TAILIEUCHUNG - Networking: A Beginner’s Guide Fifth Edition- P55

Networking: A Beginner’s Guide Fifth Edition- P55:I have run into many people over the years who have gained good even impressive working knowledge of PCs, operating systems, applications, and common problems and solutions. Many of these people are wizards with desktop computers. | This page intentionally left blank Chapter 17 Administering Windows Server 2008 The Basics 253 254 Networking A Beginner s Guide Installing and setting up Windows Server 2008 is only the tip of the iceberg. Far more important and time-consuming is the process of administering the server. This process includes regular and common duties such as adding new users deleting old users assigning permissions to users performing backups and so forth. These topics are covered in this chapter. Good administration habits will ensure that the network and the server remain productive and secure. Thinking About Network Security Before delving into the administrative activities discussed in this chapter you should spend some time thinking about network security and how it relates to your specific company. Administering a server must be predicated on maintaining appropriate security for your network. The key here is to remember that every network has an appropriate level of security. The security requirements for a Department of Defense DoD contractor that designs military equipment will be different from the security requirements for a company that operates restaurants. Many beginning network administrators think they need to set up their networks to follow the strongest security measures available. The problem with this approach is that these measures almost always reduce the productivity of people using the network. You need to strike a balance between productivity and security in accordance with the needs of your company. For example Windows Server 2008 enables you to set various security policies that apply to users. These include forcing password changes at specified intervals requiring that passwords be a certain minimum length disallowing reuse of old passwords and so on. For example you could set up policies to require passwords that are at least 20 characters long and that must be changed weekly. In theory these settings should be more secure than shorter less-frequently .

TÀI LIỆU MỚI ĐĂNG
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.