Questions:
Different Methods for Configuring Windows
1. What are different methods for configuring Windows server user authentication?
2. What are the methods used to harden and manage firewall technologies?
3. What are approaches used by security administrators to monitor servers for security purposes? For example, how are event logs and task/system monitors used?