1 Module 1: Introduction to Designing Security Table of Contents Module Overview 1-1 Lesson 1: Overview of Designing Security for Microsoft Networks 1-2 Lesson 2: Introducing Contoso Pharmaceuticals: A Case Study 1-11
2 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, address, logo, person, place, or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. The names of manufacturers, products, or URLs are provided for informational purposes only and Microsoft makes no representations and warranties, either expressed, implied, or statutory, regarding these manufacturers or the use of the products with any Microsoft technologies. The inclusion of a manufacturer or product does not imply endorsement of Microsoft of the manufacturer or product. Links are provided to third party sites. Such sites are not under the control of Microsoft and Microsoft is not responsible for the contents of any linked site or any link contained in a linked site, or any changes or updates to such sites. Microsoft is not responsible for webcasting or any other form of transmission received from any linked site. Microsoft is providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement of Microsoft of the site or the products contained therein. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property Microsoft Corporation. All rights reserved. Microsoft, Active Directory, ActiveX, BitLocker, BizTalk, Brute Force, Internet Explorer, MS-DOS, Outlook, PowerPoint, SQL Server, Visual Studio, Windows, Windows Live, Windows Mobile, Windows NT, Windows Server and Windows Vista are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Version 1.2
3 Module 1: Introduction to Designing Security 1-1 Module Overview A security design is a comprehensive plan that guides the implementation of security policies and procedures for an organization. A security design helps an organization to organize its assets to implement security in a consistent and effective manner. This module describes the basic framework for designing network security and introduces key concepts used throughout the course. It also introduces a fictional organization, Contoso Pharmaceuticals, which the labs in the course use as an ongoing case study. You will become familiar with the network security issues that confront Contoso Pharmaceuticals. Objectives After completing this module, you will be able to: Provide an overview of designing security for Microsoft networks. Describe the components of the case study for this course.
4 1-2 Module 1: Introduction to Designing Security Lesson 1: Overview of Designing Security for Microsoft Networks Many organizations underestimate the value of their information technology (IT) environment, often because they exclude substantial indirect costs. If there is a severe attack on the servers in the IT environment, it could significantly damage the entire organization. For example, an attack in which your organization s Web site is brought down could cause a major loss of revenue or customer confidence, which could affect your organization s profitability. An effective security design helps an organization to protect its assets. Objectives After completing this lesson, you will be able to: Explain why organizations invest in network security. Describe the key principles of security. Explain the relationship between security design and security implementation. Describe the elements of a Microsoft network that should be secured. Describe the general organization of information in this course.
5 Module 1: Introduction to Designing Security 1-3 Why Invest in Network Security? Organizations invest in network security to protect their assets from threats. Assets on a computer network can include such items as messages, intellectual property like trade secrets or source code, customer databases, and e-commerce transactions. A threat is a danger or vulnerability to an asset. Threats to assets include attackers trying to steal information, software applications that lack the latest security updates, and natural disasters such as fires or floods. Every organization has its own unique mix of clients, servers, and user requirements that make planning a comprehensive, secure environment a major challenge. Without a consistent approach to risk management, some areas of the network may benefit from extremely rigorous security while others are only minimally secured. Risk Management A security design uses the concept of risk management to determine appropriate security responses to threats. Risk management is a careful study of criteria, for example, the likelihood of a threat occurring, the impact of the threat, the value of an asset to your organization, and the cost of a security solution. After you perform risk management, you can decide on an appropriate response to a threat. Data collected during risk management is also useful to present to upper management and key stakeholders to persuade them of the importance of network security and its value to your organization.
