Protect Your Windows Network: From Perimeter to Data
-
Put a plan in action to implement some of the techniques you have learned in this book.
-
Ensure that your security policy addresses data protection.
-
Evaluate a few critical data stores and ensure the ACLs are appropriate on them. For instance, ensure that you have proper ACLs on any stores for network installations of software.