Book Image

Mastering Windows Server 2019 - Second Edition

By : Jordan Krause
Book Image

Mastering Windows Server 2019 - Second Edition

By: Jordan Krause

Overview of this book

Mastering Windows Server 2019 – Second Edition covers all of the essential information needed to implement and utilize this latest-and-greatest platform as the core of your data center computing needs. You will begin by installing and managing Windows Server 2019, and by clearing up common points of confusion surrounding the versions and licensing of this new product. Centralized management, monitoring, and configuration of servers is key to an efficient IT department, and you will discover multiple methods for quickly managing all of your servers from a single pane of glass. To this end, you will spend time inside Server Manager, PowerShell, and even the new Windows Admin Center, formerly known as Project Honolulu. Even though this book is focused on Windows Server 2019 LTSC, we will still discuss containers and Nano Server, which are more commonly related to the SAC channel of the server platform, for a well-rounded exposition of all aspects of using Windows Server in your environment. We also discuss the various remote access technologies available in this operating system, as well as guidelines for virtualizing your data center with Hyper-V. By the end of this book, you will have all the ammunition required to start planning for, implementing, and managing Windows.
Table of Contents (15 chapters)

Hardening and Security

$3.8 million dollars. For anyone who read that in the voice of Dr. Evil, my hat goes off to you. For anyone who has no idea what I'm talking about, you may have had a sheltered childhood. Joking aside, that number is significant to IT security. Why? Because $3.8 million dollars is the average cost to a business when they are the victim of a data breach. I originally heard this and other scary statistics at a Microsoft conference in Redmond a couple of years ago, and the numbers have continued to climb year by year. How about looking at another statistic that can be used in order to get approval for an increase in your security budget? Depending on which study you read, the average number of days an attacker has dwell time in your network (the time they spend hanging around inside your files and infrastructure before they are detected and eradicated...