O'Reilly logo

Mastering Windows Network Forensics and Investigation, 2nd Edition by Scott Pearson, Ryan Johnson, Steve Bunting, Steven Anson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Permissions

So far, we have discussed various ways in which Microsoft networks can be organized. At the highest level, domains and forests provide logical separation of large groupings of computing resources and users. Within a domain, the computers and users can be further categorized into different organizational units for use in assigning different policies to different parts of the network environment. Finally, we discussed groups, which are used to assign specific capabilities to access different network resources to multiple users at a time in order to simplify administrative tasks and provide a logical order to what can be a large network environment.

Now we are going to turn our attention to controlling access to specific resources. Up ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required