ISA Server 2004
ISA Server 2004
ISA Server 2004
Author:
Abstract
This document describes the Guidance Documentation Addendum of ISA Server 2004 Enterprise Edition Common Criteria Certification that is the basis for the ISA Server 2004 Enterprise Edition Common Criteria evaluation.
Keywords
CC, ISA, Common Criteria, Firewall, Guidance Documentation Addendum
Page 2/30
Page 3/30
Table of Contents
Page
INTRODUCTION TO USER'S GUIDE OR ADMINISTRATOR'S GUIDE .......................5 1.1 Overview ..................................................................................................................5 1.2 Security Functions and Associated Chapters ..........................................................7 1.3 Warnings About Functions and Privileges ...............................................................8 1.4 Installation of the Evaluated ISA Server 2004 Enterprise Edition ............................8 2 SECURITY FUNCTIONS ..............................................................................................13 2.1 SF1 - Web Identification and Authentication ..........................................................13 2.2 SF2 - Information Flow Control ..............................................................................15 2.3 SF3 - Audit .............................................................................................................16 2.4 Administration-Related Interfaces ..........................................................................16 2.5 TOE User Interfaces ..............................................................................................17 3 OPERATING ENVIRONMENT .....................................................................................18 3.1 Assumptions...........................................................................................................18 3.2 Organizational Security Policies.............................................................................19 3.3 Secure Usage Assumptions - IT Security Requirements for the IT Environment ..19 3.4 Security Objectives for the Environment ................................................................20 3.5 Requirements for the Operational Environment.....................................................20 4 SECURITY-RELEVANT EVENTS ................................................................................22 5 TOE INTEGRITY...........................................................................................................23 5.1 Integrity of the CD-ROM Content ...........................................................................23 5.2 Integrity of the Package .........................................................................................27 5.3 Version Number for the TOE..................................................................................27 6 REFERENCES AND GLOSSARY ................................................................................28 6.1 References.............................................................................................................28 6.2 Acronyms ...............................................................................................................28 6.3 Glossary .................................................................................................................29
Page 4/30
List of Tables
Page
Table 1.1 Security functions and associated chapters ........................................................7 Table 1.2 Warnings about functions and privileges.............................................................8 Table 3.1 Assumptions for the IT environment and intended usage .................................18 Table 3.2 Security policies addressed by the TOE............................................................19 Table 3.3 TOE functional security requirements for the environment ...............................19 Table 3.4 Security objectives for the environment.............................................................20 Table 4.1 Security-relevant events ....................................................................................22
List of Figures
Page
Figure 5.1 Integrity check I (successful) ............................................................................24 Figure 5.2 Integrity check II (missing FCIV tool)................................................................24 Figure 5.3 Batch file (ISA Server 2004 Enterprise Edition CD) for CD-ROM integrity check ......................................................................................................................................25 Figure 5.4 Batch file (Service Pack 2 CD) for CD-ROM integrity check ............................26 Figure 5.5 ISA Server 2004 Enterprise Edition (CD-ROM) ...............................................27 Figure 5.6 Version number of ISA Server 2004 Enterprise Edition ...................................27
Page 5/30
1.1 Overview
The ISA Server 2004 Enterprise Edition manual [MSISA] consists of the following chapters: Introducing ISA Server Installation and Upgrade Administration and Security Networking Firewall Policy Clients Virtual Private Networking Caching Monitoring Add-ins Deployment Scenarios Additional Resources Security Functions Operating Environment Security-Relevant Events Target of evaluation (TOE) Integrity Reference and Glossary
These chapters provide the required information for the ISA Server 2004 Enterprise Edition common criteria evaluation.
Note: According to the used Common Criteria wording: An administrator is the person who installs, configures, and administrates the target of evaluation (TOE), and a user is the person who sends data through the firewall (uses internal or external network resources where access is intercepted by the firewall). Because of the nature of a firewall product (the filtering is a transparent process for the user), the manuals provided are for administration purpose only.
Page 6/30
The evaluated Guidance Documentation is valid for ISA Server 2004 Enterprise Edition. Its software version is ISA Server 2004 Enterprise Edition Service Pack 2 (SP2) (version 4.0.3443.594). The evaluated configuration is ISA Server 2004 Enterprise Edition.
