Chapter 15 Configuring Remote Access

This chapter covers the following subjects:

Image Configuring Remote Authentication: To secure sensitive and valuable organizational resources, it is vital that users connecting from remote locations using the Internet or dial-up connections are positively authenticated. In this section you learn about processes and technologies available for securely authenticating the users requesting access to your network and computers.

Image Configuring Remote Desktop Settings: This section describes new and improved methods of connecting ...

Get MCSA 70-697 and 70-698 Cert Guide: Configuring Windows Devices; Installing and Configuring Windows 10 now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.