IN THIS CHAPTER, YOU WILL LEARN TO:
SECURE THE FOREST
Automate Directory Permissions
Manage BitLocker Settings
Manage BitLocker Recovery Passwords
In today's enterprise environment, security can no longer be treated as an afterthought. Instead, it's foremost on the minds of everyone involved in managing IT infrastructure. There are a number of reasons for this, from regulatory compliance to protection of resources from insider and outsider cyber threats. Regardless ...