Udostępnij za pośrednictwem


Longhorn Academy follow up..

Firstly, let me apologise for not posting for a while.  I do have a good excuse - I've been on holiday (seven days in Sardinia - hot & sunny - makes a change from the rain)!  I got back last last Tuesday and was delivering this months Longhorn Academy on Wednesday.  Thursday I got on a plane again and I'm now in Seattle (Microsoft has has me working ever since).

The last Longhorn Academy covered Security and Policy Enforcement and in particular network Access Protection (NAP).  One of the questions that came up (that we didn't have a good answer for) was what would happen to a NAP enabled laptop entering another customers NAP enabled network (would the network admin have the ability to update the guest laptop).

This is the answer (from the documentation):

· Verifying the health state of visiting laptops

Organizations frequently need to allow consultants, business partners, and guests to connect to their private networks. The laptops that these visitors bring might not meet system health requirements and can present health risks. By using NAP, administrators can determine that the visiting laptops are not compliant and limit their access to a restricted network. Typically, administrators would not require or provide any updates or configuration changes to the visiting laptops. The administrator could configure Internet access for visiting laptops, but not for other organization computers whose access is limited.

One last thing, the step-by-step guidesI mentioned can be found here.  They are very good, so if you have time (probably half a day for each) - play away.

Step-by-Step Guides
Step-by-Step Guide: Demonstrate IPsec NAP Enforcement in a Test Lab
Step By Step Guide: Demonstrate 802.1X NAP Enforcement in a Test Lab
Step-by-Step Guide: Demonstrate VPN NAP Enforcement in a Test Lab
Step-by-Step Guide: Demonstrate DHCP NAP Enforcement in a Test Lab

Enjoy

Dave.

Comments

  • Anonymous
    October 29, 2008
    The comment has been removed