So this guy goes into the doctor's office and says " Doctor, IPSec..." <sound of phonograph needle dragging across a record> "we interrupt this off-color, potentially UN-PC so-called comedy offering to bring you information on IPsec that is actually valuable"

If you are not evaluating IPSec deployment for your environment, chances are you will be soon. Here are some good resources for you:

TechNet Webcasts

Network Isolation Using Group Policy and IPSec (Part 1 of 3): Overview of Internet Protocol Security (Level 300). Wednesday, June 15, 2005 - 9:30 AM - 10:30 AM Pacific Time, presented by John Baker, TechNet Presenter, Microsoft. Data Isolation: How can it make your IT infrastructure safer, and how do you use Group Policies and Internet Protocol security (IPsec) to implement it? This three-part series presents the information and steps needed to implement data isolation using group policies and IPsec within an organization. Part one provides an overview of the nature of Internet Protocol security. Learn how IPsec can help manage the challenges to secure network communication, and the various ways you can implement IPsec to achieve different types of secure communication. Part two continues the discussion with a look at how to use IPsec to create network isolation zones. http://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032275731&Culture=en-US

Network Isolation Using Group Policy and IPSec (Part 2 of 3): Understanding Network Isolation Using IPSec (Level 300). Wednesday, June 22, 2005 - 9:00 AM - 10:00 AM Pacific Time. Chris Henley, TechNet Presenter, Microsoft. Building on the overview of IPsec in part one, this webcast shows how to use IPsec to create network isolation zones. Topics include the advantages and limitations of network isolation, where network isolation fits into a defense-in-depth scheme, and how to use group policies and Active Directory groups to restrict access to specific servers. Part three offers guidance on how best to apply these concepts within the context of several network isolation scenarios. http://msevents.microsoft.com/CUI/EventDetail.aspx?EventID=1032275472&Culture=en-US

BLOG posts:

Using IPSec Policies as a Firewall to Block SASSER Infection

Using IPsec for network protection

IPsec works for us - how 'bout you?

IPsec Security Guidance Now Available!

Isolating Network Resources to Better Protect Against Rogue Machines, Infections and Information Theft