6 1-4 Module 1: Introduction to Designing Security What Are the Key Principles of Security? Security planning is based on two principles: Users must have access to resources. This access can be very basic, including only desktop logon and the availability of access control lists (ACLs) on resources. This access can also include optional services such as remote network logons, wireless network access, and access for external users such as business partners or customers. The network requires a secure, shared IT infrastructure. This infrastructure includes comprehensive physical security, effective security boundaries, secure servers and services, secure networking, and an effective plan for delegating administration. Defense in Depth Defense in depth refers to a combination of people, operations, and security technologies. Defense in depth provides multiple layers of protection to a network by defending against threats at multiple points in the network. A single layer is often ineffective against multiple attacks. By using defense in depth, if an attack breaks through one point of defense, other defenses provide additional protection to the asset. Least Privilege Least privilege refers to granting a user, resource, or application the least amount of privilege or permissions necessary to perform the required task. Practices such as using default or full-control permissions on resources, or giving administrator rights to user accounts, simplify administration to a dangerous degree. Granting excessive permissions can introduce numerous vulnerabilities that attackers can easily exploit. Minimized Attack Surface The concept of an attack surface refers to points of entry that an attacker can exploit to penetrate the network. A network that has a minimum of exposed areas or points that are
7 Module 1: Introduction to Designing Security 1-5 vulnerable to attack has a minimized attack surface. A network that has several unprotected connections to the Internet has a larger attack surface than a small, isolated network that has a single, secured connection to a branch office.
8 1-6 Module 1: Introduction to Designing Security The Relationship Between Security Design and Implementation As a designer of network security, you must understand the difference between security design and security implementation, which are related but different processes. Security Design Security design ensures that an organization has a logical and carefully planned strategy for securing its assets. For example, not all assets are of equal value. In some cases, the cost of protecting an asset may exceed the value of the asset. Security design balances these and other considerations to ensure that security is applied throughout the organization in a controlled and logical manner. Security design can be a difficult endeavor, particularly in large networks that have distributed administration or various, disconnected interests. Ensure that you include representatives from various departments of your organization in your design. The goal of security design is to create security policies and procedures. Security Implementation Security implementation applies the policies and procedures that you created during the design and ensures that they are deployed consistently throughout the organization. For example, security implementation ensures that individual computers receive the appropriate security templates and that computers are correctly configured to achieve the level of security that a specific security policy requires.
9 Module 1: Introduction to Designing Security 1-7 Typical Elements That Require Security in Microsoft Networks There are many forms of assets that require protection, and they can be located in many places on a network. When you design security for a network, ensure that you create policies and procedures to protect each area of your network from the threats and vulnerabilities that can occur in that area. Elements in a Microsoft Network Element Physical security Computers Accounts Authentication Data Data transmission Considerations Poorly secured buildings. Data links. Theft of hardware. Attacks during initial installation. Incorrectly configured baseline security. Incorrect privileges. Misuse of administrator accounts. Weak passwords. Interception of passwords. Incompatibility with software. Weak encryption. Configuration of permissions. Failure of hardware. Corruption of data. Attackers monitoring network. Address spoofing. Data modification. Denial of service.
10 1-8 Module 1: Introduction to Designing Security Element Network perimeters Considerations Exposure of network information. Lack of control over infrastructure. Exposure of computers to attack.
11 Module 1: Introduction to Designing Security 1-9 Designing Security The modules in this course present the process for designing security in several phases. Process for Designing Security 1. Create a security design team. Ensure that your design is the product of various perspectives so that all vulnerabilities and threats may be discovered. A design team also helps to ensure representation of a cross-section of employees in the design and can help to ensure compliance with the policies and procedures that the team designs. 2. Perform threat modeling. This predicts threats to a given asset or resource. Knowing the threats that affect an asset helps you to design countermeasures to protect the asset. 3. Perform risk management. This analyzes the likelihood of a threat occurring and the potential damage that a threat may cause. Risk management is a valuable tool that can help you to convince management that security measures are necessary to adequately defend a resource against a threat. 4. Design security measures for your network elements. Use the knowledge and skills from your threat modeling and risk management phases and apply them to the following elements of a Microsoft network: physical security, hosts, accounts and services, authorization, data, data transmission, and network perimeters. Identify common vulnerabilities to assets in each area and create security policies that protect each area. 5. Detect and react. Identify ways to detect intrusions and respond to security incidents in a controlled manner. Early detection of an attack is vital to limiting the damage that the attack may cause. Careful and thoughtful response can make recovery easier and can also prevent mistakes that may make the situation worse.
12 1-10 Module 1: Introduction to Designing Security 6. Manage and review network security on a continual basis. Create, implement, and review policies for acceptable use, network management, and the secure operation of a network.
13 Module 1: Introduction to Designing Security 1-11 Lesson 2: Introducing Contoso Pharmaceuticals: A Case Study This course presents a case study of a fictional company, Contoso Pharmaceuticals. The labs in each module focus on the challenges facing Contoso Pharmaceuticals and its efforts to design security for its network. Objectives After completing this lesson, you will be able to: Describe Contoso Pharmaceuticals. Describe the consultant role in Contoso Pharmaceuticals. Identify key personnel at Contoso Pharmaceuticals. Identify key features of the course labs.
