In This Chapter
Understanding Microsoft's security philosophy.
Using security tools.
Encrypting data.
Developing a security strategy.