Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
1/6/2010
When using the Layer Two Tunneling Protocol (L2TP) and IP Security Protocol (IPSec), follow these security best practices:
- Do not display the pre-shared key in the user interface (UI) and protect the registry version.
Use the Data Protection API (DPAPI) to prevent identity spoofing and unwanted information disclosure, as well as protect your registry from attacks. For more information, see the Protected Store topic.