Index - MCSE Designing Security for a Windows Server 2003 Network [Electronic resources] : Exam 70-298 Study Guide نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

MCSE Designing Security for a Windows Server 2003 Network [Electronic resources] : Exam 70-298 Study Guide - نسخه متنی

Elias N. Khnaser, Susan Snedak, Chris Peiris, Rob Amini

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
توضیحات
افزودن یادداشت جدید




Index

D


DACL. see Discretionary Access Control Lists

daily backup, 592

data

analysis for different types of, 25–26

EFS encryption and, 557–558

identifying valuable information, 245

permission structure for, 491–495

practices for safeguarding, 591


data access control

groups, working with, 521–534

overview of, 508–509

resource access, 516–521

reviewing access/ACLs, 511–516

risk analysis, 509–511

Data Administrators, 487, 497

Data Encryption Standard (DES), 253

Data Encryption Standard Extended (DESX), 558

data modification

as attack type, 247

DNS servers and, 121

threat to DNS, 294

threat to wireless networks, 317


Data Recovery Agent (DRA)

adding for local computer, 574–577

adding with cipher.exe, 577–579

configuring, 574

described, 555

policy, removing, 579–580

data storage, 589–590

data transmission security

port authentication for switches, 312

S/MIME, 309

segmented networks, 313

SMB signing, 309–312

SSL/TLS, 303–309

database settings, CA installation, 175–176

DC. see domain controllers

DC Security.inf template

overview of, 56–57

DC/DHCP servers, 143

domain controllers and, 130

Debug Programs right, 466

decentralized management model, 200

decryption. see Encrypted File System

default exemptions, 281

default IPSec policies

IP packet filtering, 272

IPSec rules, 264

list chart, 265–266


netsh commands, 272–273

predefined filter actions, 270–272

predefined filter lists, 269–270

view Server (Request Security), 267–269

default lease period, Wi-Fi, 327

Default Locked down status, 388

default policy, remote access, 655

default security settings, 56

default security template, 55–56

default trust relationship, 222

defense in depth, 198

delegated administrators, 487

delegated namespace, DNS, 295

delegation, 197–199. see also groups

Delegation of Control Wizard, 530–534

delegation strategy

delegation structure, selecting, 488–490

example of, 502

important points about, 497–498

isolation/autonomy, 487–488

scenario, 504

Service/Data administrators, 487

delegation structure, 488–490

Delta Certification Revoke List (Delta CRL), 157

demand dial routing

described, 446

between internal networks, 420–423

OSPF and, 447


denial-of-service (DoS)

DNS servers and, 121

defined, 248

overview of, 15–16

STRIDE and, 14

TCP SYN packet requests and, 45

threat to DNS, 294

threat to wireless networks, 317

Deny Access to This Computer from the Network right, 466

Deny Log On as a Batch Job right, 467

Deny Log On as a Service right, 467

Deny Log On Locally right, 467

Deny Log On through Terminal Services right, 467

DESX (Data Encryption Standard Extended), 558

device drivers, 468

DHCP. see Dynamic Host Configuration Protocol

diagnostic mode, IPSec driver, 278, 280

dial-up connection

security vs. VPNs, 447

IAS and, 665

differential backup, 593

Diffie-Hellman encryption. see also public key cryptography

Diffie, Whitman, 253

Diffie-Hellman (DH) group 1 (low), 282

Diffie-Hellman (DH) groups, 255–256, 281

Diffie-Hellman encryption, 253

digest authentication

MD5 hash and, 403

overview of, 366–367, 650, 672

WebDAV and, 386, 404

Windows logon with, 405

Digest Security, 385–386

digital certificates, 153–158

digital encryption, 110–111

direct-dial remote access, 652

directory object, 466

Directory Service access event auditing, 538


Directory Services (DS)

access control strategy for, 454–457

auditing setting for, 481

mapping, 356

risks to, 457–458, 496

directory traversal vulnerability, 20

disabled mode, IPSec driver, 279


disaster recovery

best practices for, 598–600

corporate business continuity and, 616

overview of, 616–617

discretionary access control list (DACL)

in Active Directory-Integrated zones, 300–301

described, 513

securing DNS Server Service and, 299

vs. SACL, 619

disk

based backup, 590

management, 510

volumes, data loss and, 509

Distributed Denial-of-Service, 16–18

distribution group, 515

DLL, authentication, 399

DNS. see Domain Name Service

DNS Resource Records, 302–303

DNS Server Service, 297–300

DNS zones, 300–302

Domain Admins group, 470, 489

Domain Controller Default security template, 56–57


domain controllers (DCs)

anonymous access restriction, 109–110

authentication traffic digital signatures, 110–112

common threats to, 107–108

configuration overview, 106–107

configuring IAS on, 666–669

DC security.inf and, 56–57

L2TP and, 434

removable media access restriction, 108

summary of services for, 129

template application on, 80–82

template for, 130

DC Security.inf template and, 143

securing DNS Server Service, 299

domain delegation structure, 489

domain functional levels

described, 498

Server 2003, 227–230

with Windows Server 2000/2003, 494–495

Windows Server 2003 domain functional level, 500

domain local groups

described, 516

function of, 491

nesting, 493

overview of, 519–520

in permission structure, 492, 493, 498


Domain Name Service (DNS)

clients, 303

DNS Server Service, 297–300

namespace, 295–296

resource records, 302–303

securing, 293–295

security, 250

server log, 395

for wireless network infrastructure, 327

WLAN network infrastructure requirement, 322

zones, 300–302

Domain Naming System (DNS) servers

DNS clients, securing, 303

threats to, 294–295

configuring, 120–122

summary of services for, 129

domain-based IPSec policy, 275–276

domains

adding recovery agents for, 578–579

functionality of, 229–230

models for trust relationships, 221–226

templates application with Group Policy Editor, 77–80

trust relationships and, 217–221

DoS. see Denial-of-Service

down-level clients, 74–75, 226–228

DRA. see Data Recovery Agent

DS. see Directory Services

dsmod.exe, 528

dump files, 614

Dumpel.exe, 486

<Dynamic> Default Response rule

in all IPSec policies, 264

disabling, 269–270

removing, 293


Dynamic Host Configuration Protocol (DHCP)

RRAS and, 450

security, 249–250

for WLAN network infrastructure, 326–327

WLAN network infrastructure requirement, 322

Dynamic Host Configuration Protocol (DHCP) servers

configuring, 120

DC Security.inf template and, 143

summary of services for, 129

VPNs and, 451

/ 122