O'Reilly logo

MCITP Self-Paced Training Kit (Exam 70-686): Windows® 7 Enterprise Desktop Administrator by Craig Zacker and Orin Thomas

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Configuring Security and Internet Explorer

Organizations are far more likely to suffer loss of data through the carelessness of employees than they are through deliberate attacks by nefarious third parties. With this in mind, you should realize that configuring security is more than just configuring firewall rules to stop dangerous lurkers on the Internet from sneaking inside the perimeter network. Configuring security is about ensuring the integrity of your organization’s data. This effort can include taking steps as simple as ensuring that a hard disk or sensitive file is encrypted. When you take this precaution, you stop unauthorized third parties from recovering data from a lost or stolen portable computer. Configuring security ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required