MCSE Designing Security for a Windows Server 2003 Network [Electronic resources] : Exam 70-298 Study Guide

Elias N. Khnaser, Susan Snedak, Chris Peiris, Rob Amini

نسخه متنی -صفحه : 122/ 112
نمايش فراداده

Index

R

radio frequency (RF), 314, 315–316

RADIUS. see Remote Authentication Dial-In User Service

RAID-1, 510

RAID-5, 510

random password generators, 398

rapid-fail protection, 388, 398

RAS. see Remote Access Servers

RC4 stream cipher, 329

RDA. see Remote Desktop for Administration

RDU (Remote Desktop Users) group, 206

Read permissions, 215

realm trusts, 224–225

real-time protection, 630

record layer, 304

recovery. see disaster recovery

recovery agent. see also Data Recovery Agent

importing, 624

overview of, 554–555

policy, removing, 579–580

Recovery Console

vs. Automated System Recovery/Emergency Management Console, 621

described, 605

for disaster recovery, 599

overview of, 610

securing, 610–612

recursion, 298

redirection, 121, 294

redundancy, 620

/refreshpolicy, 94

registry

access control strategy overview, 541

access permissions via Group Policy, 546–552

modifications for IAS server performance, 375

objects, permission structure for, 552–553

viewing access permissions, 542–546

Registry Policy, 73

REGKEYS, 89

remote access

conditions, 655–656

of internal resources for clients, 662

overview of, 671, 672–673

permissions, 657

plan overview, 651

policy design, 654–662

profiles, 657–659

selecting method for, 652

selecting protocol for, 652–654

SSL/TLS for, 308

Remote Access Account Lockout, 670, 673

Remote Access Policies, 439–442, 445

Remote Access Servers (RAS)

template for, 132

configuration overview, 125–126

network traffic security, 126

server security, 126

strong authentication, 127

Remote Assistance, 207–208, 238

Remote Authentication Dial-In User Service and Internet Authentication Service (RADIUS/IAS)

authentication process, 320–321

support for 802.1x authentication, 331

for wireless network infrastructure, 328

WLAN network infrastructure requirement, 322

Remote Authentication Dial-In User Service (RADIUS)

authentication, 369–375

described, 400

viability of, 344

IAS and, 662–663, 678

networks switches and, 312

for RAS, 127

Remote Desktop for Administration (RDA)

network security management and, 205–206

Terminal Services and, 202

for terminal servers, 123–124

Remote Desktop Users (RDU) group, 206

Remote Desktop Web Connection, 125

remote management process, 608

removable media, 108

Remove Computer from Docking Station right, 469

renewal of keys, 183–184

renewal, EFS certificates, 565–566

Replace a Process Level Token right, 469

repudiation, 14

request process, security group, 522

Request Security (Optional) filter action, 270–271

Require Security filter action, 271–272

Reset account lockout counter after setting, 479

resource groups, 515, 619

Resource Records, DNS, 302–303

resources

access to, 516–521

group strategy for accessing, 490–495

network, providing access to, 662

restore events, 108

Restore Files and Directories right, 469

restores, 595. see also backup

Restricted groups

configuring in Active Directory, 470–472

example of use of, 497, 502

overview of, 69–71

using, 470

Restricted Groups node, 72

Resultant Set of Policies (RSoP)

for IPSec, 281

using, 9–12

reviewing result of, 82–85

retirement, policies, 526

reversible encryption, 475–476

RF (radio frequency), 314, 315–316

rights

assigning, 458–460

for user accounts, 496

user rights assignments, 463–470

RIP. see Routing Information Protocol

risk analysis

for data, 509–511

disaster recovery and, 600

implementing, 23

risk management, administrator, 195–196

risks

acceptance, 24–25

assessment for network infrastructure security, 245

define security policies based on, 245–246

to directory services, 457–458

of IIS, 381–383

rogue wireless networks, 317

role-based authorization, 519

roles. see server roles

root CA

arrangement of, 159

design considerations, 158, 186

in geographical hierarchy, 162–163

issuing certificates, 187

network trust hierarchy and, 164, 165, 188

in organizational hierarchy, 163–164

PKI design and, 188–189

security for, 167–169

in three-tier CA, 185

root hints, 298

rootsec.inf template, 62–63, 145–146

route filters, 418

router, Server 2003, 411–423

routes, 415–416, 449–450

Routing and Remote Access Services (RRAS)

security, 250

certificate-based authentication and, 451–452

configuring, 412–415

demand dial routing and, 420–423

described, 446

DHCP and, 450

routing design between internal networks, 442

Routing Information Protocol (RIP), 416–419, 447

routing tables, 414–415

routing, demand dial, 420–423

RRAS. see Routing and Remote Access Services

RSA, 154

RSoP. see Resultant Set of Policies

rules

configuring IPSec policy, 285

filters for, 272

IPSec, 264–265

RunAs function, 223