Copyrighted Material
Total Page:16
File Type:pdf, Size:1020Kb
Index Note to the Reader: Throughout this index boldfaced page numbers indicate primary discussions of a topic. Italicized page numbers indicate illustrations. IUSR_computername account, 274–275 Numbers disabling, 61 mapping certificates to, 283–286 3DES, 125–126, 416, 494 user accounts, configuring for 802.1x standard (IEEE), 181–184, 494 delegation, 46 authentication for, 182 ACEs (Access Control Entries) combining VPNs with, 190 authentication for clients, 494 802.11a standard (IEEE), 494 in Discretionary Access Control List, 7 vs. 802.11b, 170 Active Directory (AD), 3, 494 802.11b standard (IEEE), 494 assigning GPO to container in, 28 for certificate store, 404 Configuration container for certificate templates, 360 A mapping certificates to accounts, 283–286 Access Control Entries (ACEs), 494 in mixed mode, 324 in Discretionary Access Control List, 7 publishing certificates through, 404–409 Access Control List (ACL), 494 in child domain, 406–409 Access Control Settings dialog box, 16 from standalone online CA, 404–406 Auditing tab, 16, 440 to view published certificates and CRLs, “Access Is Denied” error message, 420 358–359 access point, 494. See also wireless access Active Directory domain controller point (WAP) client security to traffic, 226–229 access token, 260, 494 testing, 227–229 account lockout policy, in security Active Directory domains templates, 9 Properties dialog box, General tab, 228 account logon events, tracking, 15, 445 trust relationships, 271–273, 272 account management events, tracking, 15, Active Directory object, auditing, 18 445–446 Active Directory Properties dialog box, 228 Account Policies Active Directory Sites and Services (ADSS), security template configuration, 12, 5, 494 12–14, 13 configuration, 407–408 in security templates, 9 Active Directory Users and Computers (ADUC), accountability trail, 14 COPYRIGHTED5, MATERIAL494 accounts Active Server Pages (ASP), SUS and, 111 Administrator account, renaming, 55, 56 AD. See Active Directory (AD) Anonymous user account Add IP Filter dialog box, 311 disabling, 61 Add/Remove Snap-In dialog box, 7 real world scenario, 64–65 Add Standalone Snap-In dialog box, 7, 8 restrictions in Windows 2000 domain Administrative Templates settings in GPOs, 3 controller, 52–54, 53 Administrator account, renaming, 55, 56 built-in accounts, securing, 55 Administrator certificate template, 360 guest account for IIS, 274 Administrator Properties dialog box, Dial-in Guest account, renaming, 55 tab, 324, 325 512 ADSS (Active Directory Sites and Services) – authentication method in IPSec rule ADSS (Active Directory Sites and Services), attribute, 495 5, 494 for Encrypting File System, 397 configuration, 407–408 Audit Policies ADUC (Active Directory Users and Computers), blocking inheritance, 18, 442–444 5, 494 security template configuration, 14–18, 16 AH (Authentication Header), 139 in security templates, 9 AIA (authority information access), 343, 495 auditing, 432, 437–450, 495 AirSnort, 187 enabling, 438–444 Anonymous authentication, 274–276, 494 for resources, 439–444 IIS configuration for, 275–276 logs for RRAS troubleshooting, 313 Anonymous user account Authenticated Session certificate template, 360 disabling, 61 Authenticated users entries, in Discretionary real world scenario, 64–65 Access Control List, 7 restrictions in Windows 2000 domain authentication, 256, 495 controller, 52–54, 53 in business communications, 340 anti-spam filters, on SMTP gateway, 49 configuration in extranet scenarios, antireplay, 125 269–271, 270 antivirus software, and encrypted files, 419 exam essentials, 292–293 Apple Standard Encryption, 69 Kerberos interoperability with Unix, application log, 432 267–269 archive keys, in EFS troubleshooting, 419 LAN protocols, 257–261 archived certificates, 403 Kerberos protocol, 259–261 archiving files, during service pack NT LAN Manager (NTLM), 257–259 installation, 83 logon process, 261–263 ASCII character set, restricting URL to, 63 multifactor, with smart cards and EAP, ASP (Active Server Pages), SUS and, 111 290–291 association in wireless networks, 176 protocol configuration to support mixed asymmetric, 494 Windows client-computer environ- asymmetric encryption, 395 ments, 264–267 asymmetric keys, 203, 495 for Windows 95 and Windows 98, asynchronous processing, of Group Policy 265–266 Objects, 5 for Windows NT 4, 266–267 ATM (Automatic Teller Machine), 291 in RRAS troubleshooting, 309 attacks for secure remote access, 286–290 auditing attempts, 438 by Secure Sockets Layer, 202 countermeasures, 481–483 troubleshooting, 263–264 Denial of Service (DoS) attacks, 54, 125, troubleshooting protocols, 319 477–478, 498 trust relationships, 271–273, 272 exam essentials, 484 one-way trust creation, 272–273 hackers, 