Book Image

Mastering Windows Security and Hardening

By : Mark Dunkerley, Matt Tumbarello
Book Image

Mastering Windows Security and Hardening

By: Mark Dunkerley, Matt Tumbarello

Overview of this book

Are you looking for effective ways to protect Windows-based systems from being compromised by unauthorized users? Mastering Windows Security and Hardening is a detailed guide that helps you gain expertise when implementing efficient security measures and creating robust defense solutions. We will begin with an introduction to Windows security fundamentals, baselining, and the importance of building a baseline for an organization. As you advance, you will learn how to effectively secure and harden your Windows-based system, protect identities, and even manage access. In the concluding chapters, the book will take you through testing, monitoring, and security operations. In addition to this, you’ll be equipped with the tools you need to ensure compliance and continuous monitoring through security operations. By the end of this book, you’ll have developed a full understanding of the processes and tools involved in securing and hardening your Windows environment.
Table of Contents (19 chapters)
1
Section 1: Getting Started
6
Section 2: Applying Security and Hardening
13
Section 3: Protecting, Detecting, and Responding for Windows Environments

Chapter 8: Administration and Remote Management

In this chapter, we will be covering the administration and remote management of Windows devices within an organization. The administration of your devices is a very important task and one that needs ongoing interaction and support to stay current. The foundation of your Windows administration will be developed from your established framework and baselines, as discussed in Chapter 2, Building a Baseline. However, just as important are your policies, standards, and procedures, which should have already been built to direct how you administer your Windows environment. With that, the administration of your devices should become a much simpler task of execution to meet the defined requirements that have been created and agreed upon.

When it comes to remote management, ensuring a secure and locked down model is a must. Support staff who have remote access to your Windows devices are privileged users that have elevated rights to administer...