Learning Microsoft Windows Server 2012 Dynamic Access Control.:
This practical tutorial-based book is filled with information about the architecture, functionality, and extensions of Microsoft Windows Server 2012 Dynamic Access Control. If you are an IT consultant/architect, system engineer, system administrator, or security engineers planning to implement Dynam...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Publishing,
2013.
|
Schriftenreihe: | Professional expertise distilled
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | This practical tutorial-based book is filled with information about the architecture, functionality, and extensions of Microsoft Windows Server 2012 Dynamic Access Control. If you are an IT consultant/architect, system engineer, system administrator, or security engineers planning to implement Dynamic Access Control in your organization, or have already implemented it and want to discover more about the abilities and how to use them effectively, this book will be an essential resource. You should have some understanding of security solutions, Active Directory, Access Privileges/ Rights and Auth. |
Beschreibung: | 1 online resource |
ISBN: | 1306280249 9781306280242 9781782178194 1782178198 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn867820956 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 140110s2013 enka o 001 0 eng d | ||
040 | |a IDEBK |b eng |e pn |c IDEBK |d EBLCP |d E7B |d MHW |d OCLCQ |d VT2 |d OCLCO |d DEBSZ |d CHVBK |d OCLCQ |d COO |d OCLCF |d OCLCQ |d FEM |d COCUF |d CNNOR |d MOR |d CCO |d PIFAG |d N$T |d OCLCO |d ZCU |d AGLDB |d MERUC |d OCLCQ |d OCLCO |d U3W |d D6H |d OCL |d STF |d VTS |d NRAMU |d ICG |d NLE |d INT |d OCLCA |d UKMGB |d OCLCQ |d OCLCO |d WYU |d G3B |d TKN |d OCLCQ |d OCLCO |d DKC |d OCLCQ |d UKAHL |d HS0 |d OCLCQ |d AJS |d OCLCO |d QGK |d OCLCQ |d OCLCO |d OCLCL |d UEJ |d OCLCQ |d HOPLA | ||
016 | 7 | |a 018006394 |2 Uk | |
019 | |a 961591469 |a 962708033 |a 968055760 |a 969046716 |a 1259078965 | ||
020 | |a 1306280249 |q (electronic bk.) | ||
020 | |a 9781306280242 |q (electronic bk.) | ||
020 | |a 9781782178194 |q (electronic bk.) | ||
020 | |a 1782178198 |q (electronic bk.) | ||
020 | |z 9781782178187 | ||
020 | |z 178217818X | ||
035 | |a (OCoLC)867820956 |z (OCoLC)961591469 |z (OCoLC)962708033 |z (OCoLC)968055760 |z (OCoLC)969046716 |z (OCoLC)1259078965 | ||
037 | |a 559275 |b MIL | ||
050 | 4 | |a QA76.9.C55 |b .N53 2013eb | |
050 | 4 | |a QA76.774.M55 | |
072 | 7 | |a COM |x 046050 |2 bisacsh | |
082 | 7 | |a 005.4476 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Nickel, Jochen. | |
245 | 1 | 0 | |a Learning Microsoft Windows Server 2012 Dynamic Access Control. |
260 | |a Birmingham : |b Packt Publishing, |c 2013. | ||
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
490 | 0 | |a Professional expertise distilled | |
520 | |a This practical tutorial-based book is filled with information about the architecture, functionality, and extensions of Microsoft Windows Server 2012 Dynamic Access Control. If you are an IT consultant/architect, system engineer, system administrator, or security engineers planning to implement Dynamic Access Control in your organization, or have already implemented it and want to discover more about the abilities and how to use them effectively, this book will be an essential resource. You should have some understanding of security solutions, Active Directory, Access Privileges/ Rights and Auth. | ||
588 | 0 | |a Online resource; title from PDF title page (EBSCO, viewed July 8, 2017). | |
505 | 0 | |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting in Touch with Dynamic Access Control; Business needs, purpose, and benefits; Inside the architecture of DAC; Building blocks; Infrastructure requirements; User and device claims; Expression-based access rules; Classification enhancements; Central Access and Audit policies; Access-denied assistance; Building your smart test lab; Dynamic Access Control configuration; Summary; Chapter 2: Understanding the Claims-based Access Model; Understanding claims | |
505 | 8 | |a Claims support in Windows 8/2012 and newerKerberos authentication enhancements; Kerberos Armoring and Compound Authentication; Kerberos Armoring; Compound Authentication; Manage Claims and Resource properties; Naming conventions; Authoritative system and data validation; Administrative delegation; Resource properties; Usage of Claim Transformation and Filtering; Groups or DAC, let's extend our first solution; Summary; Chapter 3: Classification and the File Classification Infrastructure; Map the business and security requirements | |
505 | 8 | |a Different types and methods for tagging and classifying informationManual Classification; Using the Windows File Classification Infrastructure; Data Classification Toolkit 2012; The Data Classification Toolkit wizard; The Data Classification Toolkit Claims wizard; Designing and configuring classifications; Summary; Chapter 4: Access Control in Action; Defining expression-based Access policies; Deploying Central Access Policies; Protecting legal department information with Central Access Policies; Identifying a Group Policy and registry settings; Configuring FCI and Central Access Policies | |
