Secure Deployment (Replication)
This section provides information to help you better secure replication.
In This Section
Secure the Distributor
Describes how to help secure a Distributor.
Secure the Publisher
Describes the publication access list (PAL) and best practices for its use.
Secure the Subscriber
Describes connections made to Subscribers and considerations for transactional updating Subscribers.
Secure the Snapshot Folder
Describes permissions required for access to the snapshot folder, best practices for defining folder location, and considerations for snapshot delivery through FTP.
Securing Replication Over the Internet
Includes information about virtual private networks and Web synchronization.
Security Considerations for SQL Server Compact Replication
Discusses Securing connectivity between an instance of Microsoft SQL Server Database Engine and SQL Server Compact.