Chapter 14. Configuring Remote Management and Remote Connections

This chapter covers the following subjects:

Image Configuring Remote Authentication: To secure sensitive and valuable organizational resources, you must ensure that users connecting from remote locations using the Internet or dial-up connections are positively authenticated. In this section, you learn about processes and technologies available for securely authenticating the users requesting access to your network and computers.

Image Configuring Remote Desktop and Remote Management Settings ...

Get MCSA 70-687 Cert Guide: Configuring Microsoft Windows 8.1 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.