Deploying NAP with 802.1x Authentication


Right click “Save as…”

Learn how to design and deploy a Network Access Protection (NAP) solution with a detailed discussion of the ten things you need to know about NAP, pros and cons for each NAP enforcement method, how to design health requirement policies, autoremediation behaviors and considerations, and using a phased approach to NAP deployment. Also, learn about the history, planning, issues encountered, lessons learned, best practices, and ongoing management for the deployment of NAP on the Microsoft corporate network.
For more information, check out this course on Microsoft Virtual Academy:

Follow the discussion

  • Oops, something didn't work.

    Getting subscription
    Subscribe to this conversation

Comments closed

Comments have been closed since this content was published more than 30 days ago, but if you'd like to continue the conversation, please create a new thread in our Forums, or Contact Us and let us know.