Page 7/30
Guidance Documentation Addendum Security function (see [ST]) SF3 - Audit Relevant chapters [MSISA]
Page 8/30
[MSISA] Monitoring > Monitoring: Concepts > Logs > Log storage format > Section: MSDE 2000 database [MSISA] Monitoring > Monitoring: Concepts > Logs > Log Viewer [MSISA] Monitoring > Monitoring: Concepts > Logs > Microsoft Firewall service log fields [MSISA] Monitoring > Monitoring: Concepts > Logs > Web proxy log fields
Caution (marked with a red flag) [MSISA] Firewall Policy > Firewall Policy: Concepts > Authentication > Authentication methods for Web requests
Warning (marked with a yellow sign) [MSISA] Caching > Caching: Concepts > Content download jobs: (Note: This is not a security function according the Security Target but gives an example for a warning.) [MSISA_ADD] Chapter 2 Security Functions
Page 9/30
ISA Server 2004 Enterprise Edition is composed of the following components: ISA Server Management. The console through which the administrator manages the enterprise. Configuration Storage server. The repository of the enterprise layout and the configuration for each server in the enterprise. This repository is an instance of Active Directory Application Mode (ADAM). Each ISA Server computer has a local copy of its configuration that is a replica of the servers configuration, which is located on the Configuration Storage server. ISA Server services. This is the computer that runs the firewall, virtual private network (VPN), and caching functions of ISA Server. The computer running ISA Server services is connected to a Configuration Storage server, which stores the configuration information. Additional components. Additional components (Advanced Logging, Firewall Client Share, and Message Screener) can be installed on separate computers. Note that the Advanced Logging component can only be installed on a computer running ISA Server services.
Warnings To install the evaluated version, the administrator must install ISA Server Management and the Configuration Storage server (file \ISAAutorun.exe). The following pictures show the step-by-step installation process for ISA Server 2004 Enterprise Edition.
Startup screen
License Agreement
Page 10/30
Installation options
Installation note
Page 11/30
Service warning
After installation of ISA Server, the administrator must install Service Pack 2, which is delivered separately on an additional CD-ROM (file \ENU\ISA2004EE-KB903676-x86ENU.msp).
License Agreement
Page 12/30
Pop-up note
Page 13/30
2 Security Functions
This chapter identifies all the security functions available to the administrator. The security functions are derived from the ISA Server 2004 Enterprise Edition security functions described in the ISA Server 2004 Enterprise Edition Security Target (ST). For administration, ISA Server 2004 Enterprise Edition includes graphical taskpads and wizards. These simplify navigation and configuration for common tasks. These features are embedded in the Microsoft Management Console and do not belong to the TOE. They are provided by the environment. The underlying operating system is the certified Windows Server 2003, Standard Edition (English) SP1 including MS05-042 (KB899587), MS05-039 (KB899588), MS05-027 (KB896422), and update KB907865. (The same installation has been used for Windows Server 2003 Common Criteria EAL 4+ evaluation; Validation Report Number CCEVS-VR05-0131, [WINST] and [WINVR], and referenced as Windows Server 2003 in this document.) Warnings The administrator must ensure that ISA Server 2004 Enterprise Edition is installed and used with Windows Server 2003. More details can be found in the Security Target of ISA Server 2004 Enterprise Edition [ST]. The administrator has to observe the Security Bulletins, to ensure that all possible countermeasures are used. The administrator should check http://www.microsoft.com/security/ regularly for the latest ISA Server 2004 Enterprise Edition service packs and hotfixes. The administrator should only use programs that are required to administer and operate the firewall. The administrator should not install additional software which may compromise the security of the TOE or the underlying operating system.
Page 14/30
The TOE has been evaluated using Basic authentication with SSL encryption for incoming HTTP connections. The TOE verifies if the user credentials comply with data stored in the local user database or a remote authentication server using Remote Authentication Dial-In User Service (RADIUS). Warnings There is a change in the default behavior when SP2 is installed on ISA Server 2004: When you try to connect to a Web site that is published by using ISA Server 2004 SP2, you receive an error message. If the ISA Server Web listener has Basic authentication enabled, you receive the following error message: Error Code: 403 Forbidden. The page must be viewed over a secure channel (Secure Sockets Layer (SSL)). Contact the server administrator. (12211) If the ISA Server Web listener has RADIUS authentication or Microsoft Outlook Web Access forms-based authentication (Cookie-auth) enabled, you receive the following error message: Error Code: 500 Internal Server Error. An internal error occurred. (1359) This issue occurs if all the following conditions are true: The ISA Server 2004 Web listener has any one of the following authentication methods enabled: o o o Basic RADIUS Outlook Web Access forms-based
The ISA Server 2004 Web listener is configured to listen for HTTP traffic. The Require all users to authenticate check box is selected for the Web listener or the Web publishing rules apply to a user set other than the default All Users user set. You connect to the published Web site by using HTTP instead of by using HTTPS.
