- Microsoft DirectAccess Best Practices and Troubleshooting
- Jordan Krause
- 212字
- 2021-08-04 09:57:29
Chapter 1. DirectAccess Server Best Practices
In this chapter we are going to take a step-by-step approach in the preparation of your Windows Server 2012 Remote Access servers for use with DirectAccess. By walking through the process of preparing your servers, we will have ample opportunity to discuss what the changes and options that you are choosing actually mean, and give a little insight as to whether or not you really want to choose them. There are numerous ways in which DirectAccess in Server 2012 can be implemented, and not all the options are created equally. We'll discuss which options are the best in terms of security, and I'll describe the steps to take to make sure your environment is running as efficiently and securely as possible. The topics covered in this chapter are relevant to the actual server itself, and not necessarily DirectAccess environmental practices, as we will discuss those topics in Chapter 2, DirectAccess Environmental Best Practices.
Here's the layout of what we are going to look at:
- Preparing your Remote Access servers for DirectAccess
- NIC configuration
- NIC binding
- MAC address spoofing for virtual machines
- Adding static routes
- Hostname and domain membership
- Time for certificates
- Adding the roles
- Don't use the Getting Started Wizard!
- Security hardening the server
- 操作系統實用教程(Linux版)
- Getting Started with oVirt 3.3
- SharePoint 2013 WCM Advanced Cookbook
- Installing and Configuring Windows 10:70-698 Exam Guide
- Instant Optimizing Embedded Systems using Busybox
- STM32庫開發實戰指南:基于STM32F4
- 嵌入式實時操作系統μC/OS原理與實踐
- Windows 7實戰從入門到精通
- 完美應用Ubuntu(第2版)
- Agile IT Security Implementation Methodology
- 電腦辦公(Windows 10 + Office 2016)入門與提高(超值版)
- Angular權威教程
- 程序員必讀經典(算法基礎+計算機系統)
- Docker for Developers
- UNIX傳奇:歷史與回憶