505 | 8 | |a Building a staging environment using proposed permissionsApplying Central Access Policies; Access Denied Remediation; Understanding the ADR process; ADR -- a step-by-step guide; Summary; Chapter 5: Auditing a DAC Solution; Auditing with conditional expressions; Claims-based Global Object Access Auditing; Monitoring your Dynamic Access Control scenarios; Configure an effective auditing solution; Policy considerations; Extending the solution with System Center; Summary; Chapter 6: Integrate Rights Management Protection; Windows 2012 AD RMS; Installing Rights Management Services | |
505 | 8 | |a Rights Protected FolderClassification-based encryption; Protect your information with a combination; Rights management template; Encryption rule; Information access; Build the RPF example in your environment; File retention; AD RMS in a SAP environment; Summary; Chapter 7: Extending the DAC Base Solution; Keeping Active Directory attributes up-to-date; Third-party tools for Dynamic Access Control; Classification; Central Access Policy; RMS Protection; Auditing; Using DAC in SharePoint; BYOD -- using Dynamic Access Control; Summary; Chapter 8: Automating the Solution | |
546 | |a English. | ||
630 | 0 | 0 | |a Microsoft Windows server |x Access control. |
630 | 0 | 0 | |a Microsoft Windows server |x Security measures. |
630 | 0 | 0 | |a Microsoft Windows (Computer file) |
630 | 0 | 7 | |a Microsoft Windows (Computer file) |2 fast |
630 | 0 | 7 | |a Microsoft Windows server |2 fast |
650 | 0 | |a Client/server computing |x Access control. | |
650 | 0 | |a Client/server computing. |0 http://id.loc.gov/authorities/subjects/sh93000502 | |
650 | 6 | |a Architecture client-serveur (Informatique) |x Accès |x Contrôle. | |
650 | 6 | |a Architecture client-serveur (Informatique) | |
650 | 7 | |a COMPUTERS |x Operating Systems |x Windows Server. |2 bisacsh | |
650 | 7 | |a Client/server computing |2 fast | |
650 | 7 | |a Security systems |2 fast | |
758 | |i has work: |a Learning Microsoft Windows Server 2012 Dynamic Access Control (Text) |1 https://id.oclc.org/worldcat/entity/E39PCYYfrpvQVc4rPQJHBH3D4m |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |z 9781306280242 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=680710 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a hoopla Digital |b HOPL |n MWT16863710 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH26849746 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL1593860 | ||
938 | |a ebrary |b EBRY |n ebr10825558 | ||
938 | |a EBSCOhost |b EBSC |n 680710 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis27260898 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn867820956 |
---|---|
_version_ | 1816882255853780993 |
adam_text | |
any_adam_object | |
author | Nickel, Jochen |
author_facet | Nickel, Jochen |
author_role | |
author_sort | Nickel, Jochen |
author_variant | j n jn |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.C55 .N53 2013eb QA76.774.M55 |
callnumber-search | QA76.9.C55 .N53 2013eb QA76.774.M55 |
callnumber-sort | QA 276.9 C55 N53 42013EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting in Touch with Dynamic Access Control; Business needs, purpose, and benefits; Inside the architecture of DAC; Building blocks; Infrastructure requirements; User and device claims; Expression-based access rules; Classification enhancements; Central Access and Audit policies; Access-denied assistance; Building your smart test lab; Dynamic Access Control configuration; Summary; Chapter 2: Understanding the Claims-based Access Model; Understanding claims Claims support in Windows 8/2012 and newerKerberos authentication enhancements; Kerberos Armoring and Compound Authentication; Kerberos Armoring; Compound Authentication; Manage Claims and Resource properties; Naming conventions; Authoritative system and data validation; Administrative delegation; Resource properties; Usage of Claim Transformation and Filtering; Groups or DAC, let's extend our first solution; Summary; Chapter 3: Classification and the File Classification Infrastructure; Map the business and security requirements Different types and methods for tagging and classifying informationManual Classification; Using the Windows File Classification Infrastructure; Data Classification Toolkit 2012; The Data Classification Toolkit wizard; The Data Classification Toolkit Claims wizard; Designing and configuring classifications; Summary; Chapter 4: Access Control in Action; Defining expression-based Access policies; Deploying Central Access Policies; Protecting legal department information with Central Access Policies; Identifying a Group Policy and registry settings; Configuring FCI and Central Access Policies Building a staging environment using proposed permissionsApplying Central Access Policies; Access Denied Remediation; Understanding the ADR process; ADR -- a step-by-step guide; Summary; Chapter 5: Auditing a DAC