Using Security Management
The following topics provide information about using security management. These procedures and examples demonstrate management techniques. The examples use function calls and structures described in Security Management Reference.
|Using LSA Policy||Information about using the Local Security Authority Policy functions for the management of local security|
|Using Password Filters||Information about installing and registering a password filter|
|Using Service Security Attachments||Information about creating attachment components required to support a service-specific configuration in the Security Configuration snap-in|
Build date: 11/16/2013