475–476 for Web users, 274–286 ping use by, 453 anonymous authentication, and service account, 45 274–276, 494 indicators of, 472 Basic authentication, 276–278 isolating and containing, 479–480 with client certificate mapping, preserving chain of evidence, 480–481 283–286 restoring services after, 483 Digest authentication, 278–281, 499 Trojan Horse, 478, 507 Integrated Windows authentication, viruses, 476–477, 508 281–283, 501 e-mail risk of, 49 Authentication Header (AH), 139, 495 worms, 478–479, 509 authentication method in IPSec rule, 131, 133 written policies for, 472–473 troubleshooting, 145 authentication methods – certificates in SSL 513 authentication methods, 495 certificate enrollment and renewal, 367–370 Authentication Methods dialog box (IIS), 276, auto-enrollment, 370 277, 287 Certificates MMC Snap-in, 368–369 Authentication Mode dialog box (SQL manual enrollment, 367–369 Server 2000), 45 certificate templates for enterprise CAs, authenticator, 495 360–361 authority information access (AIA), 343, 495 exam essentials, 379 auto-enrollment, 370, 496 Group Policies for certificate for Encrypting File System, 394 distribution, 361 of user certificates, 413–414 prerequisites, 362–367 Automatic Certificate Request Setup Wizard, hierarchy of, 341 140, 140 intermediate CAs, 342 Automatic Teller Machine (ATM), 291 installing and configuring, 347–353 Automatic Updates, 97 issuing CAs, 342 installing and configuring, 353–360 viewing published certificates and CRLs, 358–360 B managing, 370–378 backup, 374–376 backup editing certificates, 373 of certificate, 207 managing CRLs, 373–374 of certificate authority, 374–376 restoring backup, 376–378 of EFS certificate, 397 revoking certificates, 372–373 of IIS Metabase, 104–105 viewing certificates, 370–372 Base64 Encoded X.509 (.cer), 398, 496 root CA, 341 Basic authentication, 276–278 configuring publication of CRLs, Basic EFS certificate template, 360 345–347 basicdc template, 11 installing and configuring, 342–345 basicsv template, 11 for wireless communications, 66 basicwk template, 11 Certificate dialog box, 371, 371–372 beacon, 175, 496 Certificate Export Wizard, 400 biometric devices, 291 Certificate Import Wizard, 402 blocking inheritance, 18, 442–444 Certificate Properties dialog box, 373, 374 boot process. See rebooting Certificate Purpose view, 403 branch offices, VPNs to connect, 304 certificate revocation list (CRL), 343, 496 brute force attack, 55 Active Directory to view, 358–359 built-in accounts, securing, 55 configuring publication of, 345–347 BulkAdmin role, in SQL Server 2000, 48 managing, 373–374 Certificate Signing Request (CSR), 206, 206, 496 C certificate store, 402–404, 496 certificate templates for enterprise CAs, canonicalization, 496 360–361, 496 canonicalization attacks, 62–63 certificate trust list (CTL), 496 CAs. See certificate authorities (CAs) certificates, 340, 496 CDP (CRL distribution point), 343, 497 in IPSec, 139–141 creating for stand-alone offline root CA, renewing, 141 345–347 certificates in SSL, 204–219 certificate authorities (CAs), 51, 340, 496. backup of, 207 See also client certificates installing on SQL server, 223–224 514 Certificates MMC Snap-in – Computer Security Incident Response Team (CSIRT) mapping to Active Directory accounts, recovering KMS-issued, 414–415 283–286 Secure MIME, 388–394 private, 213–219 to sign and seal e-mail, 390–393 renewing, 218–219 storage, 402–404 public Client (Response Only) policy for IPSec, 129 installation, 211 Client Services for NetWare, 68 obtaining, 205–213 clients renewing, 211–213 adding to trusted root certificates list, 342 Certificates MMC Snap-in, 218, 367, authentication 368–369, 370 for Windows 95 and Windows 98, to edit certificates, 373 265–266 to enroll certificates, 410–411 for Windows NT 4, 266–267 for importing certificate, 401 configuration for Remote Access security, to view certificates, 370–372 322–330 Certification Authority Backup Wizard, 375 Connection Manager Administration Certification Authority MMC snap-in, 370, Kit, 326–330 372, 372 Remote Access Service Policies, 322–326 to backup Certification Services, 375 operating systems, 67–69 to revoke certificate, 372–373 Macintosh, 69 certreq.exe, 370 NetWare, 68–69 certutil.exe, 342, 370, 496 Unix, 67 to backup database and log files, 375 securing to Active Directory domain to restore Certificate Services, 376–378 controller traffic, 226–229 CGI pages, URLScan tool and, 61 testing, 227–229 chalk marks, 186–187 securing to e-mail server traffic, 229–231 Challenge Handshake Authentication Protocol securing with IPSec, 142–143 (CHAP), 288, 497 service packs and hotfixes for, 94–96 challenge phrase, 207 troubleshooting mixed environments, 33 child domain, certificates in, 406–409 for virtual private networks (VPNs) child server, 497 configuration,