Solution; Auditing with conditional expressions; Claims-based Global Object Access Auditing; Monitoring your Dynamic Access Control scenarios; Configure an effective auditing solution; Policy considerations; Extending the solution with System Center; Summary; Chapter 6: Integrate Rights Management Protection; Windows 2012 AD RMS; Installing Rights Management Services Rights Protected FolderClassification-based encryption; Protect your information with a combination; Rights management template; Encryption rule; Information access; Build the RPF example in your environment; File retention; AD RMS in a SAP environment; Summary; Chapter 7: Extending the DAC Base Solution; Keeping Active Directory attributes up-to-date; Third-party tools for Dynamic Access Control; Classification; Central Access Policy; RMS Protection; Auditing; Using DAC in SharePoint; BYOD -- using Dynamic Access Control; Summary; Chapter 8: Automating the Solution |
ctrlnum | (OCoLC)867820956 |
dewey-full | 005.4476 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.4476 |
dewey-search | 005.4476 |
dewey-sort | 15.4476 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06786cam a2200769 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn867820956</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|||||||||</controlfield><controlfield tag="008">140110s2013 enka o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">IDEBK</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">IDEBK</subfield><subfield code="d">EBLCP</subfield><subfield code="d">E7B</subfield><subfield code="d">MHW</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCO</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">CHVBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">FEM</subfield><subfield code="d">COCUF</subfield><subfield code="d">CNNOR</subfield><subfield code="d">MOR</subfield><subfield code="d">CCO</subfield><subfield code="d">PIFAG</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCO</subfield><subfield code="d">ZCU</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">U3W</subfield><subfield code="d">D6H</subfield><subfield code="d">OCL</subfield><subfield code="d">STF</subfield><subfield code="d">VTS</subfield><subfield code="d">NRAMU</subfield><subfield code="d">ICG</subfield><subfield code="d">NLE</subfield><subfield code="d">INT</subfield><subfield code="d">OCLCA</subfield><subfield code="d">UKMGB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">WYU</subfield><subfield code="d">G3B</subfield><subfield code="d">TKN</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKAHL</subfield><subfield code="d">HS0</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AJS</subfield><subfield code="d">OCLCO</subfield><subfield code="d">QGK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">UEJ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">HOPLA</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">018006394</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">961591469</subfield><subfield code="a">962708033</subfield><subfield code="a">968055760</subfield><subfield code="a">969046716</subfield><subfield code="a">1259078965</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1306280249</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781306280242</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781782178194</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1782178198</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781782178187</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">178217818X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)867820956</subfield><subfield code="z">(OCoLC)961591469</subfield><subfield code="z">(OCoLC)962708033</subfield><subfield code="z">(OCoLC)968055760</subfield><subfield code="z">(OCoLC)969046716</subfield><subfield code="z">(OCoLC)1259078965</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">559275</subfield><subfield code="b">MIL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.C55</subfield><subfield code="b">.N53 2013eb</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.774.M55</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">046050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.4476</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Nickel, Jochen.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Learning Microsoft Windows Server 2012 Dynamic Access Control.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2013.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Professional expertise distilled</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This practical tutorial-based book is filled with information about the architecture, functionality, and extensions of Microsoft Windows Server 2012 Dynamic Access Control. If you are an IT consultant/architect, system engineer, system administrator, or security engineers planning to implement Dynamic Access Control in your organization, or have already implemented it and want to discover more about the abilities and how to use them effectively, this book will be an essential resource. You should have some understanding of security solutions, Active Directory, Access Privileges/ Rights and Auth.