Chapter 5. Configuring Security and Internet Explorer

Organizations are far more likely to suffer loss of data through the carelessness of employees than they are through deliberate attacks by nefarious third parties. With this in mind, you should realize that configuring security is more than just configuring firewall rules to stop dangerous lurkers on the Internet from sneaking inside the perimeter network. Configuring security is about ensuring the integrity of your organization’s data. This effort can include taking steps as simple as ensuring that a hard disk or sensitive file is encrypted. When you take this precaution, you stop unauthorized third parties from recovering data from a lost or stolen portable computer. Configuring security ...

Get MCITP Self-Paced Training Kit (Exam 70-686): Windows® 7 Enterprise Desktop Administrator now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.