“Implementing DirectAccess with Windows Server 2016“, the definitive guide for installing and configuring DirectAccess in Windows Server 2016, is now available. The book can be found on popular sites like Amazon.com, Barnes & Noble, Springer.com, Apress.com, and others. The book is also available in electronic formats such as Amazon Kindle and Barnes & Noble Nook, as well as a variety of subscription formats including Safari, Books24x7, and SpringerLink.
This book contains detailed and prescriptive guidance for the planning, design, implementation, and support of a DirectAccess remote access solution on Windows Server 2016. With it you will learn to deploy DirectAccess in a secure, reliable, and supportable manner with valuable insight, tips, tricks, and best practice recommendations gained from my many years of deploying DirectAccess for some of the largest organizations in the world.
Current DirectAccess administrators will also find this book helpful, as the majority of content is still applicable to DirectAccess in Windows Server 2012 and Windows Server 2012 R2. In addition, the book also includes essential information on the design and deployment of highly available and geographically redundant DirectAccess deployments.
Troubleshooting DirectAccess can be a daunting task, so I’ve dedicated an entire chapter in the book to this topic. For those responsible for the maintenance and support of DirectAccess in their organization, this chapter alone will be worth the investment.
Be sure to order your copy today!
Chapter List
- DirectAccess Overview
- Plan for DirectAccess
- Install DirectAccess
- Configure DirectAccess with the Getting Started Wizard
- Configure DirectAccess with the Remote Access Setup Wizard
- Configure DirectAccess Load Balancing
- Configure DirectAccess Geographic Redundancy
- Enable Two-Factor Authentication
- Support Windows 7 Clients
- Monitor and Report
- Troubleshoot
- Migrate to Windows Server 2016 DirectAccess
- Managing Out
- DirectAccess with Native IPv6 (Appendix A)
- DirectAccess and Force Tunneling (Appendix B)
- DirectAccess Security Hardening (Appendix C)