WINDOWS 1002000 PROFESSIONAL RESOURCE KIT [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

WINDOWS 1002000 PROFESSIONAL RESOURCE KIT [Electronic resources] - نسخه متنی

Chris Aschauer

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید







Quick Guide to Security


Use this quick guide to locate information about security. You will find information about security features which are new to Windows 2000, direction on designing and implementing a security plan, ideas for making workstations secure, and detailed information about the security features of Windows 2000.

Understand what's new in security.

Learn about new features in Windows 2000 security and how those compare to available security features in older versions of Windows.


Design and implement a security plan.

Designing a security plan includes setting security goals and strategies and deciding on the level of security you need. Deciding on the level of security means weighing the pros and cons of higher versus lower security. Higher security requires more administration but ensures only the right people will have access to your resources. Lower security creates a more flexible and open environment, but might not be as secure as other configurations.


Understand client authentication.

Windows 2000 security requires user authentication. Different authentication schemes are appropriate depending on your computing environment. Windows 2000 supports interactive logon and network authentication using Kerberos, NTLM, and smart cards, among other things.


Understand user rights and permissions.

Windows 2000 provides permissions and user rights which enable specific, detailed management of your security environment combined with powerful group management technologies. Set rights and permissions to determine the activities and access allowed for users. Carefully setting these attributes affects how users' computers behave and how secure they are.


Understand and implement security policy.

Security policy enforces uniform security standards for groups of users. Use security policy to establish a basis of security for your environment. Different from user rights and permissions, security policy applies to all users or objects in your deployment.


Understand and implement security templates.

Security templates provide a way to apply consistent security to multiple computers. Security templates work much like security policy, but they can be applied to any computer and provide an easy way to apply a customized set of default security settings.


Understand and implement remote access.

Allowing users to access your network using a modem provides opportunity for more flexibility and productivity for users but also presents unusual security challenges. If you use remote access, make sure your system is configured to maintain security.


Understand and implement Internet Protocol security.

When you send information over the Internet, Windows 2000 makes it possible for you to encrypt all information above the transmission layer, producing a secure tunnel even through insecure connections.


Understand and implement Encrypting File System.

Data on your hard disk drive can use the Encrypting File System (EFS) to ensure that even people with access to your physical computer are unable to read the contents of your hard disk drive. EFS can be a key security feature on all computers but is particularly helpful on portable computers that are difficult to physically secure.


Understand public key technology.

Public key technology allows you to encrypt data for confidentiality and use data signing for integrity. Learn how Windows 2000 uses public key technology to secure your information assets.


Protect user data on portable computers.

Portable computers present special security risks. Understand what those risks are, decide how to mitigate them, and then implement a plan that will protect your portable computers, while still allowing users flexibility.


/ 335