three key areas for security your environment. First, we will focus on protecting our
internal assets while providing remote capabilities through the use of Remote Access.
Next, we will focus on a new technology known as Network Access Protection,
which uses health policies to determine the health status of a client. Finally, we will
change our focus to auditing and reporting on security-related activities within our
environment. Let’s begin our discussion with Remote Access Security.
Remote Access Security
Remote access solutions have been in demand for a number of years now. Since
public ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.