Index
Note: Page numbers followed by f indicate figures and t indicate table.
A
Access control entry (ACE)
213
Access control list (ACL)
155–156
Active directory (AD) structure
account characteristics
159
group membership maintenance
domain members
160–161
gServiceUsers membership
161, 162f
snip, membership removal
161, 162f
SQLUser, default domain user
160–161, 161f
organizational units
159–160, 160f
Alternate proxy segment
Hyper-V environment
146
internal network traffic
146
IP settings
146, 147f
TMG network creation
147, 147f
virtual network manager
146, 146f
AppLocker
AddUsers-C code
44, 46f
AddUsers-C.exe
44, 45
Client Security
43–44
EXE file
43–44, 45f
Automatic rule creation
14, 15f
B
Backlist table
ClientAuthenticate
26–27
DeniedHosts table
26–27, 27f
DISTINCT
28–29
log structure ...

Get Thor's Microsoft Security Bible now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.