- Mastering Windows Security and Hardening
- Mark Dunkerley Matt Tumbarello
- 258字
- 2021-06-18 18:38:01
Summary
In this chapter, we provided an overview of the traditional on-premise data center and the most current model available, known as the cloud. Within the cloud model, we covered the three primary services, known as IaaS, PaaS, and SaaS, and then finished this section with an overview of the hybrid model. Next, we reviewed secure access management as it relates to both physical and user access to Windows servers and infrastructure. We then covered privileged access models with best practices for secure access management.
The following section covered Windows Server management tools, including Server Manager, Event Viewer, WSUS, and Windows Admin Center. The final section of this chapter moved on to Azure services for managing Windows servers. In this section, we provided details about the Azure portal and Marketplace, Azure RBAC, Azure Resource Manager, Azure Backup, Azure Update Management, and Azure Site Recovery. While we quickly scratched the surface of many available tools, we hope the acknowledgement of these services may spark an interest in you to research further. These concepts may eventually lead to these services being implemented in your own environment, which will increase your overall security posture.
In the next chapter, we will shift our focus away from the server infrastructure to end user device management. This chapter will cover the evolution of device management and the tools that have been used over the years. We will then cover these tools in more detail, specifically the ones regarding device imaging and Windows autopilot, Microsoft Endpoint Configuration Manager (formerly System Center Configuration Manager), and Intune.
- Extending Symfony2 Web Application Framework
- CTF實戰:技術、解題與進階
- 為你護航:網絡空間安全科普讀本(第2版)
- Web安全與攻防入門很輕松(實戰超值版)
- 計算機網絡安全基礎(第5版)
- Mastering Reverse Engineering
- 數據安全與流通:技術、架構與實踐
- 網絡安全態勢感知
- 無線傳感器網絡安全與加權復雜網絡抗毀性建模分析
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- Hands-On Artificial Intelligence for Cybersecurity
- 從實踐中學習Nmap滲透測試
- 社會工程:防范釣魚欺詐(卷3)
- Kali Linux無線網絡滲透測試詳解
- ATT&CK視角下的紅藍對抗實戰指南