Summary


This chapter has demonstrated access, discovery, and security features of Active Directory. Although it doesn’t provide a full treatment of many Active Directory tasks, you do know how to make Active Directory the kind of secure environment that protects your most sensitive data completely. You also know of a new use for the ADSI Viewer—as a monitoring tool. Many network administrators are unaware of the full capabilities of this particular tool—how it can help locate and track potential security problems.

Now that you know more about the security needs of Active Directory, it’s time to put them into practice. One of the first tasks you should perform is to audit your Active Directory installation. You might find entries that you never knew existed (most of which will contain legitimate configuration information). It’s also time to plan secure extensions for Active Directory (as needed) and to secure access to this essential database by adding the proper permissions to your applications.

Chapter 13 discusses a topic that’s received a lot of press: wireless device security. The problem with wireless devices is that they transmit information into the open air, making it possible for anyone to listen in on the conversation. However, the problem is more severe than you might imagine. Some industry pundits are describing wireless as the biggest disaster that could ever hit your network. However, the .NET Framework provides options to make your wireless application more secure and they’re covered in Chapter 13.




.Net Development Security Solutions
.NET Development Security Solutions
ISBN: 0782142664
EAN: 2147483647
Year: 2003
Pages: 168

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net