Blog Posts Tagged with "NAP"

94c7ac665bbf77879483b04272744424

Network Anomaly Detection Takes a NAP

May 07, 2012 Added by:Marc Quibell

ADS are still used for investigative purposes - after the data has passed - taking correlated log data and running an analysis against historical data to see if anything abnormal happened. Well that's cool, except it already happened - the damage is already done in most cases...

Comments  (1)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

Who’s NAPping on Your Network? (Part Two)

March 17, 2011 Added by:Global Knowledge

In the last post I described a high-level overview of 802.1x authentication. Now, let’s dive a bit deeper into the use of 802.1x as a foundation for Network Access Protection (NAP) enforcement of health policies in a Windows Server 2008 network infrastructure...

Comments  (2)

0dc5fdbc98f80f9aaf2b43b8bc795ea8

Who’s NAPping On Your Network?

December 06, 2010 Added by:Global Knowledge

This built on the Remote Authentication Dial-In User Service (RADIUS) and Remote Access Policies which have been built in to Windows since Windows 2000 Server. Use of 802.1x in wired (e.g. Ethernet) and wireless (e.g. 802.11 WiFi) networks requires some prerequisites in your network infrastructure...

Comments  (0)