It is important to protect your information and service resources from people who should not have access to them, while at the same time making those resources available to authorized users. Effective security achieves both these goals. After you understand your security needs, you can configure Microsoft Windows 2000 Professional to meet your goals. This chapter will help you make the most of the security technology provided with Windows 2000 Professional.

In This Chapter

Quick Guide to Security

Whats New

Planning for Security

User Authentication

Security Groups, User Rights, and Permissions

Security Policy

Security Templates

Remote Access

Internet Protocol Security

Encrypting File System

Public Key Technology

Protecting User Data on Portable Computers