This issue occurs because of a security modification that is included in ISA Server 2004 SP2. When you use HTTP-to-HTTP bridging, ISA Server 2004 SP2 does not enable traffic on the external HTTP port if the Web listener is configured to request one or more of the following kinds of credentials: Basic RADIUS Outlook Web Access forms-based
Page 15/30
This behavior occurs because these kinds of credentials should be encrypted. These credentials should not be sent in plaintext over HTTP. For ISA Server 2004 versions that are earlier than ISA Server 2004 SP2, you are prompted to enter credentials in plaintext. This behavior may cause the credentials to be transmitted over the network in plaintext if you have not implemented some other form of network security, such as an external Secure Sockets Layer (SSL) accelerator or an encrypted tunnel. ISA Server does not provide these forms of security. ISA Server 2004 SP2 prevents you from entering credentials in plaintext. When you try to do this, you receive an error message. Warnings When using Basic authentication, the user name and password are sent in plaintext (base-64 encoded). Basic authentication for Web requests must be secured using an SSL channel, so user identification and authentication credentials are encrypted during transmission. Use strong SSL encryption with at least 128 bit. When using Basic authentication, depending on the application on the information technology (environment, an application could "cache" the password. So the user must ensure that the environment is locked, when it is unattended.
Page 16/30
ports 135, 137, 138, 445, and TCP ports 135, 139, 445, and 593, the Microsoft Distributed Transaction Coordinator service is not vulnerable over those ports. MS06-032 required to disable IP source routing: Disabling IP source routing will prevent an affected host from processing IP sourcerelated packets that could allow an attacker to execute code. IP source routing processing can be disabled by the following registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\ Add the DWORD Value: DisableIPSourceRouting. Set the value to 2. This value disables IP source routing processing. By default, this key does not exist.
Page 17/30
EXIF_MMC is the only external interface for administration. It is not used directly, but the Microsoft Management Console uses this interface to provide the log viewer. The log viewer component uses EXIF_MMC to communicate with the Microsoft Management Console. There are two additional interfaces, which are used indirectly for administration. Configuration data is read using EXIF_REG or EXIF_STORE from the local registry or the file system. The TOE reads the configuration using the same interfaces from the registry or the file system. So registry and/or file system changes may change the configuration of the TOE. Warning By default, policy changes are applied within a time frame of 15 seconds since the relevant configuration data has to be polled from ADAM.
Page 18/30
3 Operating Environment
The security environment of the Evaluated Configuration of ISA Server 2004 Enterprise Edition is described in the ISA Server 2004 Enterprise Edition Security Target [ST] and identifies the threats to be countered by ISA Server 2004 Enterprise Edition, the organizational security policies, and the usage assumptions as they relate to ISA Server 2004 Enterprise Edition. The administrator should ensure that the environment meets the organizational policies and assumptions. They are repeated in the section that follows from the Security Target. To use the TOE in the evaluated configuration, the underlying environment must be the Windows Server 2003 operating system.
3.1 Assumptions
Table 3.1 lists the TOE Secure Usage Assumptions for the IT environment and intended usage. Table 3.1 Assumptions for the IT environment and intended usage
# 1 Assumption name A.DIRECT Description The TOE is available to authorized administrators only. A person who has physical access to the TOE and can log on to the operating system is assumed to act as an authorized TOE administrator. The TOE stores and executes security-relevant applications only. It stores only data required for its secure operation. Nevertheless, the underlying operating system may provide additional applications required for administrating the TOE or the operating system. Authorized administrators are non-hostile and follow all administrator guidance. The environment implements the following functionality: Local identification and authentication of user credentials used for Web publishing (see A.WEBI&A for RADIUS identification and authentication; in case of a successful authentication, the TOE analyses the returned value and allows or denies the access to network resources depending on that value), reliable time stamp (log file audit), file protection (for log file access protection, registry protection, and ADAM protection), cryptographic support (for SSL encryption), administration access control, reliable ADAM implementation, Network Load Balancing (disabled by default). 5 6 7 8 A.PHYSEC A.SECINST A.SINGEN A.WEBI&A The TOE is physically secure. Only an authorized person has physical access to the system that hosts the TOE. Required certificates and user identities are installed using a confidential path. Information can not flow among the internal and external networks unless it passes through the TOE. User credentials are verified by a RADIUS server. The RADIUS server returns a value if a valid account exists or not. Web Identification & Authentication with a RADIUS server requires that the RADIUS server is placed on the internal network, so that data (user credentials and return values) transferred to and from the RADIUS server is secured by the TOE from external entities.