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from PDF title page (EBSCO, viewed July 8, 2017).</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting in Touch with Dynamic Access Control; Business needs, purpose, and benefits; Inside the architecture of DAC; Building blocks; Infrastructure requirements; User and device claims; Expression-based access rules; Classification enhancements; Central Access and Audit policies; Access-denied assistance; Building your smart test lab; Dynamic Access Control configuration; Summary; Chapter 2: Understanding the Claims-based Access Model; Understanding claims</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Claims support in Windows 8/2012 and newerKerberos authentication enhancements; Kerberos Armoring and Compound Authentication; Kerberos Armoring; Compound Authentication; Manage Claims and Resource properties; Naming conventions; Authoritative system and data validation; Administrative delegation; Resource properties; Usage of Claim Transformation and Filtering; Groups or DAC, let's extend our first solution; Summary; Chapter 3: Classification and the File Classification Infrastructure; Map the business and security requirements</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Different types and methods for tagging and classifying informationManual Classification; Using the Windows File Classification Infrastructure; Data Classification Toolkit 2012; The Data Classification Toolkit wizard; The Data Classification Toolkit Claims wizard; Designing and configuring classifications; Summary; Chapter 4: Access Control in Action; Defining expression-based Access policies; Deploying Central Access Policies; Protecting legal department information with Central Access Policies; Identifying a Group Policy and registry settings; Configuring FCI and Central Access Policies</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Building a staging environment using proposed permissionsApplying Central Access Policies; Access Denied Remediation; Understanding the ADR process; ADR -- a step-by-step guide; Summary; Chapter 5: Auditing a DAC Solution; Auditing with conditional expressions; Claims-based Global Object Access Auditing; Monitoring your Dynamic Access Control scenarios; Configure an effective auditing solution; Policy considerations; Extending the solution with System Center; Summary; Chapter 6: Integrate Rights Management Protection; Windows 2012 AD RMS; Installing Rights Management Services</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Rights Protected FolderClassification-based encryption; Protect your information with a combination; Rights management template; Encryption rule; Information access; Build the RPF example in your environment; File retention; AD RMS in a SAP environment; Summary; Chapter 7: Extending the DAC Base Solution; Keeping Active Directory attributes up-to-date; Third-party tools for Dynamic Access Control; Classification; Central Access Policy; RMS Protection; Auditing; Using DAC in SharePoint; BYOD -- using Dynamic Access Control; Summary; Chapter 8: Automating the Solution</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Microsoft Windows server</subfield><subfield code="x">Access control.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Microsoft Windows server</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Microsoft Windows (Computer file)</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Microsoft Windows (Computer file)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Microsoft Windows server</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Client/server computing</subfield><subfield code="x">Access control.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Client/server computing.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh93000502</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Architecture client-serveur (Informatique)</subfield><subfield code="x">Accès</subfield><subfield code="x">Contrôle.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Architecture client-serveur (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Operating Systems</subfield><subfield code="x">Windows Server.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Client/server computing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Security systems</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Learning Microsoft Windows Server 2012 Dynamic Access Control (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCYYfrpvQVc4rPQJHBH3D4m</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">9781306280242</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=680710</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">hoopla Digital</subfield><subfield code="b">HOPL</subfield><subfield code="n">MWT16863710</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH26849746</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL1593860</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10825558</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">680710</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis27260898</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn867820956 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:25:43Z |
