Put simply, NAP allows you to enforce a rule that if the client is not up to date with patches and antivirus definitions, you can block it from getting full access to the network. In this chapter, you will learn how to configure and deploy NAP and the various methods that are available to deal with noncompliant computers. In the past, every computer that connected to the network was stationary, and very few people took their workstations home with them.
But today, most computers sold are laptops, and increasing numbers of people take their primary computer with them when they leave the office for the day.
Right-click Routing and Remote Access, and then click Properties. On the Logging tab, select Log errors only, Log errors and warnings, or Log all events, depending on how much information you want to capture. Click OK to save your changes. The related KB:. Hope this helps. We are trying to better understand customer views on social support experience, so your participation in this interview project would be greatly appreciated if you have time.
Thanks for helping make community forums a great place. Do you know which specific logs I should be delving into in a bit more detail to find the information I am looking for? Thanks in advance David. Office Office Exchange Server.
Not an IT pro? Resources for IT Professionals. Some very valid points! I appreciate you penning this article plus the rest of the site is also really good. You are commenting using your WordPress. You are commenting using your Google account. You are commenting using your Twitter account. You are commenting using your Facebook account. Notify me of new comments via email.
Notify me of new posts via email. Like this: Like Loading Related posts. Thank you. Leave a Reply Cancel reply Enter your comment here
0コメント