MISSING
Suggested content for this section :
Define share security level. What dialects support it?
Define user security level.
How is it supported in PDC/BDC environment (NT4)
How it supported in Active directory environment. Define the different security considerations in different Active Directory modes.
How Kerberos security is used?
What are the protocols (or DCE/RPC) needed for each of the User level security models
Some discussion on how file access is authenticated, or how the SID is retrieved in each of the user level environments mentioned above for ACL
Include the security protocol, or reference to it