Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Microsoft System Center Endpoint Protection Cookbook
  • Table Of Contents Toc
  • Feedback & Rating feedback
Microsoft System Center Endpoint Protection Cookbook

Microsoft System Center Endpoint Protection Cookbook - Second Edition

By : Henriksen
4.3 (6)
close
close
Microsoft System Center Endpoint Protection Cookbook

Microsoft System Center Endpoint Protection Cookbook

4.3 (6)
By: Henriksen

Overview of this book

System Center Configuration Manager is now used by over 70% of all the business in the world today and many have taken advantage engaging the System Center Endpoint Protection within that great product. Through this book, you will gain knowledge about System Center Endpoint Protection, and see how to work with it from System Center Configuration Manager from an objective perspective. We’ll show you several tips, tricks, and recipes to not only help you understand and resolve your daily challenges, but hopefully enhance the security level of your business. Different scenarios will be covered, such as planning and setting up Endpoint Protection, daily operations and maintenance tips, configuring Endpoint Protection for different servers and applications, as well as workstation computers. You’ll also see how to deal with malware and infected systems that are discovered. You’ll find out how perform OS deployment, Bitlocker, and Applocker, and discover what to do if there is an attack or outbreak. You’ll find out how to ensure good control and reporting, and great defense against threats and malware software. You’ll see the huge benefits when dealing with application deployments, and get to grips with OS deployments, software updates, and disk encryption such as Bitlocker. By the end, you will be fully aware of the benefits of the System Center 2016 Endpoint Protection anti-malware product, ready to ensure your business is watertight against any threat you could face.
Table of Contents (10 chapters)
close
close
9
Index

What this book covers

Chapter 1, Planning and Getting Started with System Center Endpoint Protection, walks you through an easy approach to what you need to consider when planning and designing an System Center Configuration Manner hierarchy with the Endpoint Protection in mind. You will gain knowledge of real-life best practices when setting up SCCM.

Chapter 2, Configuring Endpoint Protection in Configuration Manager, walks through all the necessary steps to configure SCCM with Endpoint Protection environment, how to configure Definition Updates, and shows how to run it successfully along with SCCM and WSUS.

Chapter 3, Operations and Maintenance for Endpoint Protection in Configuration Manager, describes the workflow of creation and deploying antimalware policies using SCCM. The chapter also shows how to configure Windows Firewall and monitor the Endpoint Protection clients.

Chapter 4, Updates, dives into advanced and crucial Endpoint Protection update functionalities. This chapter also covers the different supported ways of handling updates, as well as taking in to consideration working with low bandwidth-connected branch offices.

Chapter 5, Security and Privacy for Endpoint Protection in Configuration Manager, focuses on security and privacy concerning SCCM and Endpoint Protection, with some best practices. It gives also the opportunity gain knowledge of Microsoft Security Center with Automatic Sample submission.

Chapter 6, Configuring and Troubleshooting Performance and Advanced Protection, discusses what to consider when thinking of safety and making applications work properly with the antimalware solution and recipes on how to handle OS deployment and BitLocker.

Chapter 7, Troubleshooting and Fixing Issues, provides best practices to troubleshoot SCCM with a focus on Endpoint Protection when it generates errors during its setup and utilization. It starts by tackling major issues presented in SCCM that reflect many other components and explains how to escalate problem resolution using debugging tools and hands-on tips.

Chapter 8, Malware Handling, the best chapter, comes last in this book and provides real-life experience of handling malware with a focus on Endpoint Protection. But in this chapter, you will also gain valuable knowledge about how you can improve your security even more and protect against ransomware.

Visually different images
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Microsoft System Center Endpoint Protection Cookbook
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon