Book Image

Microsoft System Center Endpoint Protection Cookbook - Second Edition

By : Nicolai Henriksen
Book Image

Microsoft System Center Endpoint Protection Cookbook - Second Edition

By: Nicolai Henriksen

Overview of this book

System Center Configuration Manager is now used by over 70% of all the business in the world today and many have taken advantage engaging the System Center Endpoint Protection within that great product. Through this book, you will gain knowledge about System Center Endpoint Protection, and see how to work with it from System Center Configuration Manager from an objective perspective. We’ll show you several tips, tricks, and recipes to not only help you understand and resolve your daily challenges, but hopefully enhance the security level of your business. Different scenarios will be covered, such as planning and setting up Endpoint Protection, daily operations and maintenance tips, configuring Endpoint Protection for different servers and applications, as well as workstation computers. You’ll also see how to deal with malware and infected systems that are discovered. You’ll find out how perform OS deployment, Bitlocker, and Applocker, and discover what to do if there is an attack or outbreak. You’ll find out how to ensure good control and reporting, and great defense against threats and malware software. You’ll see the huge benefits when dealing with application deployments, and get to grips with OS deployments, software updates, and disk encryption such as Bitlocker. By the end, you will be fully aware of the benefits of the System Center 2016 Endpoint Protection anti-malware product, ready to ensure your business is watertight against any threat you could face.
Table of Contents (16 chapters)
Microsoft System Center Endpoint Protection Cookbook Second Edition
Credits
About the Author
Acknowledgment
About the Reviewer
www.PacktPub.com
Preface
Index

What you need to consider regarding BitLocker and Endpoint Protection


BitLocker is a security feature that came with Windows Vista; it encrypts your hard drive. The intention is to protect the data from being stolen or falling into the wrong hands. The key to unlock the encrypted drive is well-protected by a Trusted Platform Module (TPM) that Windows owns and controls.

TPM is a cryptographic, tamper-resistant module. It stores biometric data, such as the new Windows Hello feature that allows you to sign in to Windows by using face or fingerprint. All these features are built in to Windows.

Regarding BitLocker, the 48-digit recovery key is securely placed in Active Directory attached to the Computer object, so it's easy to recognize.

Brute-force attacks have existed for several years and are easily explained as a process that simply tries to guess the user's password, pin code, or even biometric login.

How can you protect yourselves against brute force? And what has BitLocker to do with Windows...