Log on to the workstation as Administrator and try requesting the certificate again.
Use the Web Enrollment Support pages for your CA instead of the Certificates snap-in.
Call the network help desk and have someone give you the permissions you need to request the certificate.
Activate the Secure Server (Require Security) policy in your workstation’s Local Security Settings console.
Security Parameters Index
The order of the fields in the ESP header
The location of the ESP header in the datagram
The location of the ESP trailer in the datagram
The value of the Next Header field in the ESP header
Client (Respond Only).
Secure Server (Require Security).
Server (Request Security).
You must create a new custom policy.
The IP address of the router’s WAN interface
The port number associated with the WAN technology used for the tunnel
The IP address of the router at the far end of the tunnel
The network layer protocol used for the WAN connection
Internet Key Exchange
The IP Security Policies snap-in
Resultant Set of Policy
IP Security Monitor
IP Security Policies
In the IP Security Policies snap-in, remove the assignment of the IPSec policy, and then assign it again.
Restart each network computer.
Use the Resultant Set of Policy snap-in to refresh the policy assignment.
Delete the computer objects from Active Directory and recreate them.
The default Secure Server (Require Security) policy
The default Client (Respond Only) policy
A policy that secures all TCP traffic, using both the AH and ESP protocols
A policy that secures all traffic to the port number of the database application, using the AH protocol
Configure the routers at both ends of the WAN connection to use IPSec in tunnel mode
Configure the database servers with the Secure Server (Require Security) policy
Configure the workstations of the users at the headquarters with the Client (Respond Only) policy
Configure the database servers and the workstations at the headquarters to use IPSec in tunnel mode
Security Configuration and Analysis
Microsoft Software Update Services
Microsoft Baseline Security Analyzer
Configure the SUS server to push the updates to specified computers.
Use group policies to configure Automatic Updates on the workstations.
Use Microsoft Baseline Security Analyzer to configure Automatic Updates on the workstations.
Create a login script for the workstations that downloads the update files and installs them.
To automate the update deployment process
To conserve Internet bandwidth
To enable administrators to test updates before deploying them
To determine which updates must be deployed on each workstation
Open System authentication
Shared Key authentication
IEEE 802.1X authentication using EAP-TLS
IEEE 802.1X authentication using PEAP-MS-CHAP v2
WEP is not enabled.
Windows XP SP1 is not installed on the computers.
Windows XP does not support Shared Key authentication.
A PKI is required for Shared Key authentications.
Basic service set
Ad hoc network
Install the Remote Desktop Connection client on the workstation.
Activate Remote Desktop on the server using the System Control Panel.
Enable the Solicited Remote Assistance group policy for the domain.
Add your account name to the Remote Desktop users list.
Display the Remote Assistance Settings dialog box and reduce the duration of the invitations created by your computer.
Refuse the incoming connection when it arrives.
Change your user account password.
Windows 2000 Server
Windows Server 2003
Use WEP encryption for all wireless transmissions
Roam from one access point to another
Access resources on other wireless computers
Participate in an infrastructure network
Install IAS on a computer running Windows Server 2003.
Deploy a public key infrastructure on the network by installing Certificate Services.
Install smart card readers in all the laptop computers.
Install SP1 on all the laptops running Windows XP.
Unauthorized users connecting to the network
Passwords from unencrypted WLAN authentication messages
Interception of transmitted data by someone using a wireless protocol analyzer
Inability of wireless computers to access resources on the cabled network