A.GENPUR
3 4
A.NOEVIL A.ENV
Page 19/30
All Web publishing rules that support Basic authentication have to be configured by the administrator so that strong encryption for SSL is enforced (at least 128 bit encryption).
Page 20/30
OE.SINGEN
OE.WEBI&A
All Web publishing rules that support Basic authentication should be configured by the administrator so that strong encryption for SSL is enforced (at least 128 bit encryption).
Page 21/30
Criteria EAL 4+ Evaluation; Validation Report Number CCEVS-VR-05-0131, [WINST] and [WINVR]). The update number listed on the security bulletin corresponds to the Microsoft Knowledge Base (KB) article ID number. The Microsoft Knowledge Base is a database of technical articles about Microsoft products and technologies. These articles range from "how to" articles describing how to complete a specific task to "bug" articles documenting known issues with Microsoft products. When you scan your computer for available updates, through the Windows Update Web site, the Windows Update Web site displays a number along with the title of the update, for example, "Update for Windows Media Player 9 Series (KB837272)." This KB number is included in the security bulletin to help identify the corresponding KB article in the Microsoft Knowledge Base. The previously mentioned configuration for the operational environment has been used as an underlying operating system for evaluation. Some more directives for security best practices are given in [MSISA] > Administration and Security > Administration and Security Concepts > Security best practices. Because the computer on which ISA Server 2004 is running is often the primary interface to the External network, we recommend this computer be secured. The Security Best Practices [MSISAHARD]3 document ISA Server 2004 Security Hardening Guide, available on the ISA Server Web site, details how to secure the ISA Server 2004 Enterprise Edition computer, and is updated periodically with new information. Warning The administrator should check http://www.microsoft.com/security/ regularly for the latest Windows Server 2003 hotfixes.
Page 22/30
4 Security-Relevant Events
This subsection describes all types of security-relevant events and what administrator action (if any) to take to maintain security. Security-relevant events that may occur during operation of ISA Server 2004 Enterprise Edition must be adequately defined to allow administrator intervention to maintain secure operation. Security-relevant events are defined as events that signify a security related change in the system or environment. These changes can be grouped as routine or abnormal. The routine events are already addressed in subsection Security Functions.
Audit
[MSISA] Monitoring > Monitoring: How To > Configure logging > Configure logging to an MSDE database
Page 23/30
5 TOE Integrity
This chapter describes how the administrator can verify that the evaluated version of the TOE is used.
The corresponding hash files are available from the Microsoft corporate Web site, as well as a batch file that runs the tool and a Readme file that explains the usage for users that do not have access to this document. The hash file contains SHA-1 values for each of the relevant files that must be verified and is downloadable using a secured channel from the ISA Server 2004 common criteria Web page: http://go.microsoft.com/fwlink/?linkid=49507 The FCIV is a command-prompt utility that computes and verifies cryptographic hash values of files (MD5 and SHA-1 cryptographic hash values are possible). The tool is run by the supplied batch file. To run the batch file the user opens a Command Prompt window and changes to the folder into which the validation files were downloaded. The user then types the following (the exact file name depends what CD or file the user wants to verify): integritycheck.cmd X: Where x: is the local CD-ROM drive that contains the ISA Server 2004 Enterprise Edition CD or the ISA Server 2004 SP2 CD. To verify the Service Pack 2 (download from Web), the batch file must be copied into the same folder with SP2. Figure 5.1 shows a successful verification of the TOE. Figure 5.2 shows an error message because of the missing FCIV tool.
