, 270–271
Require Security filter action, 271–272
Reset account lockout counter after setting, 479
resource groups, 515, 619
Resource Records, DNS, 302–303
resourcesaccess to, 516–521
group strategy for accessing, 490–495
network, providing access to, 662
restore events, 108
Restore Files and Directories right, 469
restores, 595. see also backup
Restricted groupsconfiguring in Active Directory, 470–472
example of use of, 497, 502
overview of, 69–71
using, 470
Restricted Groups node, 72
Resultant Set of Policies (RSoP)for IPSec, 281
using, 9–12
reviewing result of, 82–85
retirement, policies, 526
reversible encryption, 475–476
RF (radio frequency), 314, 315–316
rightsassigning, 458–460
for user accounts, 496
user rights assignments, 463–470
RIP. see Routing Information Protocol
risk analysisfor data, 509–511
disaster recovery and, 600
implementing, 23
risk management, administrator, 195–196
risksacceptance, 24–25
assessment for network infrastructure security, 245
define security policies based on, 245–246
to directory services, 457–458
of IIS, 381–383
rogue wireless networks, 317
role-based authorization, 519
roles. see server roles
root CAarrangement of, 159
design considerations, 158, 186
in geographical hierarchy, 162–163
issuing certificates, 187
network trust hierarchy and, 164, 165, 188
in organizational hierarchy, 163–164
PKI design and, 188–189
security for, 167–169
in three-tier CA, 185
root hints, 298
rootsec.inf template, 62–63, 145–146
route filters, 418
router, Server 2003, 411–423
routes, 415–416, 449–450
Routing and Remote Access Services (RRAS)security, 250
certificate-based authentication and, 451–452
configuring, 412–415
demand dial routing and, 420–423
described, 446
DHCP and, 450
routing design between internal networks, 442
Routing Information Protocol (RIP), 416–419, 447
routing tables, 414–415
routing, demand dial, 420–423
RRAS. see Routing and Remote Access Services
RSA, 154
RSoP. see Resultant Set of Policies
rulesconfiguring IPSec policy, 285
filters for, 272
IPSec, 264–265
RunAs function, 223