Deploying NAP with 802.1x Authentication

Download

Right click “Save as…”

Learn how to design and deploy a Network Access Protection (NAP) solution with a detailed discussion of the ten things you need to know about NAP, pros and cons for each NAP enforcement method, how to design health requirement policies, autoremediation behaviors and considerations, and using a phased approach to NAP deployment. Also, learn about the history, planning, issues encountered, lessons learned, best practices, and ongoing management for the deployment of NAP on the Microsoft corporate network.
For more information, check out this course on Microsoft Virtual Academy:

Follow the Discussion

Comments Closed

Comments have been closed since this content was published more than 30 days ago, but if you'd like to continue the conversation, please create a new thread in our Forums,
or Contact Us and let us know.