next up previous
Next: Manageability Up: Some Comparisons for current Previous: Integration

Security

 
		Unix		NT

User log-on required Y Y

File-level access permissions Y Y(1)

File-access control lists Few Y(2)

Security auditing Most Y

Role-based access Few Y



Omer F Rana
Thu Apr 24 18:13:49 BST 1997