Microsoft Windows Server 2003 Administration

Email Alerts

Register now to receive SearchWindowsServer.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Access control tools and techniques

    Learn about some essential access control components and techniques here. 

  • Point-to-Point Tunneling Protocol

    This excerpt from e-book "The tips and tricks guide to securing Windows Server 2003" describes what PPTP is, what it does and issues with the first implementation. 

  • Layer 2 Tunneling Protocol/IPSec

    This excerpt from e-book "The tips and tricks guide to securing Windows Server 2003" describes how the L2TP encapsulation works with a PPP frame and provides two layers of encapsulation. 

  • Add 802.1x technology

    This excerpt from e-book "The tips and tricks guide to securing Windows Server 2003" describes 802.1x, the current draft standard and what it uses to provide authentication. 

  • Standard WAP security options

    This excerpt from e-book "The tips and tricks guide to securing Windows Server 2003" discusses five purported security mechanisms for wireless access points. 

  • Group Policy Q&A -- Guarding wireless access points

    In this excerpt from e-book "The tips and tricks guide to securing Windows Server 2003," Roberta Bragg answers the question, "How can I prevent wireless access points from becoming an unguarded entry point into my network." 

  • Securing wireless communications

    This excerpt from "The tips and tricks guide to securing Windows Server 2003" describes four security implementation opportunities that exist for wireless networking. 

  • Exam Cram Quiz #1 Answer Key

    Check your answers to the 10 Exam Cram prep questions from the MCSE Exam Cram 2 book "Designing security for a Microsoft Windows Server 2003 network." 

  • Designing a permission structure for files and folders

    Learn how to work with shares and NTFS permissions in this excerpt from Chapter 6 of the MCSE Exam Cram 2 book "Designing security for a Microsoft Windows Server 2003 network." 

  • Best practices for implementing IPSec policies

    There are several tricks to configuring IPSec policies effectively, depending on what Windows servers you're using. In the conclusion of his two-part series, Brien Posey outlines IPSec best practices, and offers some additional dos and don'ts for wor...