Jump to ratings and reviews
Rate this book

Microsoft Directaccess Best Practices and Troubleshooting

Rate this book
This book covers best practices and acts as a complete guide to DirectAccess and automatic remote access.Microsoft DirectAccess Best Practices and Troubleshooting is an ideal guide for any existing or future DirectAccess administrator and system administrators who are working on Windows Server 2012. This book will also be beneficial for someone with a basic knowledge of networking and deployment of Microsoft operating systems and software who wants to learn the intricacies of DirectAccess and its interfaces.

116 pages, Kindle Edition

First published January 1, 2013

1 person is currently reading

About the author

Jordan Krause

18 books8 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
1 (100%)
4 stars
0 (0%)
3 stars
0 (0%)
2 stars
0 (0%)
1 star
0 (0%)
Displaying 1 of 1 review
Profile Image for Senthil Kumar.
1 review
January 3, 2014
The “Microsoft DirectAccess Best Practices and Troubleshooting” book by Microsoft MVP Jordan Krause is an excellent guide for any IT professional that looks forward to implement/ administer/troubleshoot Microsoft DirectAccess technology using Windows server 2012 R2 or Forefront Unified Access Gateway. The book is well written and organized with a great flow to deeply understand the best practices/guide lines, to implement the DirectAccess technology up to the current industrial Security standards, as well as to easily troubleshoot any issues that would hit the desk of a security administrator on a day to day basis.
In the first chapter of the book, the author has given a detailed walk through of the best practices you need to follow as a security professional while you are deploying a windows server in your network.
In the second chapter, the author dives deep in to the DirectAccess technology and walks you through the best practices for implementing DirectAccess. Adding to that, the author had also explained why the mentioned best practices needs to be followed and what types of issues would occur if they were not followed.
In the last two chapters, the author has given the step by step process to follow if you were to troubleshoot any DirectAccess issues. He has given the list of windows server PowerShell commands to check the DirectAccess status on the client and server and what information to look from the output of each commands and to decide the component that’s causing any issues with DirectAccess. The author has also given a detailed explanation of the DCA/NCA logs and how a security administrator can be benefitted by using the tools while troubleshooting issues on a remote client. Especially in the last chapter, the author has discussed about a few unique reoccurring scenarios that he had experienced so far while working with lots of customers and this would greatly help a Direct Access administrator to quickly isolate an issue.
This book is a great companion and will definitely make the life of a security administrator much easier if DirectAccess is implemented as Secure Remote Access solution for mobile employees in your corporate network or if it is a solution that you are looking forward to implement in the near future.
Displaying 1 of 1 review

Can't find what you're looking for?

Get help and learn more about the design.