更新时间:2021-07-19 18:47:44
coverpage
Learning Microsoft Windows Server 2012 Dynamic Access Control
Credits
About the Author
About the Reviewers
www.PacktPub.com
Support files eBooks discount offers and more
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Chapter 1. Getting in Touch with Dynamic Access Control
Business needs purpose and benefits
Inside the architecture of DAC
Building your smart test lab
Configuring Dynamic Access Control
Summary
Chapter 2. Understanding the Claims-based Access Model
Understanding claims
Claims support in Windows 8/2012 and newer
Kerberos Armoring and Compound Authentication
Managing Claims and Resource properties
Using Claim Transformation and Filtering
Groups or DAC let's extend our first solution
Chapter 3. Classification and the File Classification Infrastructure
Map the business and security requirements
Different types and methods for tagging and classifying information
Manual Classification
Using the Windows File Classification Infrastructure
Data Classification Toolkit 2012
The Data Classification Toolkit wizard
Designing and configuring classifications
Chapter 4. Access Control in Action
Defining expression-based Access policies
Deploying Central Access Policies
Identifying a Group Policy and registry settings
Configuring FCI and Central Access Policies
Building a staging environment using proposed permissions
Applying Central Access Policies
Access Denied Remediation
Chapter 5. Auditing a DAC Solution
Auditing with conditional expressions
Claims-based Global Object Access Auditing
Configuring an effective auditing solution
Policy considerations
Extending the solution with System Center
Chapter 6. Integrating Rights Management Protection
Windows 2012 AD RMS
Installing Rights Management Services
Rights Protected Folder
Classification-based encryption
Protecting your information with a combination
Chapter 7. Extending the DAC Base Solution
Keeping Active Directory attributes up-to-date
Third-party tools for Dynamic Access Control
BYOD – using Dynamic Access Control
Chapter 8. Automating the Solution
Identifying the complete solution
How other Microsoft products can assist you
Advanced architectures for Information Protection
Chapter 9. Troubleshooting
Common misconfigurations
General troubleshooting
Advanced troubleshooting
Index