Copyrighted Material
Total Page:16
File Type:pdf, Size:1020Kb
30_118054 bindex.qxp 10/11/07 9:54 AM Page 345 Index ActiveX • Numerics • defined, 241, 335 48-bit recovery option, 192 and DHTML, 246 128-bit encryption, 173, 188 disabling, 250 256-bit encryption, 173, 188 and HTML, 241 256-bit recovery option, 192 and IE7, 15, 241–243 in Internet Zone, 250 object caching, 253 • A • properties of, 256 security risks of, 236 About.com identity-theft site, 330 threat of, 243 Access Control Entry (ACE), 105 typically installed, 255 access control list (ACL), 109 ActiveX Opt-In access control model, 335 and automatic downloads, 256 access levels, 40 defined, 242, 257 access management options, 242–243 with auditing and logging, 124–132 and security risks, 243 discussed, 96, 103 acts of God (natural threat-sources), 32 to floppy, 299 AD. See Active Directory with NTFS permissions, 111–116 ad hoc (peer-to-peer) wireless network object-level security, 96–97, 103–111 defined, 335 to Registry, 116–124 discussed, 219, 230–232, 320 system security settings, 96 Add button access point (AP). See also wireless access for ACEs, 114 point in File Sharing Wizard, 99 in discovery process, 218–219 Add text (File Sharing Wizard), 98, 99 and SSID values, 235 http://www.pbookshop.com Admin Approval mode username and password for, 232 administrators in, 69–70 account(s) for built-in administrators, 59–61 built-in, 83–87 defined, 335 defined, 81 disabled, 60 managing, 81–83 COPYRIGHTEDelevation MATERIAL prompt for administrators in, password-protected, 286 61–63 SAM, 299 enabled, 60, 61 account-lockout policy, 297–298 Local Security Policy, 59–63 ACE (Access Control Entry), 105 and Standard User mode, 55–57 ACL (access control list), 109 and UAC, 69–70 action pane, 206 administrative templates Active Directory (AD) custom, 303 and domain network, 207, 296–297 discussed, 302 Domain Profile, 207 interface, 303–304 password policies, 296–297 and Registry, 302 Active Server Pages (ASP), 250 settings, 303 30_118054 bindex.qxp 10/11/07 9:54 AM Page 346 346 Windows Vista Security For Dummies administrative username, 232–233 ASP (Active Server Pages), 250 Administrator (account), 83–84 asymmetric encryption in Admin Approval mode, 61–63, 69–70 defined, 335 built-in, 59–61, 300 discussed, 160–161 common tasks of, 55 and symmetric encryption, 163 elevation prompt for, 61–63 @RISK: The Consensus Security Alert sharing, 98 (newsletter), 329 Standard Users versus, 55 attachment Administrators (group), 82, 84 in e-mail, 318 .admx, 303 in instant messaging, 321 Advanced Encryption Standard (AES), Audit Account Logon Events, 126 173, 188 Audit Account Management, 126 Advanced Security applet Audit Logon Events, 126 Getting Started section with, 211–213 Audit Object Access, 126, 130 and Resources pane, 213–214 audit policy, 298 Windows Firewall with, 205–214 Audit Policy Change, 126 Advanced tab (Windows Firewall), 204–205 Audit Privelege Use, 126–127 adware, 260 Audit Process Tracking, 127 AES (Advanced Encryption Standard), Audit System Events, 127 173, 188 auditing alert(s) access management with, 124–132 for application installations, 65 defined, 105, 125 when program is blocked, 203 discussed, 105, 124–125 in Windows Defender, 270–271 and logging, 124–132 in WSC, 50 of NTFS objects, 130–131 allow of objects, 130–132 access, 214 passive, 131 connection, 212 policies, 124–129 secure connections, 212 of Registry objects, 131 Unicast Response, 210 of service objects, 131 Allowed Items, 274–275 AuditPol.eze, 298 anonymous enumeration,http://www.pbookshop.com 299 Authenticate Communications between ANONYMOUS LOGON, 84 Computers section (Getting antispyware, 261 Started), 211 antivirus software Authenticated Users, 83, 85, 106 discussed, 325–326 authentication, 81–82, 335 and firewalls, 328 authorization, 335 in mobile devices, 322 Auto Start, 265 AP. See access point automatic (scheduled) scan, 269, 270 application installations Automatic Updating alerts for, 65 and ActiveX Opt-In, 256 backing up, 141 discussed, 44 by malicious programs, 65 managing, 45–46 Apply To, 114, 115 monitoring, 45 archive folder, 151 and WSC, 44–46 30_118054 bindex.qxp 10/11/07 9:54 AM Page 347 Index 347 Automatically Deny Elevation Requests, binary behaviors 63–64 and DHTML, 246 AutoPlay and AutoRun in IE7, 246 of CD/DVDs, 285 BIOS policies, 304 and BitLocker, 173 availability, 20, 36 changes to, 180 BitLocker additional security with, 187 • B • advanced options, 181–182 backing up basic options, 179–181 advanced methodologies, 140 and BIOS, 173 application information, 141 data recovery, 191–194 with Backup and Restore, 151–154 and data theft, 171–173 with Backup Files Wizard, 152–153 defined, 17, 172, 335 business information, 141 disabling, 195–196 on CD, 152 discussed, 171–173 with CompletePC Backup, 139, 154–157 