fallback to clear, 270–271
Federal Information Processing Standard (FIPS), 124, 206
file authorization, ASP.NET, 389
File Encryption Key (FEK), 554
file permissions, Server 2003, 500
file recovery agent. see Data Recovery Agent
file servers, 123, 129, 131–132
file sharing, 250–251
file structure, 382
File System node, 74
File Transfer Protocol (FTP)
anonymous access and, 403
certificate authentication and, 404
IIS, securing, 383–384
files. see also data access control
EFS encryption of, 556–557
encrypted, overview of, 570–571
offline, encrypting, 559
recovering with EFS, 580
FILESTORE, 89
filter actions
configuring IPSec policy, 285
IPSec, predefined, 264–265
predefined, 270–272
recommendations, 289–290
filter lists
configuring IPSec policy, 285
IPSec, predefined, 264–265
in IPSec process, 274–275
predefined, 269–270
recommendations, 289–290
filtering
IP, designing, 289–292
stateful filtering during startup, 282
filters
IPSec filters update IP configurations, 281
peer, RIP and, 419
route, RIP and, 418
FIPS. see Federal Information Processing Standard
firewalls. see also Internet Connection Firewall
authentication, 224
configuration, 292–293
for POP3 servers, 117–118
PPTP and, 450–451
for secure boundaries, 243–244
SSL/TLS and, 309
VPN servers placement and, 443
VPNs and, 447
Web servers and, 448–449
firmware console redirection, 603
firmware environment variables, 469
floppy drives, 598
Force Shutdown from a Remote System right, 467
forensics, computer, 30
forest functional levels
described, 498
with Windows Server 2000/2003, 494, 495
forests
delegation structure at, 488–489, 498
functionality of, 229–230
models for trust relationships, 221–226
security in trusts between, 500
trust relationships and, 217–221
framework for security implementation
corporate network risks, addressing, 23–25
data types, security analysis for, 25–26
external attack motivations, 22
predicting network threats, 13–15
recognizing external threats, 15–21
risk analysis implementation, 23
free-loading, 317
FTP. see File Transfer Protocol