Additional Security Methods

You can use methods other than network topology to secure and monitor your network. The rest of this chapter explains these methods, which include:

For more information about Windows NT security as it relates to Internet Information Server, see the Internet Information Server Installation and Administration Guide.