Co-sponsors:         

Thank you for coming to the Microsoft Big Day

 

Microsoft Windows 2000 Home   All Products  |   Support  |   Search  |   microsoft.com Home  
Microsoft
  Windows Home Pages  |

Search for:  

 

Home Product Guide Server Technologies in Depth

Exploring Security Services

Windows 2000 Distributed Security has many new features to simplify domain administration, improve performance, and integrate Internet security technology based on public-key cryptography. The highlights of the Windows 2000 Distributed Security Services include Integration with Windows 2000 Active Directory services to provide scalable, flexible account management for large domains with fine-grain access control and delegation of administration; Kerberos version 5 authentication protocol, which is implemented as the default protocol for network authentication; strong authentication using public-key certificates, secure channels based on Secure Sockets Layer (SSL) 3.0, and CryptoAPI to deliver industry-standard protocols for data integrity and privacy across public networks.

Learn more about Windows 2000 Security Services, including security management using the Microsoft Security Configuration Tool Set, support for IP Security, the Encrypting File System, Public Key Infrastructure, smart cards, and Kerberos.




Overviews

Go to Security Services Launch Showcase Security Services Launch Showcase
Go to Introduction to Windows 2000 Security Services Introduction to Windows 2000 Security Services
Go to Windows 2000 Security Services Features Windows 2000 Security Services Features
 

Technical Documents

Go to Privacy Protected Network Access: Virtual Private Networking and Intranet Security Privacy Protected Network Access: Virtual Private Networking and Intranet Security
Go to Secure Networking Using Windows 2000 Distributed Security Services Secure Networking Using Windows 2000 Distributed Security Services
Go to Encrypting File System for Windows 2000 Encrypting File System for Windows 2000
Go to Windows 2000 Kerberos Authentication Windows 2000 Kerberos Authentication
Go to Security Configuration Tool Set Security Configuration Tool Set
Go to Smart Cards Smart Cards
Go to The Security Support Provider Interface The Security Support Provider Interface
Go to IP Security for Windows 2000 Server IP Security for Windows 2000 Server
Go to Windows 2000 Kerberos Interoperability Windows 2000 Kerberos Interoperability
Go to Smart Card Logon Smart Card Logon
Go to Single Sign-On for Windows Networks Single Sign-On for Windows Networks
Go to Public Key Interoperability Public Key Interoperability
Go to Windows 2000 Certificate Services Windows 2000 Certificate Services
Go to Default Access Control Settings Default Access Control Settings
Go to An Introduction to the Windows 2000 Public Key Infrastructure An Introduction to the Windows 2000 Public Key Infrastructure
Go to Microsoft Windows 2000 Public Key Infrastructure Microsoft Windows 2000 Public Key Infrastructure
Go to Step-by-Step Guide to Installing and Using a Smart Card Reader Step-by-Step Guide to Installing and Using a Smart Card Reader
Go to Securing Windows 2000 Network Resources Securing Windows 2000 Network Resources
Go to Step-by-Step Guide to Certificate Services Web Pages Step-by-Step Guide to Certificate Services Web Pages
Go to Step-by-Step Guide to Advanced Certificate Management Step-by-Step Guide to Advanced Certificate Management
Go to Step-by-Step Guide to Setting Up Certification Authority Trust for a Domain Step-by-Step Guide to Setting Up Certification Authority Trust for a Domain
Go to Step-by-Step Guide to Mapping Certificates to User Accounts Step-by-Step Guide to Mapping Certificates to User Accounts
Go to Step-by-Step Guide to Public Key Features in Outlook Express 5.0 and above Step-by-Step Guide to Public Key Features in Outlook Express 5.0 and above
Go to Step-by-Step Guide to Public Key-Based Client Authentication in Internet Explorer Step-by-Step Guide to Public Key-Based Client Authentication in Internet Explorer
Go to Step-by-Step Guide to Public Key Features of Outlook 2000 Step-by-Step Guide to Public Key Features of Outlook 2000
Go to Step-by-Step Guide to Using the Security Configuration Tool Set Step-by-Step Guide to Using the Security Configuration Tool Set
Go to Step-by-Step Guide to Setting up a Certificate Authority Step-by-Step Guide to Setting up a Certificate Authority
Go to Step-by-Step Guide to Kerberos 5 (krb5 1.0) Interoperability Step-by-Step Guide to Kerberos 5 (krb5 1.0) Interoperability
Go to Step-by-Step Guide to Internet Protocol Security (IPSec) Step-by-Step Guide to Internet Protocol Security (IPSec)
Go to Step-by-Step Guide to Administering Certificate Services Step-by-Step Guide to Administering Certificate Services
Go to Step-by-Step Guide to Configuring Enterprise Security Policies Step-by-Step Guide to Configuring Enterprise Security Policies
Go to Step-by-Step Guide to Encrypting File System (EFS) Step-by-Step Guide to Encrypting File System (EFS)
 


Last Updated: Wednesday, March 29, 2000
© 2000 Microsoft Corporation. All rights reserved. Terms of use.