Can you remember the frustration you felt the last time you needed to work on a document but couldn’t connect to the network to use it? What about the last time you wanted to write an email or get some work done on the Internet, but you had to go to a different location where you could use a networked system? Multiply these problems and frustrations by every employee who has every experienced them and you will understand, if you don’t already, why wireless networking is becoming a requirement in many offices | Global Knowledge Expert Reference Series ofWhite Papers Using Windows Vista on a Corporate Mobile Network 1-800-COURSES Using Windows Vista on a Corporate Mobile Network Neil Tucker Global Knowledge Instructor MCT MCIPT MCTS MCDBA MCSE MCDST Introduction Can you remember the frustration you felt the last time you needed to work on a document but couldn t connect to the network to use it What about the last time you wanted to write an email or get some work done on the Internet but you had to go to a different location where you could use a networked system Multiply these problems and frustrations by every employee who has every experienced them and you will understand if you don t already why wireless networking is becoming a requirement in many offices. When properly implemented and used wireless networking acts not only as a nice convenience but as a valid tool for increasing productivity and efficiency. Those who resist the idea of creating a Wi-Fi network will normally acknowledge its advantages but express valid concerns about expanding the network infrastructure and preventing security problems inherent in the technology. Can you implement this kind of change without unduly impacting the security of the existing network infrastructure Can you enforce security procedures created just for the wireless network on end-users working with laptops Some of your users might be allowed to use their laptops on public Wi-Fi networks where you have no control. Can you run system checks and prevent computers with security problems from rejoining your network If you are using an Active Directory domain with Windows Vista clients the answer to all of these questions is yes. As you will see this does not have to be a complicated process. Having a basic understanding of the encryption and authentication choices available related group policy settings and Windows Vista features will help you narrow down your choices and make the decisions that are best .