14 1-12 Module 1: Introduction to Designing Security Introduction to Contoso Pharmaceuticals Contoso Pharmaceuticals produces prescription drugs for a worldwide market. Despite becoming a large company over the years through numerous mergers and acquisitions, the organization has never been able to implement a standardized network design. As a result, Contoso Pharmaceuticals has inconsistent and in some places nonexistent security on its network. As part of reforming its IT department, Contoso Pharmaceuticals has hired a new chief information officer (CIO) to direct security efforts for the company s network. The CIO has hired you as a consultant to design security for Contoso Pharmaceuticals.
15 Module 1: Introduction to Designing Security 1-13 The IT Security Consultant Role You have been hired as an IT Security Consultant for Contoso Pharmaceuticals. Contoso Pharmaceuticals has: A headquarters in Chicago, Illinois. All company executives and management live and work in the Chicago area, although they frequently travel to other Contoso Pharmaceuticals locations, business partners, and clients. There are 7,028 employees at the Contoso Pharmaceuticals headquarters. Two main research and development facilities that work together closely with several local universities and colleges. All pharmaceuticals research and development is in San Francisco, California. All biotechnology research and development is in Geneva, Switzerland. There are 1,100 employees in San Francisco and 430 in Geneva. Several large regional offices that cooperate with national and international regulatory agencies on the approval and distribution of its products. Approximately 700 employees work at each regional office. The regional offices are located in: New York, USA London, United Kingdom Paris, France Oslo, Norway Brussels, Belgium Toronto, Canada
16 1-14 Module 1: Introduction to Designing Security Key Personnel at Contoso Pharmaceuticals During the labs in this course you will interview appropriate Contoso Pharmaceuticals employees. The security issues that employees discuss pertain to the labs. The employees perform various roles and have varying interests. They represent just a few of the roles that security designers work with to create a security design for an organization. You will hear from the following employees: Garth Fort. As the chief executive officer (CEO) of Contoso Pharmaceuticals, Garth often provides business motivations for decisions. Ellen Adams. As the new CIO, Ellen has hired you to assist in designing security for Contoso Pharmaceuticals. In each lab, you will obtain your instructions from Ellen. Thomas Hamborg. Thomas is the chief financial officer (CFO). He provides business information for design decisions that you must make. John Y. Chen. John is one of the IT administrators for Contoso Pharmaceuticals. He offers technical details about the security of the network. Susan Burk. Susan is vice president (VP) of the research and development department and an executive stakeholder. Michiko Osada. Michiko is a business analyst and represents the end user in the organization.
17 Module 1: Introduction to Designing Security 1-15 Introduction to the Lab Environment Each lab contains some of the following elements: Interviews. Company officials describe the scenario and problems with network security at Contoso Pharmaceuticals. s. Messages contain detailed information for each lab scenario. The s that you receive from Ellen contain the goals. Intranet. Background information about the company, such as an organizational chart and company history. Network files. A file server that contains folders that include relevant documents that you may require to complete a lab.
