Chapter 15 Configuring Remote Access

This chapter covers the following subjects:

Image Configuring Remote Authentication: To secure sensitive and valuable organizational resources, it is vital that users connecting from remote locations using the Internet or dial-up connections are positively authenticated. In this section you learn about processes and technologies available for securely authenticating the users requesting access to your network and computers.

Image Configuring Remote Desktop Settings: This section describes new and improved methods of connecting ...

Get MCSA 70-697 and 70-698 Cert Guide: Configuring Windows Devices; Installing and Configuring Windows 10 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.