Discussion of security issues to be considered in deploying a PI-based enterprise infrastructure. Topics include authentication, encryption, firewalls, attacks, common scenarios, PI security features, and Windows Integrated Security.