Page 24/30
Page 25/30
Figure 5.3 Batch file (ISA Server 2004 Enterprise Edition CD) for CD-ROM integrity check
@echo off setlocal ENABLEDELAYEDEXPANSION if "%1"=="" goto usage set DriveLetter=%1 set ExpectedVL=ISA2K4SELE_EN set ExpectedDirs=150 set ExpectedFiles=661 set Dirs= set Files= set MisCount= REM Verify that fciv.exe exists in the path fciv -? >NUL if NOT [%errorlevel%]==[0] goto usage REM Verify there is a valid CD in the drive vol %1 > NUL if NOT [%errorlevel%]==[0] goto usage REM Check Volume ID for /f "usebackq tokens=6 delims= " %%V in (`vol %1 `) do set VolumeID=%%V&echo. if NOT %VolumeID%==%ExpectedVL% ( echo The volume label of the CD in drive %1 is %VolumeID% echo This integrity check can identify only original CDs with Volume Label: %ExpectedVL% echo Please insert the CD with volume label %ExpectedVL%. Then try again. echo. goto end ) @REM *** Count directories and Files for /F "usebackq tokens=1 delims= " %%J in (`dir /s /A:D %DriveLetter% ^| findstr /c:"Dir(s)"`) do (set Dirs=%%J) for /F "usebackq tokens=1 delims= " %%J in (`dir /s /A-D %DriveLetter% ^| findstr /c:"File(s)"`) do (set Files=%%J) if NOT [%Dirs%]==[%ExpectedDirs%] Set MisCount=Yes&echo *** The CD in %1 contains %Dirs% directories instead of %ExpectedDirs% *** if NOT [%Files%]==[%ExpectedFiles%] Set MisCount=Yes&echo *** The CD in %1 contains %Files% directories instead of %ExpectedFiles% *** if [%MisCount%]==[Yes] goto end echo echo echo echo. The verification process may take several minutes... The files on the CD are being scanned to validate their integrity ......
@REM *** Run the integrity check fciv -v %1\ -r -sha1 -bp %1\ -xml %ExpectedVL%.xml > integritycheck.log findstr /c:"All files verified successfully" integritycheck.log if NOT [%errorlevel%]==[0] ( echo The integrity check could not validate all the files on the CD echo The integrity check log file is saved in the current directory... pause notepad integritycheck.log echo. goto end ) else ( echo. echo The CD in drive %1 is an authentic ISA Server 2004 Enterprise Edition - English Microsoft Licensing CD echo. del integritycheck.log ) goto end :usage echo Usage: echo %~nx0 x: echo x: CD-ROM drive containing ISA Server 2004 EE CD (Volume Label: %ExpectedVL%) echo Fciv.exe must be in the current directory or in the path. echo You can download Fciv.exe from http://support.microsoft.com/default.aspx?scid=kb;en-us;841290 echo. :end endlocal
Page 26/30
Figure 5.4 Batch file (Service Pack 2 CD) for CD-ROM integrity check
@echo off setlocal ENABLEDELAYEDEXPANSION if "%1"=="" goto usage set DriveLetter=%1 set ExpectedVL=ISA2004-SP2-CD set ExpectedDirs=150 set ExpectedFiles=661 set Dirs= set Files= set MisCount= REM Verify that fciv.exe exists in the path fciv -? >NUL if NOT [%errorlevel%]==[0] goto usage REM Verify there is a valid CD in the drive vol %1 > NUL if NOT [%errorlevel%]==[0] goto usage REM Check Volume ID for /f "usebackq tokens=6 delims= " %%V in (`vol %1 `) do set VolumeID=%%V&echo. if NOT %VolumeID%==%ExpectedVL% ( echo The volume label of the CD in drive %1 is %VolumeID% echo This integrity check can identify only original CDs with Volume Label: %ExpectedVL% echo Please insert the CD with volume label %ExpectedVL%. Then try again. echo. goto end ) echo echo echo echo. The verification process may take several minutes... The files on the CD are being scanned to validate their integrity ......
@REM *** Run the integrity check fciv -v %1\ENU\ISA2004EE-KB903676-x86-ENU.msp -sha1 -bp %1\ -xml %ExpectedVL%.xml > integritycheck.log findstr /c:"All files verified successfully" integritycheck.log if NOT [%errorlevel%]==[0] ( echo The integrity check could not validate all the files on the CD echo The integrity check log file is saved in the current directory... pause notepad integritycheck.log echo. goto end ) else ( echo. echo The CD in drive %1 contains an authentic ISA Server 2004 Enterprise Edition SP2 English Version echo. del integritycheck.log ) goto end :usage echo Usage: echo %~nx0 x: echo x: CD-ROM drive containing ISA Server 2004 EE CD (Volume Label: %ExpectedVL%) echo Fciv.exe must be in the current directory or in the path. echo You can download Fciv.exe from http://support.microsoft.com/default.aspx?scid=kb;en-us;841290 echo. :end endlocal
Page 27/30
Page 28/30
6.1 References
General Common Criteria Documents [CC] Common Criteria for Information Technology Security Evaluation, version 2.1, revision August 1999, Incorporated with interpretations as of 2003-12-31 Part 1: Introduction and general model, CCIMB-99-031, Part 2: Security functional requirements, CCIMB-99-032, Part 3: Security Assurance Requirements, CCIMB-99-033 Common Methodology for Information Technology Security Evaluation, Part 1: Introduction and general model, version 0.6, revision 11.01.1997, Part 2: Evaluation Methodology, version 1.0, revision August 1999 Incorporated with interpretations as of 2003-12-31 General Microsoft Developer Documents [MSDN] [MSDNDVD] Microsoft Developer Network, http://msdn.microsoft.com/, Microsoft Corp. Microsoft Developer Network, DVD Version, January 2006, Microsoft Corp.