institution | BVB |
isbn | 1306280249 9781306280242 9781782178194 1782178198 |
language | English |
oclc_num | 867820956 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Packt Publishing, |
record_format | marc |
series2 | Professional expertise distilled |
spelling | Nickel, Jochen. Learning Microsoft Windows Server 2012 Dynamic Access Control. Birmingham : Packt Publishing, 2013. 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier text file Professional expertise distilled This practical tutorial-based book is filled with information about the architecture, functionality, and extensions of Microsoft Windows Server 2012 Dynamic Access Control. If you are an IT consultant/architect, system engineer, system administrator, or security engineers planning to implement Dynamic Access Control in your organization, or have already implemented it and want to discover more about the abilities and how to use them effectively, this book will be an essential resource. You should have some understanding of security solutions, Active Directory, Access Privileges/ Rights and Auth. Online resource; title from PDF title page (EBSCO, viewed July 8, 2017). Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting in Touch with Dynamic Access Control; Business needs, purpose, and benefits; Inside the architecture of DAC; Building blocks; Infrastructure requirements; User and device claims; Expression-based access rules; Classification enhancements; Central Access and Audit policies; Access-denied assistance; Building your smart test lab; Dynamic Access Control configuration; Summary; Chapter 2: Understanding the Claims-based Access Model; Understanding claims Claims support in Windows 8/2012 and newerKerberos authentication enhancements; Kerberos Armoring and Compound Authentication; Kerberos Armoring; Compound Authentication; Manage Claims and Resource properties; Naming conventions; Authoritative system and data validation; Administrative delegation; Resource properties; Usage of Claim Transformation and Filtering; Groups or DAC, let's extend our first solution; Summary; Chapter 3: Classification and the File Classification Infrastructure; Map the business and security requirements Different types and methods for tagging and classifying informationManual Classification; Using the Windows File Classification Infrastructure; Data Classification Toolkit 2012; The Data Classification Toolkit wizard; The Data Classification Toolkit Claims wizard; Designing and configuring classifications; Summary; Chapter 4: Access Control in Action; Defining expression-based Access policies; Deploying Central Access Policies; Protecting legal department information with Central Access Policies; Identifying a Group Policy and registry settings; Configuring FCI and Central Access Policies Building a staging environment using proposed permissionsApplying Central Access Policies; Access Denied Remediation; Understanding the ADR process; ADR -- a step-by-step guide; Summary; Chapter 5: Auditing a DAC Solution; Auditing with conditional expressions; Claims-based Global Object Access Auditing; Monitoring your Dynamic Access Control scenarios; Configure an effective auditing solution; Policy considerations; Extending the solution with System Center; Summary; Chapter 6: Integrate Rights Management Protection; Windows 2012 AD RMS; Installing Rights Management Services Rights Protected FolderClassification-based encryption; Protect your information with a combination; Rights management template; Encryption rule; Information access; Build the RPF example in your environment; File retention; AD RMS in a SAP environment; Summary; Chapter 7: Extending the DAC Base Solution; Keeping Active Directory attributes up-to-date; Third-party tools for Dynamic Access Control; Classification; Central Access Policy; RMS Protection; Auditing; Using DAC in SharePoint; BYOD -- using Dynamic Access Control; Summary; Chapter 8: Automating the Solution English. Microsoft Windows server Access control. Microsoft Windows server Security measures. Microsoft Windows (Computer file) Microsoft Windows (Computer file) fast Microsoft Windows server fast Client/server computing Access control. Client/server computing. http://id.loc.gov/authorities/subjects/sh93000502 Architecture client-serveur (Informatique) Accès Contrôle. Architecture client-serveur (Informatique) COMPUTERS Operating Systems Windows Server. bisacsh Client/server computing fast Security systems fast has work: Learning Microsoft Windows Server 2012 Dynamic Access Control (Text) https://id.oclc.org/worldcat/entity/E39PCYYfrpvQVc4rPQJHBH3D4m https://id.oclc.org/worldcat/ontology/hasWork Print version: 9781306280242 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=680710 Volltext |
