Chapter 10. Conclusion

Organizations can choose from several enforcement methods when deploying NAP. Each has its own strengths and drawbacks with regard to complexity, ease of deployment, and cost, as have been discussed in this guide. After selecting the best NAP enforcement technology and client compliance requirements, the planning process can continue.

If the organization’s analyses lead it to choose IPsec, refer to the following sources for additional planning and implementation guidance:

  • Chapter 16, "IPsec Enforcement," Windows Server 2008 Networking and Network Access Protection (NAP). Microsoft Press, 2008. This information is also available as part of the Windows Server 2008 Resource Kit. Microsoft Press, 2008.

  • "Internet Protocol Security ...

Get Selecting the Right NAP Architecture now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.