官术网_书友最值得收藏!

What this book covers

Chapter 1, Operating System and Baseline Security, provides the details to translate your business requirements into a technical policy and implement these security policies in a Microsoft infrastructure environment. This chapter also covers instructions on creating and implementing Windows baseline polices using Microsoft Security Configuration Wizard.

Chapter 2, Native MS Security Tools and Configuration, provides an overview of various Microsoft tools and explains how they can be used in an enterprise to support your compliance and security needs. This chapter converts the configuration and implementation details of the Microsoft Security Compliance Manager, Attack Surface Analyzer, application control, and other auditing policies.

Chapter 3, Server Roles and Protocols, provides the details and methods to select correct server types and roles and identify and control unwanted services based on your requirements. It also provides a PowerShell-based solution to create and analyze baseline images based on the application or server type.

Chapter 4, Application Security, provides various options to create a secure server infrastructure platform for your application using Microsoft technologies. This chapter also covers the details to secure file and data servers, print servers, Hyper-V, web servers and encryption, and BitLocker technologies.

Chapter 5, Network Service Security, provides the details of protecting and controlling Microsoft network services. This chapter provides step-by-step instructions on securing Active Directory, Domain Controller, DNS, DHCP and configuration, and implementation details of gMSA and EMET.

Chapter 6, Access Control, provides an overview of the new access control mechanisms in Windows Server 2012. The step-by-step installation and configuration details of Dynamic Access Control are also included in this chapter.

Chapter 7, Patch Management, provides the details of maintaining the security and integrity of your Windows server using various Microsoft technologies. The step-by-step instructions on implementing and administering WSUS are also included in this chapter.

Chapter 8, Auditing and Monitoring, provides different options to audit and monitor your server infrastructure using various technologies. The details of auditing polices, GPOs, event forwarding, event alerting, and Best Practices Analyzer are also included in this chapter.

主站蜘蛛池模板: 福州市| 四平市| 博白县| 偃师市| 鸡东县| 呼图壁县| 阳原县| 景洪市| 嵊州市| 绥江县| 临颍县| 宁都县| 临夏县| 武鸣县| 通辽市| 马尔康县| 华容县| 高碑店市| 双辽市| 义马市| 扎囊县| 武川县| 大足县| 嘉义县| 铁岭市| 三明市| 江西省| 义马市| 永嘉县| 阿城市| 兴城市| 利津县| 南川市| 洞头县| 隆化县| 大厂| 会昌县| 招远市| 南阳市| 阿荣旗| 英山县|