Lab Answer Key for Module 6: Configuring and Managing Windows SharePoint Services 3.0 Table of Contents Lab 1: Configuring and Managing WSS 3.0 1 Information in this document, including URL and other Internet
Lab Answer Key for Module 9: Active Directory Domain Services Table of Contents Lab 1: Exploring Active Directory Domain Services 1 Information in this document, including URL and other Internet Web site
Lab Answer Key for Module 11: Managing Transactions and Locks Table of Contents Lab 11: Managing Transactions and Locks 1 Exercise 1: Using Transactions 1 Exercise 2: Managing Locks 3 Information in this
Module 10: Designing Security for Data Transmission Table of Contents Module Overview 10-1 Lesson 1: Creating a Security Plan for Data Transmission 10-2 Lesson 2: Creating a Design for Security of Data
Lab Answer Key for Module 1: Installing and Configuring Windows Server 2008 Table of Contents Lab 1: Configuring Windows Server 2008 1 Information in this document, including URL and other Internet Web
Windows BitLocker Drive Encryption Step-by-Step Guide Microsoft Corporation Published: September 2006 Abstract Microsoft Windows BitLocker Drive Encryption is a new hardware-enhanced feature in the Microsoft
The 2007 R2 Version of Microsoft Office Communicator Mobile for Windows Mobile: Frequently Asked Questions Published: December 2008 Information in this document, including URL and other Internet Web site
How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,
BizTalk Server 2006 Business Activity Monitoring Microsoft Corporation Published: April 2005 Abstract This paper provides a detailed description of two new Business Activity Monitoring (BAM) features in
Sales Target Tracking 05 Pipelinersales Inc. www.pipelinersales.com Sales Target Tracking Learn how to set up Sales Target with Pipeliner Sales CRM Application. CONTENT. Setting up Sales Dynamic Target
Administration & Setup 05 Pipelinersales Inc. www.pipelinersales.com Administration & Setup Learn how to manage your sales team with Pipeliner Sales CRM Application. CONTENT. Managing Pipeliner s Users
Overview of Microsoft Office 365 Development Office 365 Hands-on lab In this lab, you will work with existing Office 365 apps. This document is provided for informational purposes only and Microsoft makes
Improving Performance of Microsoft CRM 3.0 by Using a Dedicated Report Server January 2006 Downloaded from http://www.sonomapartners.com/ - 1 - Information in this document, including URL and other Internet
2007 Microsoft Office System Document Encryption June 2007 Table of Contents Introduction 1 Benefits of Document Encryption 2 Microsoft 2007 Office system Document Encryption Improvements 5 End-User Microsoft
Update and Installation Guide for Microsoft Management Reporter 2.0 Feature Pack 1 Microsoft Corporation Published: December 2010 Microsoft Dynamics is a line of integrated, adaptable business management
Creating and Deploying Active Directory Rights Management Services Templates Step-by-Step Guide Microsoft Corporation Published: January 2008 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step
MBAM Self-Help Portals Authoring a self-help portal workflow for BitLocker Recovery Using Microsoft BitLocker Administration and Monitoring (MBAM) Technical White Paper Published: September 2011 Priyaa
Redeploying Microsoft CRM 3.0 2005 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies,
Information Security Policy Steve R. Hutchens, CISSP EDS, Global Leader, Homeland Security Agenda Security Architecture Threats and Vulnerabilities Design Considerations Information Security Policy Current
Microsoft Dynamics Connector for Microsoft Dynamics Configuration Guide for Microsoft Dynamics SL Revised August, 2012 Find updates to this documentation at the following location: http://www.microsoft.com/download/en/details.aspx?id=10381
Microsoft Lync Server 2010 Scale to a Load Balanced Enterprise Edition Pool with WebMux Walkthrough Published: March. 2012 For the most up to date version of the Scale to a Load Balanced Enterprise Edition
AD RMS Step-by-Step Guide Microsoft Corporation Published: March 2008 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide provides instructions for setting up a test environment to
Module 8: Implementing Group Policy Contents Overview 1 Lesson: Implementing Group Policy Objects 2 Lesson: Implementing GPOs in a Domain 12 Lesson: Managing the Deployment of Group Policy 21 Lab: Implementing
Multiple Formatter Support for the Logging Application Block Scott Densmore, Naveen Yajaman, Paul Slater, and Andrew Mason Information in this document, including URL and other Internet Web site references,
MICROSOFT DYNAMICS CRM Roadmap Release Preview Guide Q4 2011 Service Update Updated: August, 2011 EXECUTIVE SUMMARY Microsoft has delivered significant innovation and value in customer relationship management
Technical Brief for Windows Home Server Remote Access Microsoft Corporation Published: October, 2008 Version: 1.1 Abstract This Technical Brief provides an in-depth look at the features and functionality
Microsoft Solutions for Security Delivering the Windows Server 2003 Security Guide Information in this document, including URL and other Internet Web site references, is subject to change without notice.
