Mastering Windows Security and Hardening
Mark Dunkerley Matt Tumbarello更新时间:2021-06-18 18:38:28
最新章节:Other Books You May Enjoy封面
版权信息
Why subscribe?
Contributors About the authors
About the reviewer
Packt is searching for authors like you
Preface
Section 1: Getting Started
Chapter 1: Fundamentals of Windows Security
Understanding the security transformation
Living in today's digital world
Today's threats
Identifying vulnerabilities
Recognizing breaches
Current security challenges
Implementing a Zero Trust approach
Summary
Chapter 2: Building a Baseline
Introduction to baselining
Policies standards procedures and guidelines
Incorporating change management
Implementing a security framework
Building baseline controls
Implementing a baseline
Incorporating best practices
Summary
Chapter 3: Server Infrastructure Management
Technical requirements
Overview of the data center and the cloud
Implementing access management in Windows servers
Understanding Windows Server management tools
Using Azure services to manage Windows servers
Summary
Chapter 4: End User Device Management
Technical requirements
Device management evolution
Device Imaging and Windows Autopilot
Microsoft Endpoint Configuration Manager
Intune Mobile Device Management (MDM)
Introducing Microsoft Endpoint Manager
Summary
Section 2: Applying Security and Hardening
Chapter 5: Hardware and Virtualization
Technical requirements
Physical servers and virtualization
Introduction to hardware certification
BIOS and UEFI TPM 2.0 and Secure Boot
Advanced protection with VBS
Hardware security recommendations and best practices
Summary
Chapter 6: Network Fundamentals for Hardening Windows
Technical requirements
Network security fundamentals
Understanding Windows Network Security
Windows Defender Firewall and Advanced Security
Introducing Azure network security
Summary
Chapter 7: Identity and Access Management
Technical requirements
Identity and access management overview
Implementing account and access management
Understanding authentication MFA and going passwordless
Using Conditional Access and Identity Protection
Summary
Chapter 8: Administration and Remote Management
Technical requirements
Understanding device administration
Enforcing policies with MDM
Building security baselines
Connecting securely to servers remotely
Introducing PowerShell security
Summary
Chapter 9: Keeping Your Windows Client Secure
Technical requirements
Securing your Windows clients
Introducing Windows Update for Business
Advanced Windows hardening configurations
Windows 10 privacy
Summary
Chapter 10: Keeping Your Windows Server Secure
Technical requirements
Windows Server versions
Installing Windows Server roles and features
Configuring Windows updates
Connecting to Microsoft Defender ATP
Hardening Windows Server
Deploying Windows Defender Application Control
Summary
Section 3: Protecting Detecting and Responding for Windows Environments
Chapter 11: Security Monitoring and Reporting
Technical requirements
Monitoring with MDATP
Deploying Log Analytics
Monitoring with Azure Monitor and activity logs
Configuring ASC
Creating performance baselines
Summary
Chapter 12: Security Operations
Technical requirements
Introducing the SOC
Using the M365 security portal
Using MCAS
Configuring Azure ATP
Investigating threats with Azure Security Center
Introducing Azure Sentinel
Microsoft Defender Security Center
Planning for business continuity and DR
Summary
Chapter 13: Testing and Auditing
Technical requirements
Validating controls
Vulnerability scanning
Planning for penetration testing
Security awareness and training
Summary
Chapter 14: Top 10 Recommendations and the Future
The 10 most important to-dos
The future of device security and management
Security and the future
Summary
Other Books You May Enjoy
更新时间:2021-06-18 18:38:28