![American Dynamics Intellex Policy Manager Скачать руководство пользователя страница 35](http://html1.mh-extra.com/html/american-dynamics/intellex-policy-manager/intellex-policy-manager_user-manual_2924302035.webp)
29
Appendix A Security Concepts for Policy
Manager
Policy Manager integrates your physical security installation into your existing network security
environment. Physical and network security are complex areas of specialization that have teams
of dedicated professionals with detailed knowledge specific to their areas. Using Policy Manager,
the two groups collaborate to provide an integrated security network for their respective working
environments. A wealth of literature and technical documentation, from basic concepts to
advanced topics, supports both fields. Refer to this supplementary literature to enhance your
understanding.
Since this product is used in conjunction with the Intellex line of digital video recorders, your
primary source of information about physical security is the User’s Guide and documents that
accompanied your system. There you will find information on each of the securable features listed
in the features table in Appendix C.
Policy Manager is fully integrated with Windows NT, Windows 2000, Windows 2003, Windows XP,
or Microsoft Vista operating systems.
As a result, you can customize the security of the system to
suit your individual corporate networking requirements. The default configuration of Policy
Manager provides appropriate security for most applications.
But if you have special requirements,
the default settings may be inadequate.
If so, you require a custom installation.
Custom
installations are outside the scope of this manual.
If you are planning a custom installation, we
strongly recommend that you discuss the installation with your IS department and that a member
of the IS team assist in the actual installation process.
In addition, you or the IS professional must
have a working knowledge of Windows security, COM+ distributed applications, their settings, how
they are deployed, and DCOM security settings.
Basic Questions
To create a secure environment, answer these three questions beyond a reasonable doubt:
1
Who are you, and are you who you say you are?
2
What do you want to access?
3
What do you intend to do with it once you have it?
In network security, answering the first question is called authentication. Answering the second
and third questions is called authorization.
Authentication
Who are you, and are you who you say you are?
Reliably answering this question is the sole domain of authentication. This question confronts us
every time we log onto our respective networks. In order to access network shares, global
resources, and even our e-mail, we must authenticate ourselves.
Network security is similar to physical access security at many workplaces. Just as key cards
identify employees to the access control system, network credentials (user name, password, and
authenticating authority) uniquely identify individuals to the corporate network. These credentials
are stored and accessed centrally, so that we can use them from any computer that has access to
the authenticating authority (usually a domain controller.)
Содержание Intellex Policy Manager
Страница 1: ...Intellex Policy Manager Version 1 30 User s Guide Part Number 8200 2603 12 A0...
Страница 10: ...Policy Manager 4 Intellex Policy Manager...
Страница 22: ...Managing Intellex Advanced Security through Security Settings 16 Intellex Policy Manager...
Страница 28: ...Working with Zones 22 Intellex Policy Manager...
Страница 34: ...Working with the Event Viewer 28 Intellex Policy Manager...
Страница 40: ...Security Concepts for Policy Manager 34 Intellex Policy Manager...