encryption with, 16–17, 188–189 discussed, 135 folders, recovering, 191–192 on DVD, 152 and Group Policy Object Editor, 178, 191 encryption keys, 170 interface, 179, 195 files, 138–139, 146, 152–153 methods, 188–189 folders, 138–139, 146 options for recovery, 192–194 on hard disk, 152 and PIN, 183–186 options for, 137–140 preparing system for, 174–178 organization for, 150–151 Prevent Memory Overwrite, 189–191 and partitioning, 174 recovering data, 191–194 preserving data by, 147–150 for removable media, 196 private keys, 170 requirements for, 173–174 reasons for, 136–137 setting up, 178–187 requirements for, 140–144 and startup key, 186–187 with Shadow Copy, 139–140 and TPM, 173, 179, 182–187 with shadow copy, 157http://www.pbookshop.comweaknesses of, 196 storage media for, 142 BitLocker Drive Encryption, 194, 304 strategy planning for, 145–147 blocking supported devices for, 140 alerts, 203 system data, 141 connections, 201, 208, 209, 212 with System Restore, 137–138, 147–149 of file downloads, 13 third-party software for, 327–328 of inbound connections, 201, 208 Backup and Restore Center of programs, 203 defined, 335 with spyware removal tools, 327 discussed, 151–154 Bluetooth, 322 Backup Files Wizard, 152–153 boot protection, 172 Backup Log Automatically When Full, 129 broadband Internet, 313. See also wireless Backup Operators, 84 network BATCH, 84 broadband router, 314 BCWipe (Jetico), 333 built-in account, 83–87 30_118054 bindex.qxp 10/11/07 9:54 AM Page 348 348 Windows Vista Security For Dummies built-in administrator, 59–61, 300 Control Panel, 303 built-in group (special identity), 83–87 Co-Owner (permission), 100 built-in identity, 83–87 Credentials, Prompt for business information in Administrator mode, 62 backing up, 141 in Standard User mode, 63 protection of, 21 cross-domain scripting protection, 15–16 cross-domain security defined, 257 • C • and IE7, 243–244 Cancel button (File Sharing Wizard), 100 scripting attacks, 15–16, 243–244 caution, 215 Currently Running Programs, 276 CD custom scan, 11, 268 AutoPlay and AutoRun, 285 customer information, 21 backing up on, 152 deny write access to, 292 CD-ROM access, 299 • D • cellphone. See mobile device DACL (Discretionary Access Control List), Change (permission), 78 104, 105 Change button, 115 data. See also sensitive information Change Scope button, 203 backing up, 147–150 Change Settings, 46 in BitLocker, 191–194 Check for Updates, 45 and EFS, 167–168 Check Names, 92 organizing, 150–151 Check this Web site, 245 preserving, 147–150 child object, 109, 111 recovering, 167–168, 191–194 children, controls for, 12 on removable media, 286–288 Classic View (UAC), 59 removing, 286–287 Clear All button, 115 System Restore for, 147–149 code, 10 Data Recovery Agent, 163 Cogswell, Bryce, 332 data scrubber program, 288 common sense, 24 data theft, 171–173 Communications, Securehttp://www.pbookshop.com in, 9, 10 DDoS (Distribute Denial-of-Service), 317–318 company financials, 21 decryption, 336 CompletePC Backup (system image) Default, Secure by, 9, 10 backing up with, 154–155 Default Action (Definition-Based), 271, 272 description, 146 Default View (UAC), 59 discussed, 139, 154–157 Defender. See Windows Defender restoring, 155–156 definition files, 262–263, 269 and shadow copies, 156–157 deny write access, 292 Components (Windows), 304 Deployment, Secure in, 9, 10 compressed files, 162 Design, Secure by, 9, 10 compressed folder, 162 Desktop, 303 computing, 1, 12 detect application installations confidentiality, 36–37 disabled, 65 configuration policy, 301 for elevation prompts, 65–66 Consent, Prompt for, 61, 63 enabled, 65 console tree, 206 device Container Only check box, 115 installation, 290–291 Contributor (permission), 100 usage, 292 30_118054 bindex.qxp 10/11/07 9:54 AM Page 349 Index 349 Device Control defined, 288 • E • for device installation, 290–291 Edit button, for ACEs, 114 for device usage, 292 effective permissions, 105–108 discussed, 288 EFS. See Encrypting File System and Group Policy, 289 Elevate without Prompting, 62 installation settings of, 288–289 elevated privilege, 336 for removable media, 286–292 elevation prompt usage settings of, 289–290 in Admin Approval mode, 61–63 DHCP (Dynamic Host Configuration for administrators, 61–63 Protocol), 221, 228 and automatic denial, 63–64 DHTML (Dynamic HTML), 246 defined, 56 Diffuser, 173, 188 detect application installations, 65–66 diffusion, 188 and Secure Desktop, 70–71 digital certificate signature checks for, 66–67 defined, 336 for Standard Users, 63–65 support for, 161 in UAC, 61–68 Digital Rights Management (DRM), 80 UIAccess, 67–68 digital signature, 336 e-mail discovery process, 218–219 attachments, 318 Discretionary Access Control List (DACL), MMC attacks via, 319 104, 105 and mobile devices, 322 Distribute Denial-of-Service