官术网_书友最值得收藏!

What this book covers

Chapter 1, Operating System and Baseline Security, provides the details to translate your business requirements into a technical policy and implement these security policies in a Microsoft infrastructure environment. This chapter also covers instructions on creating and implementing Windows baseline polices using Microsoft Security Configuration Wizard.

Chapter 2, Native MS Security Tools and Configuration, provides an overview of various Microsoft tools and explains how they can be used in an enterprise to support your compliance and security needs. This chapter converts the configuration and implementation details of the Microsoft Security Compliance Manager, Attack Surface Analyzer, application control, and other auditing policies.

Chapter 3, Server Roles and Protocols, provides the details and methods to select correct server types and roles and identify and control unwanted services based on your requirements. It also provides a PowerShell-based solution to create and analyze baseline images based on the application or server type.

Chapter 4, Application Security, provides various options to create a secure server infrastructure platform for your application using Microsoft technologies. This chapter also covers the details to secure file and data servers, print servers, Hyper-V, web servers and encryption, and BitLocker technologies.

Chapter 5, Network Service Security, provides the details of protecting and controlling Microsoft network services. This chapter provides step-by-step instructions on securing Active Directory, Domain Controller, DNS, DHCP and configuration, and implementation details of gMSA and EMET.

Chapter 6, Access Control, provides an overview of the new access control mechanisms in Windows Server 2012. The step-by-step installation and configuration details of Dynamic Access Control are also included in this chapter.

Chapter 7, Patch Management, provides the details of maintaining the security and integrity of your Windows server using various Microsoft technologies. The step-by-step instructions on implementing and administering WSUS are also included in this chapter.

Chapter 8, Auditing and Monitoring, provides different options to audit and monitor your server infrastructure using various technologies. The details of auditing polices, GPOs, event forwarding, event alerting, and Best Practices Analyzer are also included in this chapter.

主站蜘蛛池模板: 娱乐| 筠连县| 青浦区| 阿瓦提县| 治多县| 淮南市| 永城市| 广昌县| 皋兰县| 陇南市| 大石桥市| 万山特区| 东乡| 峨边| 遵义县| 拉萨市| 玛曲县| 尼玛县| 赞皇县| 聂荣县| 成都市| 策勒县| 醴陵市| 奉化市| 曲沃县| 合作市| 乐清市| 金门县| 东阿县| 黄龙县| 招远市| 呼伦贝尔市| 陇南市| 南康市| 乌鲁木齐县| 大姚县| 龙泉市| 濮阳市| 开远市| 垫江县| 五原县|