O'Reilly logo

Windows Vista Security: Praxisorientierte Sicherheit für Profis by Marcus Nasarek

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Index | 911
kernel-level, 513
library-level kits, 513
Virtual Computer Based Rootkit
(VMBR), 513
virtualized, 513
routers, 476
Routing and Remote Access Service
(RRAS), 503, 610
routing table, 477
Run dialog box, 28
S
Safe Mode, 757
with Command Prompt, 757
with Networking, 757
sandboxes, 520
Sarbanes-Oxley, 514
Save Search, 195–197
scanners (see printers, scanners, and fax
machines)
scheduling automated tasks, 729
screen capture (see Snipping Tool)
screen resolution, 86
screensavers, 75–81
3D Text and Photos, 77
Search & Destroy, 515
search (see Windows Search), 187
Search box, 30
secure connectivity, 477
security, 795–808
dial-up, 605
elevation and, 64
levels of, 234
overview, 511–523
Password Policy (see Password Policy)
phishing, 233
security levels and zones, 234–242
configuring local intranet detection
and sites, 240
Internet, 235
Local Intranet, 234
Restricted Sites, 235
restricted sites, configuring, 241
setting, 236
setting custom level, 236
Trusted Sites, 235
trusted sites, configuring, 241
Security Options (see Security Options)
User Rights Assignment policies (see User
Rights Assignment policies)
while running Internet Explorer
7, 221–249
Windows Security Center, 524
security identifier (SID), 630
Security Options, 800–808
Accounts: Administrator Account
Status, 804
Accounts: Guest Account Status, 804
Audit: Force audit policy subcategory
settings, 804
Network Access: Allow anonymous
SID/Name translation, 804
Network Access: Remotely access registry
paths and subpaths, 805
Network Access: Restrict anonymous
access to named pipes and
shares, 805
System Cryptography: Force strong key
protection for user keys stored on
the computer, 805
System Settings: Optional
subsystems, 805
System Settings: Use certificate rules on
Windows executables for software
restriction policies, 805
User Account Control: Admin approval
mode for the built-in administrator
account, 805
User Account Control: Behavior of the
elevation prompt for administrators
in admin approval mode, 806
User Account Control: Behavior of the
elevation prompt for standard
users, 806
User Account Control: Detect application
installations and prompt for
elevation, 806
User Account Control: Only elevate
executables that are signed and
validated, 806
User Account Control: Only elevate
UIaccess applications that are
installed in secure locations, 806
User Account Control: Run all
administrators in Admin Approval
Mode, 807
User Account Control: Switch to the
secure desktop when prompting for
elevation, 807

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required