APPLICATION NOTE Using Apple Remote Desktop to Deploy Centrify DirectControl Published: June 2007 Abstract Apple Remote Desktop is commonly used by administrators to perform various administrative management
Introduction to Hyper-V High- Availability with Failover Clustering Lab Guide This lab is for anyone who wants to learn about Windows Server 2012 R2 Failover Clustering, focusing on configuration for Hyper-V
Contents Module 11: Planning and Implementing an Active Directory Infrastructure Overview 1 Lesson: Creating an Active Directory Implementation Plan for Tailspin Toys 2 Lab A: Creating the Active Directory
Windows Scheduled Tasks Management Pack Guide for System Center Operations Manager Published: 07 March 2013 Copyright Information in this document, including URL and other Internet Web site references,
Microsoft Dynamics AX 2009 Installation Guide Microsoft Corporation Published: November 2009 Microsoft Dynamics is a line of integrated, adaptable business management solutions that enables you and your
Windows Server Update Services 3.0 SP2 Step By Step Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide provides detailed instructions for installing Windows Server
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
Microsoft Dynamics Microsoft Dynamics CRM Adapter for Microsoft Dynamics GP May 2010 Find updates to this documentation at the following location. http://go.microsoft.com/fwlink/?linkid=162558&clcid=0x409
Microsoft Dynamics GP Deploying the Workspace Application for Microsoft SharePoint Online Microsoft Dynamics GP Workspace is a method to enable Microsoft Excel-based dashboards for SharePoint Online. This
Key Data Product ID#: 2676 Course #: 5053A Number of Days: 3 Format: Instructor-Led Certification Exams: This course helps you prepare for the following Microsoft Certified Professional exam: 70-237: Pro:
Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide Microsoft Corporation Published: October 2006 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide
Overview of Active Directory Rights Management Services with Windows Server 2008 R2 Student Manual Module 5: Information Rights Management on Server Applications Information in this document, including
Hands-on Lab Windows Server 2012 R2 Remote Apps Publishing within the enterprise and beyond Powered by Remote Desktop Services (RDS) in Windows Server 2012 R2, Microsoft RemoteApps allows users to seamlessly
Operating System File and Printer Sharing with Microsoft Windows Microsoft Corporation Published: November 2003 Abstract File and printer sharing in Microsoft Windows allows you to share the contents of
Installation and Configuration Guide Installation and configuration guide Adding X-Forwarded-For support to Forward and Reverse Proxy TMG Servers Published: May 2010 Applies to: Winfrasoft X-Forwarded-For
Security and Compliance Robert Nottoli Principal Technology Specialist Microsoft Corporation firstname.lastname@example.org DISCLAIMER FOR DOCUMENTATION REGARDING PRE-RELEASED SOFTWARE This document supports a
Integrating Business Portal 3.0 with Microsoft Office SharePoint Portal Server 2003: A Natural Fit Published: December 2005 For the latest information, please see http://mbs.microsoft.com/public/gponline
Module 3: Implementing an Organizational Unit Structure Contents Overview 1 Lesson: Creating and Managing Organizational Units 2 Lesson: Delegating Administrative Control of Organizational Units 13 Lesson
Implementing Business Portal in an Extranet Environment Published: December 2005 Table of contents Introduction...1 What is extranet access?...1 Why deploy Business Portal in an extranet?...1 Order Management...1
Windows Small Business Server 2003 Upgrade Best Practices Microsoft Corporation Published: May 2005 Version: 1 Abstract To ensure a successful upgrade from the Microsoft Windows Small Business Server 2003
Overview of Active Directory Rights Management Services with Windows Server 2008 R2 Student Manual Module 3: Active Directory Rights Management Clients and Information Rights Management on Desktop Applications
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
APPLICATION NOTE Managing UNIX Generic and Service Accounts with Active Directory Published: June 2007 Abstract Generic accounts are commonly used to enable UNIX administrative staff to log on to a computer
IMPLEMENTATION GUIDE Expanded Frequency Capping Ad Management at its best! August 2007 For more information, please contact email@example.com Disclaimer This Implementation Guide is for informational purposes
MICROSOFT DYNAMICS CRM Vision Statement of Direction November 2012 NOTE: The guidance included in this document reflects current release objectives as of November 2012. This document is not intended to
System Requirements for Microsoft Dynamics NAV 2013 R2 February 2014 Contents 3 System Requirements for the Microsoft Dynamics NAV Windows Client 3 Web Client 4 System Requirements for Microsoft Dynamics
