Greg Lindsay, our NAP product documentation writer, and I are not the only ones writing about NAP. NAP is also being described by Thomas Shinder and Brien M. Posey. Check out the following content by these industry experts.

Thomas Shinder’s articles on deploying NAP IPsec

Part 1: http://www.windowsecurity.com/articles/Deploying-IPsec-Server-Domain-Isolation-Windows-Server-2008-Group-Policy-Part1.html

Part 2: http://www.windowsecurity.com/articles/Deploying-IPsec-Server-Domain-Isolation-Windows-Server-2008-Group-Policy-Part2.html

Part 3: http://www.windowsecurity.com/articles/Deploying-IPsec-Server-Domain-Isolation-Windows-Server-2008-Group-Policy-Part3.html

Part 4: http://www.windowsecurity.com/articles/Deploying-IPsec-Server-Domain-Isolation-Windows-Server-2008-Group-Policy-Part4.html

Thomas Shinder’s articles on deploying NAP DHCP

Part 1: http://www.windowsecurity.com/articles/Using-Group-Policy-Filtering-Part1.html

Part 2: http://www.windowsecurity.com/articles/Using-Group-Policy-Filtering-Part2.html

Part 3: http://www.windowsecurity.com/articles/Using-Group-Policy-Filtering-Part3.html

Part 4: http://www.windowsecurity.com/articles/Using-Group-Policy-Filtering-Part4.html

Brien M. Posey’s article series on NAP

Part 1: http://www.windowsnetworking.com/articles_tutorials/Network-Access-Protection-Revisited-Part1.html

Part 2: http://www.windowsnetworking.com/articles_tutorials/Network-Access-Protection-Revisited-Part2.html

Part 3: http://www.windowsnetworking.com/articles_tutorials/Network-Access-Protection-Revisited-Part3.html

Part 4: http://www.windowsnetworking.com/articles_tutorials/Network-Access-Protection-Revisited-Part4.html

Part 5: http://www.windowsnetworking.com/articles_tutorials/Network-Access-Protection-Revisited-Part5.html

Part 6: http://www.windowsnetworking.com/articles_tutorials/Network-Access-Protection-Revisited-Part6.html

Part 7: http://www.windowsnetworking.com/articles_tutorials/Network-Access-Protection-Revisited-Part7.html

 

Joe Davies
Senior Program Manager