-
Book Overview & Buying
-
Table Of Contents
Windows Ransomware Detection and Protection
By :
Windows Ransomware Detection and Protection
By:
Overview of this book
If you’re looking for an effective way to secure your environment against ransomware attacks, this is the book for you. From teaching you how to monitor security threats to establishing countermeasures to protect against ransomware attacks, Windows Ransomware Detection and Protection has it all covered.
The book begins by helping you understand how ransomware attacks work, identifying different attack vectors, and showing you how to build a secure network foundation and Windows environment. You’ll then explore ransomware countermeasures in different segments, such as Identity and Access Management, networking, Endpoint Manager, cloud, and infrastructure, and learn how to protect against attacks. As you move forward, you’ll get to grips with the forensics involved in making important considerations when your system is attacked or compromised with ransomware, the steps you should follow, and how you can monitor the threat landscape for future threats by exploring different online data sources and building processes.
By the end of this ransomware book, you’ll have learned how configuration settings and scripts can be used to protect Windows from ransomware attacks with 50 tips on security settings to secure your Windows workload.
Table of Contents (16 chapters)
Preface
Part 1:Ransomware Basics
Chapter 1: Ransomware Attack Vectors and the Threat Landscape
Chapter 2: Building a Secure Foundation
Part 2:Protect and Detect
Chapter 3: Security Monitoring Using Microsoft Sentinel and Defender
Chapter 4: Ransomware Countermeasures – Windows Endpoints, Identity, and SaaS
Chapter 5: Ransomware Countermeasures – Microsoft Azure Workloads
Chapter 6: Ransomware Countermeasures – Networking and Zero-Trust Access
Chapter 7: Protecting Information Using Azure Information Protection and Data Protection
Part 3:Assume Breach
Chapter 8: Ransomware Forensics
Chapter 9: Monitoring the Threat Landscape
Chapter 10: Best Practices for Protecting Windows from Ransomware Attacks
Index