Book Image

Installing and Configuring Windows 10: 70-698 Exam Guide

Book Image

Installing and Configuring Windows 10: 70-698 Exam Guide

Overview of this book

The Installing and Configuring Windows 10: 70-698 Exam Guide is designed to confirm what you already know, while also updating your knowledge of Windows 10. With its easy-to-follow guidance, you will quickly learn the user interface and discover steps to work efficiently in Windows 10 to rule out delays and obstacles. This book begins by covering various ways of installing Windows 10, followed by instructions on post-installation tasks. You will learn about the deployment of Windows 10 in Enterprise and also see how to configure networking in Windows 10. You’ll understand how to leverage Disk Management and Windows PowerShell to configure disks, volumes, and file system options. As you progress through the chapters, you will be able to set up remote management in Windows 10 and learn more about Windows update usage, behavior, and settings. You will also gain insights that will help you monitor and manage data recovery and explore how to configure authentication, authorization, and advanced management tools in Windows 10. By the end of this book, you will be equipped with enough knowledge to take the 70-698 exam and explore different study methods to improve your chances of passing the exam with ease.
Table of Contents (25 chapters)
Title Page
Copyright and Credits
Dedication
About Packt
Contributors
Preface
Index

Configuring IPsec


Internet Protocol Security (IPsec) is a suite of protocols that enables secure network services on IP packet-switched networks. IPsec is a standard (RFC 2401-2412) that has been developed under the supervision of the Internet Engineering Task Force (IETF) organization to allowauthentication, integrity, access control, and confidentiality on network services.That being said, the authentication is achieved using the Internet Key Exchange (IKE) protocol, integrity is achieved using hashing algorithms, and confidentiality is achieved using encryption. Authentication Header (AH) and Encapsulation Security Protocol (ESP) are protocols that are utilized by IPsec. These features, and many more, enable IPsec todefine how a VPN can be secured across all IP networks.

Securing a VPN connection using IPsec

To secure a VPN connectionon your Windows 10 computer using IPsec, complete the following steps:

  1. Repeatstep 1 to step 5from the Setting up a VPN connection section.
  1. In theAdd a VPN connection...