Secure Deployment (Replication)
This section provides information to help you better secure replication.
In This Section
Securing the Distributor
Describes how to help secure a Distributor.Securing the Publisher
Describes the publication access list (PAL) and best practices for its use.Securing Subscribers
Describes connections made to Subscribers and considerations for transactional updating Subscribers.Securing the Snapshot Folder
Describes permissions required for access to the snapshot folder, best practices for defining folder location, and considerations for snapshot delivery through FTP.Securing Replication Over the Internet
Includes information about virtual private networks and Web synchronization.Security Considerations for SQL Server Compact Replication
Discusses Securing connectivity between an instance of Microsoft SQL Server Database Engine and SQL Server Compact 3.5 SP2.