The user role can be a useful criteria for security management. In this video, you’ll learn the best practices for role-based management and how shared accounts and credentials should be managed.
Managing the applications running on mobile devices requires some additional security planning. In this video, you’ll learn about key management, managing credentials, geo-tagging, and application whitelisting.
Access to a Windows 7 computer includes rights, credentials, and authentications. In this video, you’ll learn how to configure Windows 7 rights, manage credentials and certificates, how to elevate user privileges, and using smart cards for multifactor authentication.