舉報

會員
Mastering Windows Security and Hardening
AreyoulookingforeffectivewaystoprotectWindows-basedsystemsfrombeingcompromisedbyunauthorizedusers?MasteringWindowsSecurityandHardeningisadetailedguidethathelpsyougainexpertisewhenimplementingefficientsecuritymeasuresandcreatingrobustdefensesolutions.WewillbeginwithanintroductiontoWindowssecurityfundamentals,baselining,andtheimportanceofbuildingabaselineforanorganization.Asyouadvance,youwilllearnhowtoeffectivelysecureandhardenyourWindows-basedsystem,protectidentities,andevenmanageaccess.Intheconcludingchapters,thebookwilltakeyouthroughtesting,monitoring,andsecurityoperations.Inadditiontothis,you’llbeequippedwiththetoolsyouneedtoensurecomplianceandcontinuousmonitoringthroughsecurityoperations.Bytheendofthisbook,you’llhavedevelopedafullunderstandingoftheprocessesandtoolsinvolvedinsecuringandhardeningyourWindowsenvironment.
目錄(121章)
倒序
- 封面
- 版權信息
- Why subscribe?
- Contributors About the authors
- About the reviewer
- Packt is searching for authors like you
- Preface
- Section 1: Getting Started
- Chapter 1: Fundamentals of Windows Security
- Understanding the security transformation
- Living in today's digital world
- Today's threats
- Identifying vulnerabilities
- Recognizing breaches
- Current security challenges
- Implementing a Zero Trust approach
- Summary
- Chapter 2: Building a Baseline
- Introduction to baselining
- Policies standards procedures and guidelines
- Incorporating change management
- Implementing a security framework
- Building baseline controls
- Implementing a baseline
- Incorporating best practices
- Summary
- Chapter 3: Server Infrastructure Management
- Technical requirements
- Overview of the data center and the cloud
- Implementing access management in Windows servers
- Understanding Windows Server management tools
- Using Azure services to manage Windows servers
- Summary
- Chapter 4: End User Device Management
- Technical requirements
- Device management evolution
- Device Imaging and Windows Autopilot
- Microsoft Endpoint Configuration Manager
- Intune Mobile Device Management (MDM)
- Introducing Microsoft Endpoint Manager
- Summary
- Section 2: Applying Security and Hardening
- Chapter 5: Hardware and Virtualization
- Technical requirements
- Physical servers and virtualization
- Introduction to hardware certification
- BIOS and UEFI TPM 2.0 and Secure Boot
- Advanced protection with VBS
- Hardware security recommendations and best practices
- Summary
- Chapter 6: Network Fundamentals for Hardening Windows
- Technical requirements
- Network security fundamentals
- Understanding Windows Network Security
- Windows Defender Firewall and Advanced Security
- Introducing Azure network security
- Summary
- Chapter 7: Identity and Access Management
- Technical requirements
- Identity and access management overview
- Implementing account and access management
- Understanding authentication MFA and going passwordless
- Using Conditional Access and Identity Protection
- Summary
- Chapter 8: Administration and Remote Management
- Technical requirements
- Understanding device administration
- Enforcing policies with MDM
- Building security baselines
- Connecting securely to servers remotely
- Introducing PowerShell security
- Summary
- Chapter 9: Keeping Your Windows Client Secure
- Technical requirements
- Securing your Windows clients
- Introducing Windows Update for Business
- Advanced Windows hardening configurations
- Windows 10 privacy
- Summary
- Chapter 10: Keeping Your Windows Server Secure
- Technical requirements
- Windows Server versions
- Installing Windows Server roles and features
- Configuring Windows updates
- Connecting to Microsoft Defender ATP
- Hardening Windows Server
- Deploying Windows Defender Application Control
- Summary
- Section 3: Protecting Detecting and Responding for Windows Environments
- Chapter 11: Security Monitoring and Reporting
- Technical requirements
- Monitoring with MDATP
- Deploying Log Analytics
- Monitoring with Azure Monitor and activity logs
- Configuring ASC
- Creating performance baselines
- Summary
- Chapter 12: Security Operations
- Technical requirements
- Introducing the SOC
- Using the M365 security portal
- Using MCAS
- Configuring Azure ATP
- Investigating threats with Azure Security Center
- Introducing Azure Sentinel
- Microsoft Defender Security Center
- Planning for business continuity and DR
- Summary
- Chapter 13: Testing and Auditing
- Technical requirements
- Validating controls
- Vulnerability scanning
- Planning for penetration testing
- Security awareness and training
- Summary
- Chapter 14: Top 10 Recommendations and the Future
- The 10 most important to-dos
- The future of device security and management
- Security and the future
- Summary
- Other Books You May Enjoy 更新時間:2021-06-18 18:38:28
推薦閱讀
- 數據恢復方法及案例分析
- 黑客攻防技巧
- 計算機病毒分析與防范大全(第3版)
- 工業物聯網安全
- 硬黑客:智能硬件生死之戰
- 計算機網絡安全基礎(第5版)
- Web安全之深度學習實戰
- 黑客攻防實戰從入門到精通
- 黑客攻防從入門到精通:命令版
- 網絡空間安全法律問題研究
- 網絡安全監控實戰:深入理解事件檢測與響應
- 動態賦能網絡空間防御
- 數據恢復技術深度揭秘
- 2010年中國互聯網網絡安全報告
- 大數據時代的云安全
- 計算機病毒揭秘與對抗
- 網絡安全與維護
- 0day安全
- 互聯網金融法律與風險控制(第2版)
- 華為防火墻技術漫談
- 可信軟件若干關鍵技術的研究
- 漏洞
- 計算機網絡安全與防護
- 小小黑客之路
- 信息系統等級保護安全建設技術方案設計實現與應用
- 巧學活用網絡安全與維護
- 黑客攻防從入門到精通(實戰版)
- 走近安全:網絡世界的攻與防
- 身邊的網絡安全:互聯網時代的生活安全攻略
- 黑客揭秘與反黑實戰:基礎入門不求人