Windows Firewall with Advanced Security Design Guide and Deployment Guide Microsoft Corporation Published: October 2008 Author: Dave Bishop Editor: Allyson Adley Reviewers: Bilal Aijazi, Boyd Benson, Shalaka
UPGRADE Microsoft Dynamics Entrepreneur Solution Upgrading Microsoft Dynamics Entrepreneur to Microsoft Dynamics NAV White Paper June 2008 The information contained in this document represents the current
Page 1 of 11 Office Language Interface Pack for Farsi (Persian) Abstract Microsoft Office Language Interface Pack (LIP) is a high-quality, localized skin for emerging and minority language markets. LIP
Windows Azure Pack Installation and Initial Configuration Windows Server 2012 R2 Hands-on lab In this lab, you will learn how to install and configure the components of the Windows Azure Pack. To complete
Microsoft Office Communicator 2007 Getting Started Guide Published: July 2007 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless
Product Development Using Critical Path EVM for the Microsoft Project Desktop Application Readme Published: June 2009 Table of Contents Introduction... 1 System Requirements... 1 Installing the Critical
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
Introduction to Network Access Protection Microsoft Corporation Published: June 2004, Updated: May 2006 Abstract Network Access Protection, a platform for Microsoft Windows Server "Longhorn" (now in beta
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
Installation and Configuration Guide Installation and configuration guide Adding X-Username support to Forward and Reverse Proxy TMG Servers Published: December 2010 Applies to: Winfrasoft X-Username for
Microsoft Security Intelligence Report volume 7 (January through June 2009) Key Findings Summary Volume 7 of the Microsoft Security Intelligence Report provides an in-depth perspective on malicious and
2824B: Implementing Microsoft Internet Security and Acceleration Server 2004 Microsoft Virtual PC Classroom Setup Guide Information in this document, including URL and other Internet Web site references,
SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure
The Microsoft Dynamics AX 2009 Security Hardening Guide Microsoft Corporation Published: May 2008 Microsoft Dynamics is a line of integrated, adaptable business management solutions that enables you and
ADMT v3 Migration Guide Microsoft Corporation Published: November 2006 Abstract This guide explains how to use the Active Directory Migration Tool version 3 (ADMT v3) to restructure your operating environment.
Microsoft Dynamics AX Workflow approval via email White Paper This document highlights the functionality in Microsoft Dynamics AX 2012 R2 that allows workflow to be configured so that a user can take approval
Introduction to Cloud-Based Mobile Device Management with Intune Information in this document, including URLs and other Internet Web site references, is subject to change without notice. Unless otherwise
INDUSTRY Finance COMPANY PROFILE Major Financial Institution. BUSINESS SITUATION Internal security audits found that VMware ESX, Red Hat Linux, and Solaris systems lacked an efficient way to control access
Microsoft Dynamics NAV Requirements for Microsoft Dynamics NAV 2013 System Requirements for Microsoft Dynamics NAV 2013... 1 System Requirements for the Microsoft Dynamics NAV Windows Client... 1 System
Credit Card Extension White Paper March 2010 Copyright Copyright 2004 Azox, Inc.. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the
Reference Architecture: Enterprise Security For The Cloud A Rackspace Whitepaper Reference Architecture: Enterprise Security for the Cloud Cover Table of Contents 1. Introduction 2 2. Network and application
Active Directory Provider User s Guide Mike Horton Version 01.00.03 Last Updated: December 28, 2007 Category: DotNetNuke v4.6.0 and greater Information in this document, including URL and other Internet
Operating System Troubleshooting File and Printer Sharing in Microsoft Windows XP Microsoft Corporation Published: November 2003 Updated: August 2004 Abstract File and printer sharing for Microsoft Windows
Four Best Practices for Passing Privileged Account Audits October 2014 1 Table of Contents... 4 1. Discover All Privileged Accounts in Your Environment... 4 2. Remove Privileged Access / Implement Least
Getting started with Microsoft SharePoint Server 2010 Microsoft Corporation Published: May 2010 Author: Microsoft Office System and Servers Team (firstname.lastname@example.org) Abstract This book provides basic
Microsoft Corporation Status: Preliminary documentation Beta content: This guide is currently in beta form. The AppLocker team greatly appreciates you reviewing the document and looks forward to receiving
Exclaimer Email Alias Manager for Exchange Deployment Guide - Exclaimer Email Alias Manager for Exchange Outlook Add-In www.exclaimer.com Contents About This Guide...3 System Requirements...4 Software...4