Format:
Online-Ressource (1 online resource (146 pages))
,
illustrations
Edition:
Online-Ausg.
ISBN:
9781782178194
,
9781782178187
Content:
This practical tutorial-based book is filled with information about the architecture, functionality, and extensions of Microsoft Windows Server 2012 Dynamic Access Control.If you are an IT consultant/architect, system engineer, system administrator, or security engineers planning to implement Dynamic Access Control in your organization, or have already implemented it and want to discover more about the abilities and how to use them effectively, this book will be an essential resource. You should have some understanding of security solutions, Active Directory, Access Privileges/ Rights and Authentication methods, and a fundamental understanding of Microsoft technologies. Programming knowledge is not required but can be helpful for using PowerShell or the APIs to customize your solution.
Content:
Intro -- Learning Microsoft Windows Server 2012 Dynamic Access Control -- Table of Contents -- Learning Microsoft Windows Server 2012 Dynamic Access Control -- Credits -- About the Author -- About the Reviewers -- www.PacktPub.com -- Support files, eBooks, discount offers and more -- Why Subscribe? -- Free Access for Packt account holders -- Instant Updates on New Packt Books -- Preface -- What this book covers -- What you need for this book -- Who this book is for -- Conventions -- Reader feedback -- Customer support -- Errata -- Piracy -- Questions -- 1. Getting in Touch with Dynamic Access Control -- Business needs, purpose, and benefits -- Inside the architecture of DAC -- Building blocks -- Infrastructure requirements -- User and device claims -- Expression-based access rules -- Classification enhancements -- Central Access and Audit policies -- Access-denied assistance -- Building your smart test lab -- Configuring Dynamic Access Control -- Summary -- 2. Understanding the Claims-based Access Model -- Understanding claims -- Claims support in Windows 8/2012 and newer -- Kerberos authentication enhancements -- Kerberos Armoring and Compound Authentication -- Kerberos Armoring -- Compound Authentication -- Managing Claims and Resource properties -- Naming conventions -- Authoritative system and data validation -- Administrative delegation -- Resource properties -- Using Claim Transformation and Filtering -- Groups or DAC, let's extend our first solution -- Summary -- 3. Classification and the File Classification Infrastructure -- Map the business and security requirements -- Different types and methods for tagging and classifying information -- Manual Classification -- Using the Windows File Classification Infrastructure -- Data Classification Toolkit 2012 -- The Data Classification Toolkit wizard.
Note:
Includes index. - Description based on online resource; title from PDF title page (ebrary, viewed January 20, 2014)
Additional Edition:
9781782178187
Additional Edition:
Erscheint auch als Druck-Ausgabe 9781782178187
Language:
English
Keywords:
Electronic books
URL:
Volltext
(lizenzpflichtig)
Bookmarklink