[CEM]
ISA Server 2004 Administrator Guidance and Publicly Available Evaluation Developer Documents [MSISA] [ST] [MSISAHARD] [WINST] [WINVR] Microsoft Internet Security and Acceleration Server 2004 Help Enterprise Edition, Microsoft Corp., Version 2004 Enterprise Edition ISA Server 2004 Enterprise Edition Common Criteria Evaluation - Security Target, Version 1.1, Final, 2006-05-11, Microsoft Corp. Security Hardening Guide - Microsoft Internet Security and Acceleration Server 2004, Microsoft Corp., Version 2006 Microsoft Windows Server 2003 or Windows XP Security Target, Version 1.0. 28.09.2005, Microsoft Corporation National Information Assurance Partnership, Common Criteria Evaluation and Validation Scheme Validation Report Microsoft Windows Server 2003 and Windows XP Workstation Report Number: CCEVS-VR-05-0131 Dated: November 6, 2005 Version: 1.1
Page 29/30
6.2 Acronyms
CC EAL FCIV MSDN PP SF SFP SSL ST TOE Common Criteria Evaluation Assurance Level File Checksum Integrity Verifier Microsoft Developer Network Protection Profile Security Function Security Function Policy Secure Sockets Layer Security Target Target of Evaluation
6.3 Glossary
application filters Application filters can access the data stream or datagrams associated with a session within the Microsoft Firewall service and work with some or all application-level protocols. Authentication is "A positive identification, with a degree of certainty sufficient for permitting certain rights or privileges to the person or thing positively identified." In simpler terms, it is "The act of verifying the claimed identity of an individual, station or originator" [Schou, Corey (1996). Handbook of INFOSEC Terms, Version 2.0. CD-ROM (Idaho State University & Information Systems Security Organization)]. Basic authentication is the standard authentication method for Hypertext Transfer Protocol (HTTP). Although user information is encoded, no encryption is used with Basic authentication. A feature pack contains new product functionality that is distributed outside the context of a product release, and usually is included in the next full product release. A firewall service log contains entries with connection establishments and terminations. Identification, according to a current compilation of information security terms, is "the process that enables recognition of a user described to an automated data processing system. This is generally by the use of unique machine-readable names" [Schou, Corey (1996). Handbook of INFOSEC Terms, Version 2.0. CD-ROM (Idaho State University & Information Systems Security Organization)]. In this document, ISA Server refers to Microsoft Internet Security and Acceleration Server 2004.
authentication
Basic authentication
feature pack
ISA Server
Page 30/30
The Microsoft Management Console is a configuration management tool supplied with Windows that can be extended with snap-ins. NTLM is an authentication scheme used by Microsoft browsers, proxies, and servers (Microsoft Internet Explorer, Internet Information Services, and others). This scheme is also sometimes referred to as the Windows NT Challenge/Response authentication scheme or Integrated Windows authentication. A packet filter log file contains records of packets that were dropped or allowed. A port number identifies a certain Internet application with a specific connection. Using publishing rules, you can publish virtually any computer on an internal network to the Internet (see Web publishing and server publishing). SSL is a protocol that supplies secure data communication through data encryption and decryption. SSL enables communications privacy over networks. Server publishing allows virtually any computer on an internal network to publish to the Internet. A service pack contains a cumulative set of all hotfixes, security updates, critical updates, and updates created and fixes for defects found by Microsoft since the release of the product. Service packs may also contain a limited number of customer requested design changes or features. W3C develops interoperable technologies (specifications, guidelines, software, and tools) concerning Web technology (http://www.w3c.org). Web publishing publishes Web content to the Internet.