Skip to main content This browser is no longer supported. Show
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support. Network Policy Server Best Practices
In this article
You can use this topic to learn about best practices for deploying and managing Network Policy Server (NPS). The following sections provide best practices for different aspects of your NPS deployment. AccountingFollowing are the best practices for NPS logging. There are two types of accounting, or logging, in NPS:
To make the most effective use of NPS logging:
For more information, see Configure Network Policy Server Accounting.
AuthenticationFollowing are the best practices for authentication.
Important Network Policy Server (NPS) does not support the use of the Extended ASCII characters within passwords. Client computer configurationFollowing are the best practices for client computer configuration.
Installation suggestionsFollowing are the best practices for installing NPS.
Caution
Performance tuning NPSFollowing are the best practices for performance tuning NPS.
Using NPS in large organizationsFollowing are the best practices for using NPS in large organizations.
Security issuesFollowing are the best practices for reducing security issues. When you are administering a NPS remotely, do not send sensitive or confidential data (for example, shared secrets or passwords) over the network in plaintext. There are two recommended methods for remote administration of NPSs:
Important You can install Remote Server Administration Tools for Windows 10 only on the full release of Windows 10 Professional or Windows 10 Enterprise. For more information about NPS, see Network Policy Server (NPS). FeedbackSubmit and view feedback for Which of the following protocols is likely to be used for monitoring the health of the network?The two most widely used monitoring protocols are SNMP and WMI. They provide Network Admins with thousands of monitors to assess the health of their networks and the devices on them.
What does encryption actually protect on the computer system?Encryption takes plain text, like a text message or email, and scrambles it into an unreadable format — called “cipher text.” This helps protect the confidentiality of digital data either stored on computer systems or transmitted through a network like the Internet.
Which access control model could you use to prevent users from logging into their accounts after business hours?The type of access control that would be used in the case we were to prevent users from logging in after hours would be attribute based access controls. The attribute in this case would be time due to the time being after business hours.
Which Internet protocol is used to transmit encrypted data?Hypertext transfer protocol secure (HTTPS) is the secure version of HTTP, which is the primary protocol used to send data between a web browser and a website. HTTPS is encrypted in order to increase security of data transfer.
|