Learning Microsoft Windows Server 2012 Dynamic Access Control.
This practical tutorial-based book is filled with information about the architecture, functionality, and extensions of Microsoft Windows Server 2012 Dynamic Access Control. If you are an IT consultant/architect, system engineer, system administrator, or security engineers planning to implement Dynam...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham :
Packt Publishing,
2013.
|
Colección: | Professional expertise distilled
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting in Touch with Dynamic Access Control; Business needs, purpose, and benefits; Inside the architecture of DAC; Building blocks; Infrastructure requirements; User and device claims; Expression-based access rules; Classification enhancements; Central Access and Audit policies; Access-denied assistance; Building your smart test lab; Dynamic Access Control configuration; Summary; Chapter 2: Understanding the Claims-based Access Model; Understanding claims
- Claims support in Windows 8/2012 and newerKerberos authentication enhancements; Kerberos Armoring and Compound Authentication; Kerberos Armoring; Compound Authentication; Manage Claims and Resource properties; Naming conventions; Authoritative system and data validation; Administrative delegation; Resource properties; Usage of Claim Transformation and Filtering; Groups or DAC, let's extend our first solution; Summary; Chapter 3: Classification and the File Classification Infrastructure; Map the business and security requirements
- Different types and methods for tagging and classifying informationManual Classification; Using the Windows File Classification Infrastructure; Data Classification Toolkit 2012; The Data Classification Toolkit wizard; The Data Classification Toolkit Claims wizard; Designing and configuring classifications; Summary; Chapter 4: Access Control in Action; Defining expression-based Access policies; Deploying Central Access Policies; Protecting legal department information with Central Access Policies; Identifying a Group Policy and registry settings; Configuring FCI and Central Access Policies
- Building a staging environment using proposed permissionsApplying Central Access Policies; Access Denied Remediation; Understanding the ADR process; ADR
- a step-by-step guide; Summary; Chapter 5: Auditing a DAC Solution; Auditing with conditional expressions; Claims-based Global Object Access Auditing; Monitoring your Dynamic Access Control scenarios; Configure an effective auditing solution; Policy considerations; Extending the solution with System Center; Summary; Chapter 6: Integrate Rights Management Protection; Windows 2012 AD RMS; Installing Rights Management Services
- Rights Protected FolderClassification-based encryption; Protect your information with a combination; Rights management template; Encryption rule; Information access; Build the RPF example in your environment; File retention; AD RMS in a SAP environment; Summary; Chapter 7: Extending the DAC Base Solution; Keeping Active Directory attributes up-to-date; Third-party tools for Dynamic Access Control; Classification; Central Access Policy; RMS Protection; Auditing; Using DAC in SharePoint; BYOD
- using Dynamic Access Control; Summary; Chapter 8: Automating the Solution