Chapter 9

Understanding Physical Security

One of the basic security steps you can take is to restrict physical access to systems. Most organizations use a variety of different methods to enforce physical security, such as locked doors, cipher locks, guards, and more. Preventing unauthorized personnel from gaining physical access to servers and network devices (such as routers and switches) is an integral step in any comprehensive security plan.

Whereas previous chapters focused on individual Group Policy settings, this chapter expands the explanation of Group Policy. It shows how to organize users in organizational units, create a Group Policy within a domain, and modify the Group Policy to manage users and computers. You’ll see how you can ...

Get Microsoft® Windows® Security: Essentials now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.