spellingShingle | Nickel, Jochen Learning Microsoft Windows Server 2012 Dynamic Access Control. Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting in Touch with Dynamic Access Control; Business needs, purpose, and benefits; Inside the architecture of DAC; Building blocks; Infrastructure requirements; User and device claims; Expression-based access rules; Classification enhancements; Central Access and Audit policies; Access-denied assistance; Building your smart test lab; Dynamic Access Control configuration; Summary; Chapter 2: Understanding the Claims-based Access Model; Understanding claims Claims support in Windows 8/2012 and newerKerberos authentication enhancements; Kerberos Armoring and Compound Authentication; Kerberos Armoring; Compound Authentication; Manage Claims and Resource properties; Naming conventions; Authoritative system and data validation; Administrative delegation; Resource properties; Usage of Claim Transformation and Filtering; Groups or DAC, let's extend our first solution; Summary; Chapter 3: Classification and the File Classification Infrastructure; Map the business and security requirements Different types and methods for tagging and classifying informationManual Classification; Using the Windows File Classification Infrastructure; Data Classification Toolkit 2012; The Data Classification Toolkit wizard; The Data Classification Toolkit Claims wizard; Designing and configuring classifications; Summary; Chapter 4: Access Control in Action; Defining expression-based Access policies; Deploying Central Access Policies; Protecting legal department information with Central Access Policies; Identifying a Group Policy and registry settings; Configuring FCI and Central Access Policies Building a staging environment using proposed permissionsApplying Central Access Policies; Access Denied Remediation; Understanding the ADR process; ADR -- a step-by-step guide; Summary; Chapter 5: Auditing a DAC Solution; Auditing with conditional expressions; Claims-based Global Object Access Auditing; Monitoring your Dynamic Access Control scenarios; Configure an effective auditing solution; Policy considerations; Extending the solution with System Center; Summary; Chapter 6: Integrate Rights Management Protection; Windows 2012 AD RMS; Installing Rights Management Services Rights Protected FolderClassification-based encryption; Protect your information with a combination; Rights management template; Encryption rule; Information access; Build the RPF example in your environment; File retention; AD RMS in a SAP environment; Summary; Chapter 7: Extending the DAC Base Solution; Keeping Active Directory attributes up-to-date; Third-party tools for Dynamic Access Control; Classification; Central Access Policy; RMS Protection; Auditing; Using DAC in SharePoint; BYOD -- using Dynamic Access Control; Summary; Chapter 8: Automating the Solution Microsoft Windows server Access control. Microsoft Windows server Security measures. Microsoft Windows (Computer file) Microsoft Windows (Computer file) fast Microsoft Windows server fast Client/server computing Access control. Client/server computing. http://id.loc.gov/authorities/subjects/sh93000502 Architecture client-serveur (Informatique) Accès Contrôle. Architecture client-serveur (Informatique) COMPUTERS Operating Systems Windows Server. bisacsh Client/server computing fast Security systems fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh93000502 |
title | Learning Microsoft Windows Server 2012 Dynamic Access Control. |
title_auth | Learning Microsoft Windows Server 2012 Dynamic Access Control. |
title_exact_search | Learning Microsoft Windows Server 2012 Dynamic Access Control. |
title_full | Learning Microsoft Windows Server 2012 Dynamic Access Control. |
title_fullStr | Learning Microsoft Windows Server 2012 Dynamic Access Control. |
title_full_unstemmed | Learning Microsoft Windows Server 2012 Dynamic Access Control. |
title_short | Learning Microsoft Windows Server 2012 Dynamic Access Control. |
title_sort | learning microsoft windows server 2012 dynamic access control |
topic | Microsoft Windows server Access control. Microsoft Windows server Security measures. Microsoft Windows (Computer file) Microsoft Windows (Computer file) fast Microsoft Windows server fast Client/server computing Access control. Client/server computing. http://id.loc.gov/authorities/subjects/sh93000502 Architecture client-serveur (Informatique) Accès Contrôle. Architecture client-serveur (Informatique) COMPUTERS Operating Systems Windows Server. bisacsh Client/server computing fast Security systems fast |
topic_facet | Microsoft Windows server Access control. Microsoft Windows server Security measures. Microsoft Windows (Computer file) Microsoft Windows server Client/server computing Access control. Client/server computing. Architecture client-serveur (Informatique) Accès Contrôle. Architecture client-serveur (Informatique) COMPUTERS Operating Systems Windows Server. Client/server computing Security systems |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=680710 |
work_keys_str_mv | AT nickeljochen learningmicrosoftwindowsserver2012dynamicaccesscontrol |