Managing Security Policies
Account
, characteristics of passwords
User Rights
, which user or group is assigned what system rights
Audit
, what kind of security events are to be logged
Trust Relationships, how domains interact (not shown)
Previous slide
Next slide
Back to first slide
View graphic version