Loading [MathJax]/jax/output/HTML-CSS/fonts/TeX/fontdata.js

Security policies

Description

Microsoft 70-410 (Networking) Note on Security policies, created by kamsz on 13/08/2013.
kamsz
Note by kamsz, updated more than 1 year ago
kamsz
Created by kamsz almost 12 years ago
70
0
1 2 3 4 5 (0)

Resource summary

Page 1

Connection security involves the authentication of two computers before they begin communications and the securing of information sent between two computers. Windows Firewall with Advanced Security uses Internet Protocol security (IPsec) to achieve connection security by using key exchange, authentication, data integrity, and, optionally, data encryption.

NoteUnlike firewall rules, which operate unilaterally, connection security rules require that both communicating computers have a policy with connection security rules or another compatible IPsec policy.

New Page

Show full summary Hide full summary

0 comments

There are no comments, be the first and leave one below:

Similar

Home networks
johnson8221
ISATAP
kamsz
Single-label names (GlobalNames zone)
kamsz
Authenticated Firewall Bypass
kamsz
DHCP Failover
kamsz
DHCP Relay agent
kamsz
Hardware, Software and Networking
dphillips211
SRV Resource records
kamsz
CHAP
kamsz
2.1.6 Networks
Jake Youd