We start this chapter by looking at how to configure and apply security using the Active Directory security model. We then look at the tools that can be used to monitor and audit security events and analyze whether the steps taken will be sufficient to protect the enterprise. |