- Getting Started with Windows Server Security
- Santhosh Sivarajan
- 337字
- 2021-07-23 20:25:00
What this book covers
Chapter 1, Operating System and Baseline Security, provides the details to translate your business requirements into a technical policy and implement these security policies in a Microsoft infrastructure environment. This chapter also covers instructions on creating and implementing Windows baseline polices using Microsoft Security Configuration Wizard.
Chapter 2, Native MS Security Tools and Configuration, provides an overview of various Microsoft tools and explains how they can be used in an enterprise to support your compliance and security needs. This chapter converts the configuration and implementation details of the Microsoft Security Compliance Manager, Attack Surface Analyzer, application control, and other auditing policies.
Chapter 3, Server Roles and Protocols, provides the details and methods to select correct server types and roles and identify and control unwanted services based on your requirements. It also provides a PowerShell-based solution to create and analyze baseline images based on the application or server type.
Chapter 4, Application Security, provides various options to create a secure server infrastructure platform for your application using Microsoft technologies. This chapter also covers the details to secure file and data servers, print servers, Hyper-V, web servers and encryption, and BitLocker technologies.
Chapter 5, Network Service Security, provides the details of protecting and controlling Microsoft network services. This chapter provides step-by-step instructions on securing Active Directory, Domain Controller, DNS, DHCP and configuration, and implementation details of gMSA and EMET.
Chapter 6, Access Control, provides an overview of the new access control mechanisms in Windows Server 2012. The step-by-step installation and configuration details of Dynamic Access Control are also included in this chapter.
Chapter 7, Patch Management, provides the details of maintaining the security and integrity of your Windows server using various Microsoft technologies. The step-by-step instructions on implementing and administering WSUS are also included in this chapter.
Chapter 8, Auditing and Monitoring, provides different options to audit and monitor your server infrastructure using various technologies. The details of auditing polices, GPOs, event forwarding, event alerting, and Best Practices Analyzer are also included in this chapter.
- Django+Vue.js商城項目實戰
- Computer Vision for the Web
- Python網絡爬蟲從入門到實踐(第2版)
- 名師講壇:Java微服務架構實戰(SpringBoot+SpringCloud+Docker+RabbitMQ)
- Big Data Analytics
- 快速入門與進階:Creo 4·0全實例精講
- 深入理解C指針
- Odoo 10 Implementation Cookbook
- Scratch趣味編程:陪孩子像搭積木一樣學編程
- 零基礎學C語言程序設計
- Python機器學習與量化投資
- Python數據預處理技術與實踐
- Bitcoin Essentials
- Mastering Node.js
- Three.js Essentials