Module 8: Implementing Security in a Windows 2000 Network

This module provides students with the necessary knowledge and skills to implement security in a Microsoft® Windows® 2000 network by using security policies and auditing and by recovering encrypted files. In the lab in this module, students will have a chance to create a customized Microsoft Management Console (MMC) console for configuring security settings and creating a new security template. Then they will analyze and configure the security settings for a computer. | MICROSOFT A D c E RT IFI c ATI oN lŒîjjWî Official Curriculum Contents Module 8 Implementing Security in a Windows 2000 Network Overview 1 Introduction to Securing a Windows 2000 Network 2 Windows 2000 Security Policies 3 Implementing Security Policies 5 Implementing an Audit Policy 13 Recovering Encrypted Files 21 Lab A Implementing Security in a Windows 2000 Network 25 Best Practices 46 Review 47 Microsoft Information in this document is subject to change without notice. The names of companies products people characters and or data mentioned herein are fictitious and are in no way intended to represent any real individual company product or event unless otherwise noted. Complying with all applicable copyright laws is the responsibility of the user. No part of this document may be reproduced or transmitted in any form or by any means electronic or mechanical for any purpose without the express written permission of Microsoft Corporation. If however your only means of access is electronic permission to print one copy is hereby granted. Microsoft may have patents patent applications trademarks copyrights or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft the furnishing of this document does not give you any license to these patents trademarks copyrights or other intellectual property. 1999 Microsoft Corporation. All rights reserved. Microsoft Active Directory PowerPoint and Windows are either registered trademarks or trademarks of Microsoft Corporation in the . and or other countries. The names of companies products people characters and or data mentioned herein are fictitious and are in no way intended to represent any real individual company product or event unless otherwise noted. Other product and company names mentioned herein may be the trademarks of their respective owners. Project Lead and Instructional Designer Mark Johnson Instructional Designers

Không thể tạo bản xem trước, hãy bấm tải xuống
TỪ KHÓA LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.