laptop computers, 634–637
Layer 2 Tunneling Protocol (L2TP)
in Virtual Private Networks (VPNs), 425
configuring to accept certificates, 434–438
NAT and, 447
in Virtual Private Networks (VPNs), 433–434
VPNs and, 654
lease, DHCP, 326–327
Length header, 261
Lightweight Directory Access Protocol (LDAP), 526–529
link encryption, 422
Load and Unload Device Drivers right, 468
local authentication strategy, 165–167
local computer policy, 278
local IPSec policy, 277–278
local policies security templates, 69–71
Local System account
Create a Token Object right and, 466
described, 512
security of, 460
service accounts and, 497
Lock Pages in Memory right, 468
lockdown, 271
lockout. see Remote Access Account Lockout
/log filename, 89
Log On as a Batch Job right, 465
Log On as a Service right, 468
logging diagnostic mode, 280
logging in IAS, 375
logic bomb, 22
logical authentication strategy, 186–187
/logoff GPUpdate parameter, 95
logon
auditing settings for, 480, 481
interactive, 641
user rights assignments, 464–465, 467
logon authentication, 362–369
logon event auditing, 482–483, 535–537
logs, event, 395–396
logs, IIS, 389–392