14. Configuring Remote Management and Remote Connections
This chapter covers the following subjects:
• Configuring Remote Authentication: To secure sensitive and valuable organizational resources, you must ensure that users connecting from remote locations using the Internet or dial-up connections are positively authenticated. In this section, you learn about processes and technologies available for securely authenticating the users requesting access to your network and computers.
• Configuring Remote Desktop and Remote Management Settings: This section describes new and improved methods of connecting to and managing computers remotely. You learn about time-saving management options that enable you to perform a large range of management tasks ...