LEADER 05123nam 22006011 450 001 9910453409103321 005 20200520144314.0 010 $a1-78217-819-8 035 $a(CKB)2550000001179136 035 $a(EBL)1593860 035 $a(SSID)ssj0001162418 035 $a(PQKBManifestationID)11745321 035 $a(PQKBTitleCode)TC0001162418 035 $a(PQKBWorkID)11135371 035 $a(PQKB)11773274 035 $a(MiAaPQ)EBC1593860 035 $a(PPN)228043743 035 $a(Au-PeEL)EBL1593860 035 $a(CaPaEBR)ebr10825558 035 $a(CaONFJC)MIL559275 035 $a(OCoLC)867820956 035 $a(EXLCZ)992550000001179136 100 $a20140104d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aLearning Microsoft Windows Server 2012 dynamic access control /$fJochen Nickel 210 1$aBirmingham :$cPackt Publishing,$d2013. 215 $a1 online resource (146 p.) 225 1 $aProfessional expertise distilled 300 $aIncludes index. 311 $a1-78217-818-X 311 $a1-306-28024-9 327 $aCover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Getting in Touch with Dynamic Access Control; Business needs, purpose, and benefits; Inside the architecture of DAC; Building blocks; Infrastructure requirements; User and device claims; Expression-based access rules; Classification enhancements; Central Access and Audit policies; Access-denied assistance; Building your smart test lab; Dynamic Access Control configuration; Summary; Chapter 2: Understanding the Claims-based Access Model; Understanding claims 327 $aClaims support in Windows 8/2012 and newerKerberos authentication enhancements; Kerberos Armoring and Compound Authentication; Kerberos Armoring; Compound Authentication; Manage Claims and Resource properties; Naming conventions; Authoritative system and data validation; Administrative delegation; Resource properties; Usage of Claim Transformation and Filtering; Groups or DAC, let's extend our first solution; Summary; Chapter 3: Classification and the File Classification Infrastructure; Map the business and security requirements 327 $aDifferent types and methods for tagging and classifying informationManual Classification; Using the Windows File Classification Infrastructure; Data Classification Toolkit 2012; The Data Classification Toolkit wizard; The Data Classification Toolkit Claims wizard; Designing and configuring classifications; Summary; Chapter 4: Access Control in Action; Defining expression-based Access policies; Deploying Central Access Policies; Protecting legal department information with Central Access Policies; Identifying a Group Policy and registry settings; Configuring FCI and Central Access Policies 327 $aBuilding a staging environment using proposed permissionsApplying Central Access Policies; Access Denied Remediation; Understanding the ADR process; ADR - a step-by-step guide; Summary; Chapter 5: Auditing a DAC Solution; Auditing with conditional expressions; Claims-based Global Object Access Auditing; Monitoring your Dynamic Access Control scenarios; Configure an effective auditing solution; Policy considerations; Extending the solution with System Center; Summary; Chapter 6: Integrate Rights Management Protection; Windows 2012 AD RMS; Installing Rights Management Services 327 $aRights Protected FolderClassification-based encryption; Protect your information with a combination; Rights management template; Encryption rule; Information access; Build the RPF example in your environment; File retention; AD RMS in a SAP environment; Summary; Chapter 7: Extending the DAC Base Solution; Keeping Active Directory attributes up-to-date; Third-party tools for Dynamic Access Control; Classification; Central Access Policy; RMS Protection; Auditing; Using DAC in SharePoint; BYOD - using Dynamic Access Control; Summary; Chapter 8: Automating the Solution 327 $aIdentifying the complete solution 330 $aThis practical tutorial-based book is filled with information about the architecture, functionality, and extensions of Microsoft Windows Server 2012 Dynamic Access Control.If you are an IT consultant/architect, system engineer, system administrator, or security engineers planning to implement Dynamic Access Control in your organization, or have already implemented it and want to discover more about the abilities and how to use them effectively, this book will be an essential resource. You should have some understanding of security solutions, Active Directory, Access Privileges/ Rights and Auth 606 $aClient/server computing 608 $aElectronic books. 615 0$aClient/server computing. 700 $aNickel$b Jochen$0898914 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910453409103321 996 $aLearning Microsoft Windows Server 2012 dynamic access control$92008312 997 $aUNINA