tailieunhanh - w2kserver book hack proofing windowns 2000 server phần 4

Thư tấn công khách hàng xảy ra khi một phần của e-mail được gửi bằng cách sử dụng tin nhắn dạng HTML. Một khi tin nhắn được mở ra hoặc xem trong cửa sổ xem trước, | Security Configuration Tool Set Chapter 5 193 5. Right-click the Security Settings node and select Import Policy. Notice that the policies are template files with the .inf have the option of merging the template s entries into the present OU s security setup or you can clear the present OU s security settings and have them replaced by the settings in the imported template. Click Open to enact the new policy. You are not given the option to test the template settings against the present OU s security settings are enabled after you import the policy via the .inf file. Additional Security Policies The following are a few additional security policies of which you should be aware IPSec policy IPSec security policies can be configured and analyzed in the Security Configuration and Analysis snap-in. For more information on IPSec see Chapter 7 IP Security for Microsoft Windows 2000 Server. Public key policies Included in the public key policies are the encrypted data recovery agents root certificates and certificate trust lists. These topics are covered in detail in Chapter 9 Microsoft Windows 2000 Public Key Infrastructure and Chapter 6 Encrypting File System for Windows 2000. 194 Chapter 5 Security Configuration Tool Set Summary The Security Configuration Tool Set introduces a new and more efficient way to manage security parameters in Windows 2000. Using this new set of configuration and management tools the administrator can configure and manage the security policies for a single machine or an entire domain or organizational unit. The Tool Set includes the Security Configuration and Analysis snap-in Security templates the command-line tool and the security settings extensions to the Group Policy you can use these tools to create and configure security policies for local machines domains or OUs. The Security Configuration and Analysis snap-in allows the administrator to create a database with .

TỪ KHÓA LIÊN QUAN